/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 42 case CHALLENGE: 43 return "CHALLENGE"; 179 eap_sake_state(data, CHALLENGE); 197 if (data->state != IDENTITY && data->state != CHALLENGE) { 198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 204 eap_sake_state(data, CHALLENGE); 206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not " 245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 40 case CHALLENGE: 41 return "CHALLENGE"; 70 data->state = CHALLENGE; 162 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 237 case CHALLENGE: 286 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) 312 eap_sake_state(data, CHALLENGE); 324 if (data->state != CHALLENGE) 327 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge"); [all...] |
eap_server_mschapv2.c | 51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state; 65 data->state = CHALLENGE; 134 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 225 case CHALLENGE: 256 if (data->state == CHALLENGE && 324 "Peer-Challenge"); 327 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 334 * challenge-response calculation, so remove domain prefix 495 case CHALLENGE:
|
eap_server_sim.c | 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 49 case CHALLENGE: 50 return "CHALLENGE"; 224 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge"); 331 case CHALLENGE: 376 case CHALLENGE: 555 eap_sim_state(data, CHALLENGE); 573 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message " 580 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the " 738 (data->state == START || data->state == CHALLENGE || [all...] |
eap_server_aka.c | 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 65 case CHALLENGE: 66 return "CHALLENGE"; 471 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge"); 635 case CHALLENGE: 682 case CHALLENGE: 846 eap_aka_state(data, CHALLENGE); 915 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge"); 935 * sending another Challenge message */ 953 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message [all...] |
/external/mtpd/ |
l2tp.c | 72 #define CHALLENGE htons(11) 106 static uint8_t challenge[CHALLENGE_SIZE]; variable 334 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) { 340 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); 373 static uint8_t *compute_response(uint8_t type, void *challenge, int size) 380 MD5_Update(&ctx, challenge, size); 393 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE), 402 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local 403 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE) [all...] |