challenge 299 dev/ic/if_wi_hostap.c if (sta->challenge)
challenge 300 dev/ic/if_wi_hostap.c FREE(sta->challenge, M_TEMP);
challenge 445 dev/ic/if_wi_hostap.c if (sta->challenge)
challenge 446 dev/ic/if_wi_hostap.c FREE(sta->challenge, M_TEMP);
challenge 561 dev/ic/if_wi_hostap.c u_int32_t challenge[32];
challenge 581 dev/ic/if_wi_hostap.c (void)take_tlv(&pkt, &len, IEEE80211_ELEMID_VENDOR, challenge,
challenge 582 dev/ic/if_wi_hostap.c sizeof(challenge));
challenge 586 dev/ic/if_wi_hostap.c IEEE80211_ELEMID_CHALLENGE, challenge, sizeof(challenge))) < 0) {
challenge 648 dev/ic/if_wi_hostap.c if (!sta->challenge) {
challenge 649 dev/ic/if_wi_hostap.c MALLOC(sta->challenge, u_int32_t *, 128,
challenge 651 dev/ic/if_wi_hostap.c if (!sta->challenge)
challenge 655 dev/ic/if_wi_hostap.c challenge[i] = sta->challenge[i] =
challenge 660 dev/ic/if_wi_hostap.c challenge[0], challenge[1]);
challenge 664 dev/ic/if_wi_hostap.c if (challenge_len != 128 || !sta->challenge ||
challenge 671 dev/ic/if_wi_hostap.c if (sta->challenge[i] != challenge[i]) {
challenge 677 dev/ic/if_wi_hostap.c FREE(sta->challenge, M_TEMP);
challenge 678 dev/ic/if_wi_hostap.c sta->challenge = NULL;
challenge 714 dev/ic/if_wi_hostap.c challenge, challenge_len);
challenge 94 dev/ic/if_wi_hostap.h u_int32_t *challenge;
challenge 87 net/if_sppp.h u_char challenge[AUTHKEYLEN]; /* random challenge */
challenge 3243 net/if_spppsubr.c MD5Update(&ctx, sp->myauth.challenge, AUTHKEYLEN);
challenge 3441 net/if_spppsubr.c ch = (u_int32_t *)sp->myauth.challenge;
challenge 3452 net/if_spppsubr.c (size_t)AUTHKEYLEN, sp->myauth.challenge,
challenge 4138 net/if_spppsubr.c bzero(spr.defs.myauth.challenge, AUTHKEYLEN);
challenge 4140 net/if_spppsubr.c bzero(spr.defs.hisauth.challenge, AUTHKEYLEN);
challenge 344 net80211/ieee80211.h struct challenge {
challenge 347 net80211/ieee80211.h } challenge;