HomeSort by relevance Sort by last modified time
    Searched refs:CHALLENGE (Results 1 - 10 of 10) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
38 case CHALLENGE:
39 return "CHALLENGE";
68 data->state = CHALLENGE;
151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
222 case CHALLENGE:
271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE)
297 eap_sake_state(data, CHALLENGE);
309 if (data->state != CHALLENGE)
312 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge");
    [all...]
eap_server_mschapv2.c 51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state;
65 data->state = CHALLENGE;
133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge",
224 case CHALLENGE:
255 if (data->state == CHALLENGE &&
323 "Peer-Challenge");
326 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge",
333 * challenge-response calculation, so remove domain prefix
494 case CHALLENGE:
eap_server_sim.c 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
49 case CHALLENGE:
50 return "CHALLENGE";
224 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge");
331 case CHALLENGE:
376 case CHALLENGE:
555 eap_sim_state(data, CHALLENGE);
573 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message "
580 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the "
738 (data->state == START || data->state == CHALLENGE ||
    [all...]
eap_server_aka.c 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
65 case CHALLENGE:
66 return "CHALLENGE";
471 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge");
635 case CHALLENGE:
682 case CHALLENGE:
846 eap_aka_state(data, CHALLENGE);
915 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge");
935 * sending another Challenge message */
953 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 400 CHALLENGE = b'#CHALLENGE#'
408 connection.send_bytes(CHALLENGE + message)
421 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
422 message = message[len(CHALLENGE):]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 400 CHALLENGE = b'#CHALLENGE#'
408 connection.send_bytes(CHALLENGE + message)
421 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
422 message = message[len(CHALLENGE):]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
42 case CHALLENGE:
43 return "CHALLENGE";
179 eap_sake_state(data, CHALLENGE);
197 if (data->state != IDENTITY && data->state != CHALLENGE) {
198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
204 eap_sake_state(data, CHALLENGE);
206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not "
245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge");
    [all...]
  /external/mtpd/
l2tp.c 72 #define CHALLENGE htons(11)
106 static uint8_t challenge[CHALLENGE_SIZE]; variable
334 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) {
340 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE);
373 static uint8_t *compute_response(uint8_t type, void *challenge, int size)
380 MD5_Update(&ctx, challenge, size);
393 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE),
402 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local
403 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE)
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_multiprocessing.py     [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_multiprocessing.py     [all...]

Completed in 326 milliseconds