HomeSort by relevance Sort by last modified time
    Searched refs:CHALLENGE (Results 1 - 11 of 11) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 22 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
47 case CHALLENGE:
48 return "CHALLENGE";
184 eap_sake_state(data, CHALLENGE);
202 if (data->state != IDENTITY && data->state != CHALLENGE) {
203 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
209 eap_sake_state(data, CHALLENGE);
211 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
217 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not "
250 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge");
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_mschapv2.c 56 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state;
70 data->state = CHALLENGE;
139 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge",
230 case CHALLENGE:
261 if (data->state == CHALLENGE &&
328 "Peer-Challenge");
331 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge",
338 * challenge-response calculation, so remove domain prefix
491 case CHALLENGE:
eap_sake.c 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
45 case CHALLENGE:
46 return "CHALLENGE";
75 data->state = CHALLENGE;
167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
242 case CHALLENGE:
291 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE)
317 eap_sake_state(data, CHALLENGE);
329 if (data->state != CHALLENGE)
332 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge");
    [all...]
eap_sim.c 36 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
52 case CHALLENGE:
53 return "CHALLENGE";
204 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge");
311 case CHALLENGE:
352 case CHALLENGE:
504 eap_sim_state(data, CHALLENGE);
520 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message "
526 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the "
708 case CHALLENGE
    [all...]
eap_aka.c 41 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
71 case CHALLENGE:
72 return "CHALLENGE";
367 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge");
531 case CHALLENGE:
578 case CHALLENGE:
751 eap_aka_state(data, CHALLENGE);
808 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge");
828 * sending another Challenge message */
846 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
42 case CHALLENGE:
43 return "CHALLENGE";
179 eap_sake_state(data, CHALLENGE);
197 if (data->state != IDENTITY && data->state != CHALLENGE) {
198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
204 eap_sake_state(data, CHALLENGE);
206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not "
245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge");
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state;
65 data->state = CHALLENGE;
134 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge",
225 case CHALLENGE:
256 if (data->state == CHALLENGE &&
324 "Peer-Challenge");
327 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge",
334 * challenge-response calculation, so remove domain prefix
495 case CHALLENGE:
eap_server_sake.c 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
40 case CHALLENGE:
41 return "CHALLENGE";
70 data->state = CHALLENGE;
162 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
237 case CHALLENGE:
286 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE)
312 eap_sake_state(data, CHALLENGE);
324 if (data->state != CHALLENGE)
327 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge");
    [all...]
eap_server_sim.c 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
47 case CHALLENGE:
48 return "CHALLENGE";
199 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge");
306 case CHALLENGE:
347 case CHALLENGE:
499 eap_sim_state(data, CHALLENGE);
515 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message "
521 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the "
703 case CHALLENGE
    [all...]
eap_server_aka.c 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
65 case CHALLENGE:
66 return "CHALLENGE";
360 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge");
524 case CHALLENGE:
571 case CHALLENGE:
744 eap_aka_state(data, CHALLENGE);
801 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge");
821 * sending another Challenge message */
839 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message
    [all...]
  /external/mtpd/
l2tp.c 72 #define CHALLENGE htons(11)
106 static uint8_t challenge[CHALLENGE_SIZE]; variable
334 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) {
340 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE);
373 static uint8_t *compute_response(uint8_t type, void *challenge, int size)
380 MD5_Update(&ctx, challenge, size);
393 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE),
402 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local
403 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE)
    [all...]

Completed in 6697 milliseconds