/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 90 u8 *auth_challenge; member in struct:eap_mschapv2_data 121 if (sm->auth_challenge) { 122 data->auth_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 123 if (data->auth_challenge == NULL) { 127 os_memcpy(data->auth_challenge, sm->auth_challenge, 141 os_free(data->auth_challenge); 149 u8 mschapv2_id, const u8 *auth_challenge) 202 if (data->auth_challenge) { 203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated [all...] |
eap_i.h | 353 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data 67 if (sm->auth_challenge) { 68 os_memcpy(data->auth_challenge, sm->auth_challenge, 106 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { 130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 134 data->auth_challenge, CHALLENGE_LEN); 367 if (challenge_hash(peer_challenge, data->auth_challenge, 391 res = generate_nt_response_pwhash(data->auth_challenge, 397 res = generate_nt_response(data->auth_challenge, [all...] |
eap_server_ttls.c | 697 *auth_challenge; local 758 auth_challenge = challenge; 763 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", 764 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 769 generate_nt_response_pwhash(auth_challenge, peer_challenge, 774 generate_nt_response(auth_challenge, peer_challenge, 786 if (challenge_hash(peer_challenge, auth_challenge, 802 peer_challenge, auth_challenge, 808 peer_challenge, auth_challenge, [all...] |
eap_i.h | 179 u8 *auth_challenge; member in struct:eap_sm
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 1921 u8 auth_challenge[] = { local [all...] |