HomeSort by relevance Sort by last modified time
    Searched refs:CHALLENGE (Results 1 - 6 of 6) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state;
65 data->state = CHALLENGE;
134 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge",
225 case CHALLENGE:
256 if (data->state == CHALLENGE &&
324 "Peer-Challenge");
327 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge",
334 * challenge-response calculation, so remove domain prefix
495 case CHALLENGE:
eap_server_sake.c 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
40 case CHALLENGE:
41 return "CHALLENGE";
70 data->state = CHALLENGE;
162 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
237 case CHALLENGE:
286 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE)
312 eap_sake_state(data, CHALLENGE);
324 if (data->state != CHALLENGE)
327 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge");
    [all...]
eap_server_sim.c 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
49 case CHALLENGE:
50 return "CHALLENGE";
224 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge");
331 case CHALLENGE:
376 case CHALLENGE:
555 eap_sim_state(data, CHALLENGE);
573 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message "
580 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the "
738 (data->state == START || data->state == CHALLENGE ||
    [all...]
eap_server_aka.c 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
65 case CHALLENGE:
66 return "CHALLENGE";
471 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge");
635 case CHALLENGE:
682 case CHALLENGE:
846 eap_aka_state(data, CHALLENGE);
915 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge");
935 * sending another Challenge message */
953 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
42 case CHALLENGE:
43 return "CHALLENGE";
179 eap_sake_state(data, CHALLENGE);
197 if (data->state != IDENTITY && data->state != CHALLENGE) {
198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
204 eap_sake_state(data, CHALLENGE);
206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not "
245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge");
    [all...]
  /external/mtpd/
l2tp.c 72 #define CHALLENGE htons(11)
106 static uint8_t challenge[CHALLENGE_SIZE]; variable
334 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) {
340 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE);
373 static uint8_t *compute_response(uint8_t type, void *challenge, int size)
380 MD5_Update(&ctx, challenge, size);
393 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE),
402 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local
403 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE)
    [all...]

Completed in 95 milliseconds