Searched refs:CHALLENGE_LEN (Results 1 - 6 of 6) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_md5.c17 #define CHALLENGE_LEN 16 macro
20 u8 challenge[CHALLENGE_LEN];
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
56 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHALLENGE_LEN,
65 wpabuf_put_u8(req, CHALLENGE_LEN);
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
68 CHALLENGE_LEN);
123 data->challenge, CHALLENGE_LEN, hash)) {
H A Deap_server_mschapv2.c44 #define CHALLENGE_LEN 16 macro
47 u8 auth_challenge[CHALLENGE_LEN];
69 CHALLENGE_LEN);
74 data->peer_challenge = os_malloc(CHALLENGE_LEN);
80 CHALLENGE_LEN);
106 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
113 ms_len = sizeof(*ms) + 1 + CHALLENGE_LEN + sm->server_id_len;
128 wpabuf_put_u8(req, CHALLENGE_LEN);
130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
132 wpabuf_put(req, CHALLENGE_LEN);
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_md5.c17 #define CHALLENGE_LEN 16 macro
20 u8 challenge[CHALLENGE_LEN];
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
56 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHALLENGE_LEN,
65 wpabuf_put_u8(req, CHALLENGE_LEN);
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
68 CHALLENGE_LEN);
123 data->challenge, CHALLENGE_LEN, hash)) {
H A Deap_server_mschapv2.c44 #define CHALLENGE_LEN 16 macro
47 u8 auth_challenge[CHALLENGE_LEN];
69 CHALLENGE_LEN);
74 data->peer_challenge = os_malloc(CHALLENGE_LEN);
80 CHALLENGE_LEN);
106 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
113 ms_len = sizeof(*ms) + 1 + CHALLENGE_LEN + sm->server_id_len;
128 wpabuf_put_u8(req, CHALLENGE_LEN);
130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
132 wpabuf_put(req, CHALLENGE_LEN);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_md5.c17 #define CHALLENGE_LEN 16 macro
20 u8 challenge[CHALLENGE_LEN];
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
56 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHALLENGE_LEN,
65 wpabuf_put_u8(req, CHALLENGE_LEN);
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
68 CHALLENGE_LEN);
123 data->challenge, CHALLENGE_LEN, hash)) {
H A Deap_server_mschapv2.c44 #define CHALLENGE_LEN 16 macro
47 u8 auth_challenge[CHALLENGE_LEN];
69 CHALLENGE_LEN);
74 data->peer_challenge = os_malloc(CHALLENGE_LEN);
80 CHALLENGE_LEN);
106 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) {
113 ms_len = sizeof(*ms) + 1 + CHALLENGE_LEN + sm->server_id_len;
128 wpabuf_put_u8(req, CHALLENGE_LEN);
130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
132 wpabuf_put(req, CHALLENGE_LEN);
[all...]

Completed in 1414 milliseconds