/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 38 case CHALLENGE: 39 return "CHALLENGE"; 68 data->state = CHALLENGE; 151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 222 case CHALLENGE: 271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) 297 eap_sake_state(data, CHALLENGE); 309 if (data->state != CHALLENGE) 312 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge"); [all...] |
eap_server_mschapv2.c | 51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state; 65 data->state = CHALLENGE; 133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 224 case CHALLENGE: 255 if (data->state == CHALLENGE && 323 "Peer-Challenge"); 326 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 333 * challenge-response calculation, so remove domain prefix 494 case CHALLENGE:
|
eap_server_sim.c | 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 49 case CHALLENGE: 50 return "CHALLENGE"; 224 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge"); 331 case CHALLENGE: 376 case CHALLENGE: 555 eap_sim_state(data, CHALLENGE); 573 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message " 580 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the " 738 (data->state == START || data->state == CHALLENGE || [all...] |
eap_server_aka.c | 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 65 case CHALLENGE: 66 return "CHALLENGE"; 471 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge"); 635 case CHALLENGE: 682 case CHALLENGE: 846 eap_aka_state(data, CHALLENGE); 915 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge"); 935 * sending another Challenge message */ 953 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 400 CHALLENGE = b'#CHALLENGE#' 408 connection.send_bytes(CHALLENGE + message) 421 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 422 message = message[len(CHALLENGE):]
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 400 CHALLENGE = b'#CHALLENGE#' 408 connection.send_bytes(CHALLENGE + message) 421 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 422 message = message[len(CHALLENGE):]
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 42 case CHALLENGE: 43 return "CHALLENGE"; 179 eap_sake_state(data, CHALLENGE); 197 if (data->state != IDENTITY && data->state != CHALLENGE) { 198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 204 eap_sake_state(data, CHALLENGE); 206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not " 245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); [all...] |
/external/mtpd/ |
l2tp.c | 72 #define CHALLENGE htons(11) 106 static uint8_t challenge[CHALLENGE_SIZE]; variable 334 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) { 340 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); 373 static uint8_t *compute_response(uint8_t type, void *challenge, int size) 380 MD5_Update(&ctx, challenge, size); 393 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE), 402 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local 403 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE) [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_multiprocessing.py | [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_multiprocessing.py | [all...] |