HomeSort by relevance Sort by last modified time
    Searched refs:peer_challenge (Results 1 - 25 of 35) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
mschapv2.c 46 const u8 *peer_challenge,
63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
64 peer_challenge, MSCHAPV2_CHAL_LEN);
72 generate_nt_response_pwhash(auth_challenge, peer_challenge,
76 password, peer_challenge, auth_challenge,
81 generate_nt_response(auth_challenge, peer_challenge,
85 peer_challenge, auth_challenge,
mschapv2.h 28 const u8 *peer_challenge,
eap_mschapv2.c 46 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response
56 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password
94 u8 *peer_challenge; member in struct:eap_mschapv2_data
116 if (sm->peer_challenge) {
117 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
118 if (data->peer_challenge == NULL) {
122 os_memcpy(data->peer_challenge, sm->peer_challenge,
145 os_free(data->peer_challenge);
158 u8 *peer_challenge; local
    [all...]
eap_leap.c 36 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data
108 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
357 data->peer_challenge, LEAP_CHALLENGE_LEN);
371 addr[3] = data->peer_challenge;
eap_i.h 330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 46 const u8 *peer_challenge,
63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
64 peer_challenge, MSCHAPV2_CHAL_LEN);
72 generate_nt_response_pwhash(auth_challenge, peer_challenge,
76 password, peer_challenge, auth_challenge,
81 generate_nt_response(auth_challenge, peer_challenge,
85 peer_challenge, auth_challenge,
mschapv2.h 28 const u8 *peer_challenge,
eap_mschapv2.c 47 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response
57 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password
95 u8 *peer_challenge; member in struct:eap_mschapv2_data
117 if (sm->peer_challenge) {
118 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
119 if (data->peer_challenge == NULL) {
123 os_memcpy(data->peer_challenge, sm->peer_challenge,
146 os_free(data->peer_challenge);
159 u8 *peer_challenge; local
    [all...]
eap_leap.c 37 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data
109 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
369 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
370 data->peer_challenge, LEAP_CHALLENGE_LEN);
384 addr[3] = data->peer_challenge;
eap_i.h 330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
  /external/wpa_supplicant/
ms_funcs.h 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
23 const u8 *peer_challenge,
28 const u8 *peer_challenge,
34 const u8 *peer_challenge, const u8 *auth_challenge,
eap_mschapv2.c 48 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response
58 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password
96 u8 *peer_challenge; member in struct:eap_mschapv2_data
122 if (sm->peer_challenge) {
124 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
125 if (data->peer_challenge == NULL) {
129 os_memcpy(data->peer_challenge, sm->peer_challenge,
152 os_free(data->peer_challenge);
184 const u8 *auth_challenge, const u8 *peer_challenge,
227 u8 *rpos, *peer_challenge; local
    [all...]
ms_funcs.c 26 * @peer_challenge: 16-octet PeerChallenge (IN)
32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
40 addr[0] = peer_challenge;
120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
128 challenge_hash(peer_challenge, auth_challenge, username, username_len,
145 const u8 *peer_challenge,
152 challenge_hash(peer_challenge, auth_challenge, username, username_len,
162 * @peer_challenge: 16-octet PeerChallenge (IN)
171 const u8 *peer_challenge, const u8 *auth_challenge,
206 challenge_hash(peer_challenge, auth_challenge, username, username_len
    [all...]
eap_leap.c 36 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data
112 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
352 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
353 data->peer_challenge, LEAP_CHALLENGE_LEN);
367 addr[3] = data->peer_challenge;
eap_i.h 333 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
ms_funcs.h 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
23 const u8 *peer_challenge,
28 const u8 *peer_challenge,
34 const u8 *peer_challenge, const u8 *auth_challenge,
ms_funcs.c 26 * @peer_challenge: 16-octet PeerChallenge (IN)
32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
40 addr[0] = peer_challenge;
113 * @peer_challenge: 16-octet PeerChallenge (IN)
120 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
128 challenge_hash(peer_challenge, auth_challenge, username, username_len,
138 * @peer_challenge: 16-octet PeerChallenge (IN)
145 const u8 *peer_challenge,
152 challenge_hash(peer_challenge, auth_challenge, username, username_len,
162 * @peer_challenge: 16-octet PeerChallenge (IN
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 18 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
23 const u8 *peer_challenge,
28 const u8 *peer_challenge,
34 const u8 *peer_challenge, const u8 *auth_challenge,
ms_funcs.c 25 * @peer_challenge: 16-octet PeerChallenge (IN)
32 static int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
40 addr[0] = peer_challenge;
117 * @peer_challenge: 16-octet PeerChallenge (IN)
125 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
133 challenge_hash(peer_challenge, auth_challenge, username, username_len,
145 * @peer_challenge: 16-octet PeerChallenge (IN)
153 const u8 *peer_challenge,
160 if (challenge_hash(peer_challenge, auth_challenge,
173 * @peer_challenge: 16-octet PeerChallenge (IN
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_mschapv2.c 54 u8 *peer_challenge; member in struct:eap_mschapv2_data
78 if (sm->peer_challenge) {
79 data->peer_challenge = os_malloc(CHALLENGE_LEN);
80 if (data->peer_challenge == NULL) {
84 os_memcpy(data->peer_challenge, sm->peer_challenge,
98 os_free(data->peer_challenge);
292 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
318 peer_challenge = pos;
326 if (data->peer_challenge) {
    [all...]
eap_i.h 171 u8 *peer_challenge; member in struct:eap_sm
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 55 u8 *peer_challenge; member in struct:eap_mschapv2_data
79 if (sm->peer_challenge) {
80 data->peer_challenge = os_malloc(CHALLENGE_LEN);
81 if (data->peer_challenge == NULL) {
85 os_memcpy(data->peer_challenge, sm->peer_challenge,
99 os_free(data->peer_challenge);
293 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
320 peer_challenge = pos;
328 if (data->peer_challenge) {
    [all...]
eap_i.h 171 u8 *peer_challenge; member in struct:eap_sm
  /external/wpa_supplicant/tests/
test_ms_funcs.c 27 u8 peer_challenge[] = { local
64 challenge_hash(peer_challenge, auth_challenge,
78 generate_nt_response(auth_challenge, peer_challenge,
94 peer_challenge, auth_challenge,
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_ms_funcs.c 27 u8 peer_challenge[] = { local
64 challenge_hash(peer_challenge, auth_challenge,
78 generate_nt_response(auth_challenge, peer_challenge,
94 peer_challenge, auth_challenge,

Completed in 549 milliseconds

1 2