/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 22 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 47 case CHALLENGE: 48 return "CHALLENGE"; 184 eap_sake_state(data, CHALLENGE); 202 if (data->state != IDENTITY && data->state != CHALLENGE) { 203 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 209 eap_sake_state(data, CHALLENGE); 211 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 217 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not " 250 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 45 case CHALLENGE: 46 return "CHALLENGE"; 75 data->state = CHALLENGE; 167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 242 case CHALLENGE: 291 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) 317 eap_sake_state(data, CHALLENGE); 329 if (data->state != CHALLENGE) 332 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge"); [all...] |
eap_mschapv2.c | 56 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state; 70 data->state = CHALLENGE; 139 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 230 case CHALLENGE: 261 if (data->state == CHALLENGE && 328 "Peer-Challenge"); 331 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 338 * challenge-response calculation, so remove domain prefix 491 case CHALLENGE:
|
eap_sim.c | 36 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 52 case CHALLENGE: 53 return "CHALLENGE"; 204 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge"); 311 case CHALLENGE: 352 case CHALLENGE: 504 eap_sim_state(data, CHALLENGE); 520 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message " 526 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the " 708 case CHALLENGE [all...] |
eap_aka.c | 41 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 71 case CHALLENGE: 72 return "CHALLENGE"; 367 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge"); 531 case CHALLENGE: 578 case CHALLENGE: 751 eap_aka_state(data, CHALLENGE); 808 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge"); 828 * sending another Challenge message */ 846 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 42 case CHALLENGE: 43 return "CHALLENGE"; 179 eap_sake_state(data, CHALLENGE); 197 if (data->state != IDENTITY && data->state != CHALLENGE) { 198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 204 eap_sake_state(data, CHALLENGE); 206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not " 245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 40 case CHALLENGE: 41 return "CHALLENGE"; 70 data->state = CHALLENGE; 162 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 237 case CHALLENGE: 286 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) 312 eap_sake_state(data, CHALLENGE); 324 if (data->state != CHALLENGE) 327 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge"); [all...] |
eap_server_mschapv2.c | 51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state; 65 data->state = CHALLENGE; 134 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 225 case CHALLENGE: 256 if (data->state == CHALLENGE && 324 "Peer-Challenge"); 327 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 334 * challenge-response calculation, so remove domain prefix 495 case CHALLENGE:
|
eap_server_sim.c | 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 47 case CHALLENGE: 48 return "CHALLENGE"; 199 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge"); 306 case CHALLENGE: 347 case CHALLENGE: 499 eap_sim_state(data, CHALLENGE); 515 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message " 521 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the " 703 case CHALLENGE [all...] |
eap_server_aka.c | 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 65 case CHALLENGE: 66 return "CHALLENGE"; 360 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge"); 524 case CHALLENGE: 571 case CHALLENGE: 744 eap_aka_state(data, CHALLENGE); 801 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge"); 821 * sending another Challenge message */ 839 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message [all...] |
/external/mtpd/ |
l2tp.c | 72 #define CHALLENGE htons(11) 106 static uint8_t challenge[CHALLENGE_SIZE]; variable 334 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) { 340 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); 373 static uint8_t *compute_response(uint8_t type, void *challenge, int size) 380 MD5_Update(&ctx, challenge, size); 393 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE), 402 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local 403 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE) [all...] |