/external/wpa_supplicant_8/src/eap_peer/ |
eap_leap.c | 31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 364 data->peer_challenge, LEAP_CHALLENGE_LEN); 378 addr[3] = data->peer_challenge;
|
eap_mschapv2.c | 41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response 51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password 89 u8 *peer_challenge; member in struct:eap_mschapv2_data 111 if (sm->peer_challenge) { 112 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 113 if (data->peer_challenge == NULL) { 117 os_memcpy(data->peer_challenge, sm->peer_challenge, 140 os_free(data->peer_challenge); 153 u8 *peer_challenge; local [all...] |
eap_i.h | 353 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 49 u8 *peer_challenge; member in struct:eap_mschapv2_data 73 if (sm->peer_challenge) { 74 data->peer_challenge = os_malloc(CHALLENGE_LEN); 75 if (data->peer_challenge == NULL) { 79 os_memcpy(data->peer_challenge, sm->peer_challenge, 93 os_free(data->peer_challenge); 286 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 314 peer_challenge = pos; 322 if (data->peer_challenge) { [all...] |
eap_server_ttls.c | 696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 759 peer_challenge = response + 2; 765 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge", 766 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 769 generate_nt_response_pwhash(auth_challenge, peer_challenge, 774 generate_nt_response(auth_challenge, peer_challenge, 786 if (challenge_hash(peer_challenge, auth_challenge, 802 peer_challenge, auth_challenge, 808 peer_challenge, auth_challenge, [all...] |
eap_i.h | 180 u8 *peer_challenge; member in struct:eap_sm
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 1925 u8 peer_challenge[] = { local [all...] |