/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 40 const u8 *peer_challenge, 57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 58 peer_challenge, MSCHAPV2_CHAL_LEN); 66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge, 70 password, peer_challenge, auth_challenge, 77 if (generate_nt_response(auth_challenge, peer_challenge, 82 peer_challenge,
|
mschapv2.h | 22 const u8 *peer_challenge,
|
eap_mschapv2.c | 41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response 51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password 89 u8 *peer_challenge; member in struct:eap_mschapv2_data 111 if (sm->peer_challenge) { 112 data->peer_challenge = os_memdup(sm->peer_challenge, 114 if (data->peer_challenge == NULL) { 138 os_free(data->peer_challenge); 151 u8 *peer_challenge; local 189 peer_challenge = r->peer_challenge [all...] |
eap_leap.c | 31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 370 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 371 data->peer_challenge, LEAP_CHALLENGE_LEN); 385 addr[3] = data->peer_challenge;
|
eap_i.h | 366 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
eap_ttls.c | 485 u8 *buf, *pos, *challenge, *peer_challenge; 537 peer_challenge = pos; 543 peer_challenge, pos, data->auth_response, [all...] |
eap_fast.c | 355 sm->peer_challenge = data->key_block_p->client_challenge; 361 sm->peer_challenge = NULL; [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 17 const u8 *peer_challenge, 22 const u8 *peer_challenge, 28 const u8 *peer_challenge, const u8 *auth_challenge, 36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
|
ms_funcs.c | 74 * @peer_challenge: 16-octet PeerChallenge (IN) 81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, 88 addr[0] = peer_challenge; 163 * @peer_challenge: 16-octet PeerChallenge (IN) 171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 179 if (challenge_hash(peer_challenge, auth_challenge, username, 191 * @peer_challenge: 16-octet PeerChallenge (IN) 199 const u8 *peer_challenge, 206 if (challenge_hash(peer_challenge, auth_challenge, 219 * @peer_challenge: 16-octet PeerChallenge (IN [all...] |
crypto_module_tests.c | 2054 u8 peer_challenge[] = { local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 49 u8 *peer_challenge; member in struct:eap_mschapv2_data 73 if (sm->peer_challenge) { 74 data->peer_challenge = os_memdup(sm->peer_challenge, 76 if (data->peer_challenge == NULL) { 92 os_free(data->peer_challenge); 285 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 313 peer_challenge = pos; 321 if (data->peer_challenge) { 324 peer_challenge = data->peer_challenge [all...] |
eap_i.h | 180 u8 *peer_challenge; member in struct:eap_sm
|
eap_server_ttls.c | 698 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 761 peer_challenge = response + 2; 767 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge", 768 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 771 generate_nt_response_pwhash(auth_challenge, peer_challenge, 776 generate_nt_response(auth_challenge, peer_challenge, 788 if (challenge_hash(peer_challenge, auth_challenge, 804 peer_challenge, auth_challenge, 810 peer_challenge, auth_challenge, [all...] |
eap_server_fast.c | 960 sm->peer_challenge = data->key_block_p->client_challenge; 966 sm->peer_challenge = NULL; [all...] |