Searched refs:peer_challenge (Results 26 - 42 of 42) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_i.h353 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
H A Deap_ttls.c485 u8 *buf, *pos, *challenge, *peer_challenge;
537 peer_challenge = pos;
543 peer_challenge, pos, data->auth_response,
H A Deap_fast.c355 sm->peer_challenge = data->key_block_p->client_challenge;
361 sm->peer_challenge = NULL;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_i.h180 u8 *peer_challenge; member in struct:eap_sm
H A Deap_server_ttls.c696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
759 peer_challenge = response + 2;
765 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge",
766 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
769 generate_nt_response_pwhash(auth_challenge, peer_challenge,
774 generate_nt_response(auth_challenge, peer_challenge,
786 if (challenge_hash(peer_challenge, auth_challenge,
802 peer_challenge, auth_challenge,
808 peer_challenge, auth_challenge,
H A Deap_server_fast.c961 sm->peer_challenge = data->key_block_p->client_challenge;
967 sm->peer_challenge = NULL;
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ttls.c696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
759 peer_challenge = response + 2;
765 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge",
766 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
769 generate_nt_response_pwhash(auth_challenge, peer_challenge,
774 generate_nt_response(auth_challenge, peer_challenge,
786 if (challenge_hash(peer_challenge, auth_challenge,
802 peer_challenge, auth_challenge,
808 peer_challenge, auth_challenge,
H A Deap_server_fast.c961 sm->peer_challenge = data->key_block_p->client_challenge;
967 sm->peer_challenge = NULL;
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_ttls.c696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
759 peer_challenge = response + 2;
765 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge",
766 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
769 generate_nt_response_pwhash(auth_challenge, peer_challenge,
774 generate_nt_response(auth_challenge, peer_challenge,
786 if (challenge_hash(peer_challenge, auth_challenge,
802 peer_challenge, auth_challenge,
808 peer_challenge, auth_challenge,
H A Deap_server_fast.c961 sm->peer_challenge = data->key_block_p->client_challenge;
967 sm->peer_challenge = NULL;
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_ttls.c485 u8 *buf, *pos, *challenge, *peer_challenge;
537 peer_challenge = pos;
543 peer_challenge, pos, data->auth_response,
H A Deap_fast.c355 sm->peer_challenge = data->key_block_p->client_challenge;
361 sm->peer_challenge = NULL;
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_ttls.c485 u8 *buf, *pos, *challenge, *peer_challenge;
537 peer_challenge = pos;
543 peer_challenge, pos, data->auth_response,
H A Deap_fast.c355 sm->peer_challenge = data->key_block_p->client_challenge;
361 sm->peer_challenge = NULL;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_module_tests.c1925 u8 peer_challenge[] = { local
1964 if (generate_nt_response(auth_challenge, peer_challenge,
1981 peer_challenge, auth_challenge,
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_module_tests.c1925 u8 peer_challenge[] = { local
1964 if (generate_nt_response(auth_challenge, peer_challenge,
1981 peer_challenge, auth_challenge,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_module_tests.c1925 u8 peer_challenge[] = { local
1964 if (generate_nt_response(auth_challenge, peer_challenge,
1981 peer_challenge, auth_challenge,

Completed in 348 milliseconds

12