challenge 299 dev/ic/if_wi_hostap.c if (sta->challenge) challenge 300 dev/ic/if_wi_hostap.c FREE(sta->challenge, M_TEMP); challenge 445 dev/ic/if_wi_hostap.c if (sta->challenge) challenge 446 dev/ic/if_wi_hostap.c FREE(sta->challenge, M_TEMP); challenge 561 dev/ic/if_wi_hostap.c u_int32_t challenge[32]; challenge 581 dev/ic/if_wi_hostap.c (void)take_tlv(&pkt, &len, IEEE80211_ELEMID_VENDOR, challenge, challenge 582 dev/ic/if_wi_hostap.c sizeof(challenge)); challenge 586 dev/ic/if_wi_hostap.c IEEE80211_ELEMID_CHALLENGE, challenge, sizeof(challenge))) < 0) { challenge 648 dev/ic/if_wi_hostap.c if (!sta->challenge) { challenge 649 dev/ic/if_wi_hostap.c MALLOC(sta->challenge, u_int32_t *, 128, challenge 651 dev/ic/if_wi_hostap.c if (!sta->challenge) challenge 655 dev/ic/if_wi_hostap.c challenge[i] = sta->challenge[i] = challenge 660 dev/ic/if_wi_hostap.c challenge[0], challenge[1]); challenge 664 dev/ic/if_wi_hostap.c if (challenge_len != 128 || !sta->challenge || challenge 671 dev/ic/if_wi_hostap.c if (sta->challenge[i] != challenge[i]) { challenge 677 dev/ic/if_wi_hostap.c FREE(sta->challenge, M_TEMP); challenge 678 dev/ic/if_wi_hostap.c sta->challenge = NULL; challenge 714 dev/ic/if_wi_hostap.c challenge, challenge_len); challenge 94 dev/ic/if_wi_hostap.h u_int32_t *challenge; challenge 87 net/if_sppp.h u_char challenge[AUTHKEYLEN]; /* random challenge */ challenge 3243 net/if_spppsubr.c MD5Update(&ctx, sp->myauth.challenge, AUTHKEYLEN); challenge 3441 net/if_spppsubr.c ch = (u_int32_t *)sp->myauth.challenge; challenge 3452 net/if_spppsubr.c (size_t)AUTHKEYLEN, sp->myauth.challenge, challenge 4138 net/if_spppsubr.c bzero(spr.defs.myauth.challenge, AUTHKEYLEN); challenge 4140 net/if_spppsubr.c bzero(spr.defs.hisauth.challenge, AUTHKEYLEN); challenge 344 net80211/ieee80211.h struct challenge { challenge 347 net80211/ieee80211.h } challenge;