HomeSort by relevance Sort by last modified time
    Searched defs:peer_challenge (Results 1 - 15 of 15) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_ms_funcs.c 27 u8 peer_challenge[] = { local
64 challenge_hash(peer_challenge, auth_challenge,
78 generate_nt_response(auth_challenge, peer_challenge,
94 peer_challenge, auth_challenge,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_leap.c 36 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data
108 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
357 data->peer_challenge, LEAP_CHALLENGE_LEN);
371 addr[3] = data->peer_challenge;
eap_i.h 330 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
eap_mschapv2.c 46 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response
56 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password
94 u8 *peer_challenge; member in struct:eap_mschapv2_data
116 if (sm->peer_challenge) {
117 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
118 if (data->peer_challenge == NULL) {
122 os_memcpy(data->peer_challenge, sm->peer_challenge,
145 os_free(data->peer_challenge);
158 u8 *peer_challenge; local
    [all...]
eap_ttls.c 644 u8 *buf, *pos, *challenge, *peer_challenge; local
677 peer_challenge = challenge + 1 + EAP_TTLS_MSCHAPV2_CHALLENGE_LEN;
690 os_memcpy(pos, peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
696 peer_challenge, pos, data->auth_response,
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_leap.c 31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
364 data->peer_challenge, LEAP_CHALLENGE_LEN);
378 addr[3] = data->peer_challenge;
eap_i.h 325 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
eap_mschapv2.c 41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response
51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password
89 u8 *peer_challenge; member in struct:eap_mschapv2_data
111 if (sm->peer_challenge) {
112 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN);
113 if (data->peer_challenge == NULL) {
117 os_memcpy(data->peer_challenge, sm->peer_challenge,
140 os_free(data->peer_challenge);
153 u8 *peer_challenge; local
    [all...]
eap_ttls.c 406 u8 *buf, *pos, *challenge, *peer_challenge; local
458 peer_challenge = pos;
464 peer_challenge, pos, data->auth_response,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_mschapv2.c 54 u8 *peer_challenge; member in struct:eap_mschapv2_data
78 if (sm->peer_challenge) {
79 data->peer_challenge = os_malloc(CHALLENGE_LEN);
80 if (data->peer_challenge == NULL) {
84 os_memcpy(data->peer_challenge, sm->peer_challenge,
98 os_free(data->peer_challenge);
292 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
318 peer_challenge = pos;
326 if (data->peer_challenge) {
    [all...]
eap_i.h 171 u8 *peer_challenge; member in struct:eap_sm
eap_ttls.c 806 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
861 peer_challenge = response + 2;
867 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge",
868 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
871 generate_nt_response_pwhash(auth_challenge, peer_challenge,
876 generate_nt_response(auth_challenge, peer_challenge,
916 peer_challenge, auth_challenge,
922 peer_challenge, auth_challenge,
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 49 u8 *peer_challenge; member in struct:eap_mschapv2_data
73 if (sm->peer_challenge) {
74 data->peer_challenge = os_malloc(CHALLENGE_LEN);
75 if (data->peer_challenge == NULL) {
79 os_memcpy(data->peer_challenge, sm->peer_challenge,
93 os_free(data->peer_challenge);
287 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
314 peer_challenge = pos;
322 if (data->peer_challenge) {
    [all...]
eap_server_ttls.c 654 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
716 peer_challenge = response + 2;
722 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge",
723 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
726 generate_nt_response_pwhash(auth_challenge, peer_challenge,
731 generate_nt_response(auth_challenge, peer_challenge,
747 peer_challenge, auth_challenge,
753 peer_challenge, auth_challenge,
eap_i.h 165 u8 *peer_challenge; member in struct:eap_sm

Completed in 1121 milliseconds