| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_mschapv2.c | 90 u8 *auth_challenge; member in struct:eap_mschapv2_data 113 sm->peer_challenge && sm->auth_challenge ? 126 if (sm->auth_challenge) { 127 data->auth_challenge = os_memdup(sm->auth_challenge, 129 if (data->auth_challenge == NULL) { 145 os_free(data->auth_challenge); 153 u8 mschapv2_id, const u8 *auth_challenge) 206 if (data->auth_challenge) { 207 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated [all...] |
| eap_i.h | 366 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_mschapv2.c | 47 u8 auth_challenge[CHALLENGE_LEN]; member in struct:eap_mschapv2_data 69 sm->peer_challenge && sm->auth_challenge ? 73 if (sm->auth_challenge) { 74 os_memcpy(data->auth_challenge, sm->auth_challenge, 111 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { 135 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 139 data->auth_challenge, CHALLENGE_LEN); 372 if (challenge_hash(peer_challenge, data->auth_challenge, 396 res = generate_nt_response_pwhash(data->auth_challenge, [all...] |
| eap_i.h | 181 u8 *auth_challenge; member in struct:eap_sm
|
| eap_server_ttls.c | 701 *auth_challenge; local 762 auth_challenge = challenge; 767 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", 768 auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 773 generate_nt_response_pwhash(auth_challenge, peer_challenge, 778 generate_nt_response(auth_challenge, peer_challenge, 790 if (challenge_hash(peer_challenge, auth_challenge, 806 peer_challenge, auth_challenge, 812 peer_challenge, auth_challenge,
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| crypto_module_tests.c | 2479 u8 auth_challenge[] = { local 2522 if (generate_nt_response(auth_challenge, peer_challenge, 2539 peer_challenge, auth_challenge,
|