HomeSort by relevance Sort by last modified time
    Searched defs:challenge (Results 51 - 61 of 61) sorted by null

1 23

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_ttls.c 364 u8 *challenge, *rnd; local
369 "ttls challenge", len);
380 "implicit challenge");
385 challenge = os_malloc(len);
386 if (rnd == NULL || challenge == NULL) {
388 "challenge derivation");
390 os_free(challenge);
398 "inner application challenge", rnd,
400 challenge, len)) {
402 "challenge");
644 u8 *buf, *pos, *challenge, *peer_challenge; local
729 u8 *buf, *pos, *challenge; local
879 u8 *buf, *pos, *challenge; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_ttls.c 263 "EAP-TTLS: CHAP-Challenge (CHAP)",
277 "EAP-TTLS: MS-CHAP-Challenge",
324 u8 *challenge, *rnd; local
328 "ttls challenge", len);
337 "implicit challenge");
342 challenge = os_malloc(len);
343 if (rnd == NULL || challenge == NULL) {
345 "challenge derivation");
347 os_free(challenge);
355 "inner application challenge", rnd
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_ttls.c 364 u8 *challenge, *rnd; local
369 "ttls challenge", len);
380 "implicit challenge");
385 challenge = os_malloc(len);
386 if (rnd == NULL || challenge == NULL) {
388 "challenge derivation");
390 os_free(challenge);
398 "inner application challenge", rnd,
400 challenge, len)) {
402 "challenge");
644 u8 *buf, *pos, *challenge, *peer_challenge; local
734 u8 *buf, *pos, *challenge; local
884 u8 *buf, *pos, *challenge; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 263 "EAP-TTLS: CHAP-Challenge (CHAP)",
277 "EAP-TTLS: MS-CHAP-Challenge",
324 u8 *challenge, *rnd; local
328 "ttls challenge", len);
337 "implicit challenge");
342 challenge = os_malloc(len);
343 if (rnd == NULL || challenge == NULL) {
345 "challenge derivation");
347 os_free(challenge);
355 "inner application challenge", rnd
    [all...]
  /external/dbus/dbus/
dbus-auth.c 44 * challenge/response, but we don't currently allow that in our
179 DBusString challenge; /**< Challenge sent to client */ member in struct:DBusAuth
189 unsigned int already_asked_for_initial_response : 1; /**< Already sent a blank challenge to get an initial response */
371 if (!_dbus_string_init (&auth->challenge))
403 _dbus_string_free (&auth->challenge);
514 * challenge.
522 /* We haven't sent a challenge yet, we're expecting a desired
532 _dbus_string_set_length (&auth->challenge, 0);
646 _dbus_string_set_length (&auth->challenge, 0)
    [all...]
  /external/quake/quake/src/QW/client/
client.h 197 int challenge; member in struct:__anon10365
  /external/quake/quake/src/QW/server/
server.h 224 int challenge; member in struct:__anon10620
  /external/openssl/crypto/x509/
x509.h 534 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member in struct:Netscape_spkac_st
539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
    [all...]
  /external/openssl/include/openssl/
x509.h 534 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member in struct:Netscape_spkac_st
539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
    [all...]
  /external/wpa_supplicant/
mlme.c 97 /* possibly followed by Challenge text */
329 u8 *challenge; member in struct:ieee802_11_elems
403 elems->challenge = pos;
1040 wpa_printf(MSG_DEBUG, "MLME: replying to auth challenge");
1044 wpa_printf(MSG_DEBUG, "MLME: failed to parse Auth(challenge)");
1047 if (elems.challenge == NULL) {
1048 wpa_printf(MSG_DEBUG, "MLME: no challenge IE in shared key "
1052 ieee80211_send_auth(wpa_s, 3, elems.challenge - 2,
    [all...]
  /prebuilt/common/http-client/
httpclient-4.1.1.jar 

Completed in 1146 milliseconds

1 23