/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 22 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 47 case CHALLENGE: 48 return "CHALLENGE"; 184 eap_sake_state(data, CHALLENGE); 202 if (data->state != IDENTITY && data->state != CHALLENGE) { 203 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 209 eap_sake_state(data, CHALLENGE); 211 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 217 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not " 250 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_mschapv2.c | 56 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state; 70 data->state = CHALLENGE; 139 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 230 case CHALLENGE: 261 if (data->state == CHALLENGE && 328 "Peer-Challenge"); 331 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 338 * challenge-response calculation, so remove domain prefix 491 case CHALLENGE:
|
eap_sake.c | 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 45 case CHALLENGE: 46 return "CHALLENGE"; 75 data->state = CHALLENGE; 167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 242 case CHALLENGE: 291 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) 317 eap_sake_state(data, CHALLENGE); 329 if (data->state != CHALLENGE) 332 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge"); [all...] |
eap_sim.c | 36 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 52 case CHALLENGE: 53 return "CHALLENGE"; 204 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge"); 311 case CHALLENGE: 352 case CHALLENGE: 504 eap_sim_state(data, CHALLENGE); 520 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message " 526 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the " 708 case CHALLENGE [all...] |
eap_aka.c | 41 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 71 case CHALLENGE: 72 return "CHALLENGE"; 367 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge"); 531 case CHALLENGE: 578 case CHALLENGE: 751 eap_aka_state(data, CHALLENGE); 808 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge"); 828 * sending another Challenge message */ 846 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 48 case CHALLENGE: 49 return "CHALLENGE"; 185 eap_sake_state(data, CHALLENGE); 203 if (data->state != IDENTITY && data->state != CHALLENGE) { 204 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 210 eap_sake_state(data, CHALLENGE); 212 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 218 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not " 251 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 57 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state; 71 data->state = CHALLENGE; 140 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 231 case CHALLENGE: 262 if (data->state == CHALLENGE && 330 "Peer-Challenge"); 333 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 340 * challenge-response calculation, so remove domain prefix 498 case CHALLENGE:
|
eap_server_sake.c | 24 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 46 case CHALLENGE: 47 return "CHALLENGE"; 76 data->state = CHALLENGE; 168 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 243 case CHALLENGE: 292 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) 318 eap_sake_state(data, CHALLENGE); 330 if (data->state != CHALLENGE) 333 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge"); [all...] |
eap_server_sim.c | 37 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 53 case CHALLENGE: 54 return "CHALLENGE"; 205 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge"); 312 case CHALLENGE: 353 case CHALLENGE: 505 eap_sim_state(data, CHALLENGE); 521 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message " 527 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the " 709 case CHALLENGE [all...] |
eap_server_aka.c | 41 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 71 case CHALLENGE: 72 return "CHALLENGE"; 367 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge"); 531 case CHALLENGE: 578 case CHALLENGE: 751 eap_aka_state(data, CHALLENGE); 808 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge"); 828 * sending another Challenge message */ 846 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message [all...] |
/external/wpa_supplicant/ |
eap_sake.c | 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 48 case CHALLENGE: 49 return "CHALLENGE"; 195 eap_sake_state(data, CHALLENGE); 212 if (data->state != IDENTITY && data->state != CHALLENGE) { 213 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 219 eap_sake_state(data, CHALLENGE); 221 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 227 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not " 260 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); [all...] |
/external/mtpd/ |
l2tp.c | 72 #define CHALLENGE htons(11) 106 static uint8_t challenge[CHALLENGE_SIZE]; variable 334 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) { 340 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); 373 static uint8_t *compute_response(uint8_t type, void *challenge, int size) 380 MD5_Update(&ctx, challenge, size); 393 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE), 402 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local 403 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE) [all...] |