/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_i.h | 353 u8 *peer_challenge, *auth_challenge; member in struct:eap_sm
|
H A D | eap_ttls.c | 485 u8 *buf, *pos, *challenge, *peer_challenge; 537 peer_challenge = pos; 543 peer_challenge, pos, data->auth_response,
|
H A D | eap_fast.c | 355 sm->peer_challenge = data->key_block_p->client_challenge; 361 sm->peer_challenge = NULL;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_i.h | 180 u8 *peer_challenge; member in struct:eap_sm
|
H A D | eap_server_ttls.c | 696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 759 peer_challenge = response + 2; 765 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge", 766 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 769 generate_nt_response_pwhash(auth_challenge, peer_challenge, 774 generate_nt_response(auth_challenge, peer_challenge, 786 if (challenge_hash(peer_challenge, auth_challenge, 802 peer_challenge, auth_challenge, 808 peer_challenge, auth_challenge,
|
H A D | eap_server_fast.c | 961 sm->peer_challenge = data->key_block_p->client_challenge; 967 sm->peer_challenge = NULL;
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 759 peer_challenge = response + 2; 765 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge", 766 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 769 generate_nt_response_pwhash(auth_challenge, peer_challenge, 774 generate_nt_response(auth_challenge, peer_challenge, 786 if (challenge_hash(peer_challenge, auth_challenge, 802 peer_challenge, auth_challenge, 808 peer_challenge, auth_challenge,
|
H A D | eap_server_fast.c | 961 sm->peer_challenge = data->key_block_p->client_challenge; 967 sm->peer_challenge = NULL;
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 759 peer_challenge = response + 2; 765 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge", 766 peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 769 generate_nt_response_pwhash(auth_challenge, peer_challenge, 774 generate_nt_response(auth_challenge, peer_challenge, 786 if (challenge_hash(peer_challenge, auth_challenge, 802 peer_challenge, auth_challenge, 808 peer_challenge, auth_challenge,
|
H A D | eap_server_fast.c | 961 sm->peer_challenge = data->key_block_p->client_challenge; 967 sm->peer_challenge = NULL;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_ttls.c | 485 u8 *buf, *pos, *challenge, *peer_challenge; 537 peer_challenge = pos; 543 peer_challenge, pos, data->auth_response,
|
H A D | eap_fast.c | 355 sm->peer_challenge = data->key_block_p->client_challenge; 361 sm->peer_challenge = NULL;
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_ttls.c | 485 u8 *buf, *pos, *challenge, *peer_challenge; 537 peer_challenge = pos; 543 peer_challenge, pos, data->auth_response,
|
H A D | eap_fast.c | 355 sm->peer_challenge = data->key_block_p->client_challenge; 361 sm->peer_challenge = NULL;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_module_tests.c | 1925 u8 peer_challenge[] = { local 1964 if (generate_nt_response(auth_challenge, peer_challenge, 1981 peer_challenge, auth_challenge,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_module_tests.c | 1925 u8 peer_challenge[] = { local 1964 if (generate_nt_response(auth_challenge, peer_challenge, 1981 peer_challenge, auth_challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_module_tests.c | 1925 u8 peer_challenge[] = { local 1964 if (generate_nt_response(auth_challenge, peer_challenge, 1981 peer_challenge, auth_challenge,
|