Lines Matching full:challenge
639 * issue a challenge
643 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
659 challenge.version = htonl(2); in rxkad_issue_challenge()
660 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
661 challenge.min_level = htonl(0); in rxkad_issue_challenge()
662 challenge.__padding = 0; in rxkad_issue_challenge()
683 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
684 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
690 _proto("Tx CHALLENGE %%%u", serial); in rxkad_issue_challenge()
806 * respond to a challenge packet
813 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
835 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge()
838 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
839 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge()
840 min_level = ntohl(challenge.min_level); in rxkad_respond_to_challenge()
842 _proto("Rx CHALLENGE %%%u { v=%u n=%u ml=%u }", in rxkad_respond_to_challenge()
1237 * ENOMEM. We just want to send the challenge again. Note that we in rxkad_verify_response()