/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_ttls.c | 364 u8 *challenge, *rnd; local 369 "ttls challenge", len); 380 "implicit challenge"); 385 challenge = os_malloc(len); 386 if (rnd == NULL || challenge == NULL) { 388 "challenge derivation"); 390 os_free(challenge); 398 "inner application challenge", rnd, 400 challenge, len)) { 402 "challenge"); 644 u8 *buf, *pos, *challenge, *peer_challenge; local 729 u8 *buf, *pos, *challenge; local 879 u8 *buf, *pos, *challenge; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_ttls.c | 263 "EAP-TTLS: CHAP-Challenge (CHAP)", 277 "EAP-TTLS: MS-CHAP-Challenge", 324 u8 *challenge, *rnd; local 328 "ttls challenge", len); 337 "implicit challenge"); 342 challenge = os_malloc(len); 343 if (rnd == NULL || challenge == NULL) { 345 "challenge derivation"); 347 os_free(challenge); 355 "inner application challenge", rnd [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ttls.c | 364 u8 *challenge, *rnd; local 369 "ttls challenge", len); 380 "implicit challenge"); 385 challenge = os_malloc(len); 386 if (rnd == NULL || challenge == NULL) { 388 "challenge derivation"); 390 os_free(challenge); 398 "inner application challenge", rnd, 400 challenge, len)) { 402 "challenge"); 644 u8 *buf, *pos, *challenge, *peer_challenge; local 734 u8 *buf, *pos, *challenge; local 884 u8 *buf, *pos, *challenge; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 263 "EAP-TTLS: CHAP-Challenge (CHAP)", 277 "EAP-TTLS: MS-CHAP-Challenge", 324 u8 *challenge, *rnd; local 328 "ttls challenge", len); 337 "implicit challenge"); 342 challenge = os_malloc(len); 343 if (rnd == NULL || challenge == NULL) { 345 "challenge derivation"); 347 os_free(challenge); 355 "inner application challenge", rnd [all...] |
/external/dbus/dbus/ |
dbus-auth.c | 44 * challenge/response, but we don't currently allow that in our 179 DBusString challenge; /**< Challenge sent to client */ member in struct:DBusAuth 189 unsigned int already_asked_for_initial_response : 1; /**< Already sent a blank challenge to get an initial response */ 371 if (!_dbus_string_init (&auth->challenge)) 403 _dbus_string_free (&auth->challenge); 514 * challenge. 522 /* We haven't sent a challenge yet, we're expecting a desired 532 _dbus_string_set_length (&auth->challenge, 0); 646 _dbus_string_set_length (&auth->challenge, 0) [all...] |
/external/quake/quake/src/QW/client/ |
client.h | 197 int challenge; member in struct:__anon10365
|
/external/quake/quake/src/QW/server/ |
server.h | 224 int challenge; member in struct:__anon10620
|
/external/openssl/crypto/x509/ |
x509.h | 534 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member in struct:Netscape_spkac_st 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ [all...] |
/external/openssl/include/openssl/ |
x509.h | 534 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member in struct:Netscape_spkac_st 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ [all...] |
/external/wpa_supplicant/ |
mlme.c | 97 /* possibly followed by Challenge text */ 329 u8 *challenge; member in struct:ieee802_11_elems 403 elems->challenge = pos; 1040 wpa_printf(MSG_DEBUG, "MLME: replying to auth challenge"); 1044 wpa_printf(MSG_DEBUG, "MLME: failed to parse Auth(challenge)"); 1047 if (elems.challenge == NULL) { 1048 wpa_printf(MSG_DEBUG, "MLME: no challenge IE in shared key " 1052 ieee80211_send_auth(wpa_s, 3, elems.challenge - 2, [all...] |
/prebuilt/common/http-client/ |
httpclient-4.1.1.jar | |