HomeSort by relevance Sort by last modified time
    Searched refs:peer_challenge (Results 1 - 14 of 14) sorted by null

  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 40 const u8 *peer_challenge,
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
58 peer_challenge, MSCHAPV2_CHAL_LEN);
66 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
70 password, peer_challenge, auth_challenge,
77 if (generate_nt_response(auth_challenge, peer_challenge,
82 peer_challenge,
mschapv2.h 22 const u8 *peer_challenge,
eap_mschapv2.c 41 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_response
51 u8 peer_challenge[MSCHAPV2_CHAL_LEN]; member in struct:ms_change_password
89 u8 *peer_challenge; member in struct:eap_mschapv2_data
111 if (sm->peer_challenge) {
112 data->peer_challenge = os_memdup(sm->peer_challenge,
114 if (data->peer_challenge == NULL) {
138 os_free(data->peer_challenge);
151 u8 *peer_challenge; local
189 peer_challenge = r->peer_challenge
    [all...]
eap_leap.c 31 u8 peer_challenge[LEAP_CHALLENGE_LEN]; member in struct:eap_leap_data
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
370 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
371 data->peer_challenge, LEAP_CHALLENGE_LEN);
385 addr[3] = data->peer_challenge;
eap_i.h 366 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
eap_ttls.c 485 u8 *buf, *pos, *challenge, *peer_challenge;
537 peer_challenge = pos;
543 peer_challenge, pos, data->auth_response,
    [all...]
eap_fast.c 355 sm->peer_challenge = data->key_block_p->client_challenge;
361 sm->peer_challenge = NULL;
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
17 const u8 *peer_challenge,
22 const u8 *peer_challenge,
28 const u8 *peer_challenge, const u8 *auth_challenge,
36 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
ms_funcs.c 74 * @peer_challenge: 16-octet PeerChallenge (IN)
81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge,
88 addr[0] = peer_challenge;
163 * @peer_challenge: 16-octet PeerChallenge (IN)
171 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
179 if (challenge_hash(peer_challenge, auth_challenge, username,
191 * @peer_challenge: 16-octet PeerChallenge (IN)
199 const u8 *peer_challenge,
206 if (challenge_hash(peer_challenge, auth_challenge,
219 * @peer_challenge: 16-octet PeerChallenge (IN
    [all...]
crypto_module_tests.c 2054 u8 peer_challenge[] = { local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 49 u8 *peer_challenge; member in struct:eap_mschapv2_data
73 if (sm->peer_challenge) {
74 data->peer_challenge = os_memdup(sm->peer_challenge,
76 if (data->peer_challenge == NULL) {
92 os_free(data->peer_challenge);
285 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
313 peer_challenge = pos;
321 if (data->peer_challenge) {
324 peer_challenge = data->peer_challenge
    [all...]
eap_i.h 180 u8 *peer_challenge; member in struct:eap_sm
eap_server_ttls.c 698 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
761 peer_challenge = response + 2;
767 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge",
768 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
771 generate_nt_response_pwhash(auth_challenge, peer_challenge,
776 generate_nt_response(auth_challenge, peer_challenge,
788 if (challenge_hash(peer_challenge, auth_challenge,
804 peer_challenge, auth_challenge,
810 peer_challenge, auth_challenge,
    [all...]
eap_server_fast.c 960 sm->peer_challenge = data->key_block_p->client_challenge;
966 sm->peer_challenge = NULL;
    [all...]

Completed in 625 milliseconds