HomeSort by relevance Sort by last modified time
    Searched refs:challenge (Results 126 - 150 of 198) sorted by null

1 2 3 4 56 7 8

  /external/tcpdump/
print-802_11.c 118 "Authentication rejected because of challenge failure", /* 15 */
198 memcpy(&pbody->challenge, p + offset, 2);
200 if (pbody->challenge.length != 0) {
201 if (pbody->challenge.length >
202 sizeof(pbody->challenge.text) - 1)
204 if (!TTEST2(*(p + offset), pbody->challenge.length))
206 memcpy(&pbody->challenge.text, p + offset,
207 pbody->challenge.length);
208 offset += pbody->challenge.length;
210 pbody->challenge.text[pbody->challenge.length] = '\0'
    [all...]
  /external/openssh/
monitor_wrap.c 954 char *challenge; local
965 debug3("%s: no challenge", __func__);
970 /* Get the challenge, and format the response */
971 challenge = buffer_get_string(&m, NULL);
975 (*prompts)[0] = challenge;
977 debug3("%s: received challenge: %s", __func__, challenge);
1012 char *challenge; local
1023 debug3("%s: no challenge", __func__);
1028 /* Get the challenge, and format the response *
1122 BIGNUM *challenge; local
    [all...]
roaming_common.c 224 calculate_new_key(u_int64_t *key, u_int64_t cookie, u_int64_t challenge)
234 buffer_put_int64(&b, challenge);
ssh-agent.c 248 BIGNUM *challenge; local
257 if ((challenge = BN_new()) == NULL)
263 buffer_get_bignum(&e->request, challenge);
276 /* Decrypt the challenge using the private key. */
277 if (rsa_private_decrypt(challenge, challenge, private->rsa) <= 0)
280 /* The response is MD5 of decrypted challenge plus session id. */
281 len = BN_num_bytes(challenge);
283 logit("process_authentication_challenge: bad challenge length %d", len);
287 BN_bn2bin(challenge, buf + 32 - len)
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 176 u16 auth_transaction, const u8 *challenge,
185 if (!sta->challenge) {
186 /* Generate a pseudo-random challenge */
190 sta->challenge = os_zalloc(WLAN_AUTH_CHALLENGE_LEN);
191 if (sta->challenge == NULL)
199 sta->challenge, WLAN_AUTH_CHALLENGE_LEN);
208 if (!iswep || !sta->challenge || !challenge ||
209 os_memcmp(sta->challenge, challenge, WLAN_AUTH_CHALLENGE_LEN))
307 const u8 *challenge = NULL; local
    [all...]
sta_info.h 87 u8 *challenge; /* IEEE 802.11 Shared Key Authentication Challenge */ member in struct:sta_info
  /external/webkit/Source/WebCore/websockets/
WebSocketHandshake.cpp 152 unsigned char challenge[16]; local
153 setChallengeNumber(&challenge[0], number1);
154 setChallengeNumber(&challenge[4], number2);
155 memcpy(&challenge[8], key3, 8);
157 md5.addBytes(challenge, sizeof(challenge));
  /external/webkit/Source/WebKit2/WebProcess/Downloads/mac/
DownloadMac.mm 233 - (void)download:(NSURLDownload *)download didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
236 _download->didReceiveAuthenticationChallenge(core(challenge));
239 - (void)download:(NSURLDownload *)download didCancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
  /external/chromium/webkit/glue/
webkitclient_impl.h 40 unsigned key_size_index, const WebKit::WebString& challenge,
  /external/webkit/Source/WebKit/android/WebCoreSupport/
PlatformBridge.cpp 67 String PlatformBridge::getSignedPublicKeyAndChallengeString(unsigned index, const String& challenge, const KURL& url)
73 return client->getSignedPublicKeyAndChallengeString(index, challenge, url);
  /external/webkit/Source/WebKit2/WebProcess/Downloads/cfnet/
DownloadCFNet.cpp 47 static void didReceiveAuthenticationChallengeCallback(CFURLDownloadRef download, CFURLAuthChallengeRef challenge, const void* clientInfo);
157 void didReceiveAuthenticationChallengeCallback(CFURLDownloadRef, CFURLAuthChallengeRef challenge, const void* clientInfo)
  /frameworks/base/core/java/android/webkit/
JWebCoreJavaBridge.java 260 synchronized private String getSignedPublicKey(int index, String challenge,
267 current.getContext(), index, challenge);
  /external/chromium/third_party/libjingle/source/talk/base/
httpcommon.cc 747 const char * challenge, size_t len,
754 challenge = DIGEST_CHALLENGE;
755 len = strlen(challenge);
759 HttpParseAttributes(challenge, len, args);
924 std::string challenge, decoded_challenge; local
925 if (HttpHasNthAttribute(args, 1, &challenge, NULL)
926 && Base64::Decode(challenge, Base64::DO_STRICT,
  /external/webkit/Source/WebKit/win/WebCoreSupport/
WebFrameLoaderClient.cpp 143 void WebFrameLoaderClient::dispatchDidReceiveAuthenticationChallenge(DocumentLoader* loader, unsigned long identifier, const AuthenticationChallenge& challenge)
146 ASSERT(challenge.authenticationClient());
151 COMPtr<WebURLAuthenticationChallenge> webChallenge(AdoptCOM, WebURLAuthenticationChallenge::createInstance(challenge));
158 challenge.authenticationClient()->receivedRequestToContinueWithoutCredential(challenge);
164 void WebFrameLoaderClient::dispatchDidCancelAuthenticationChallenge(DocumentLoader* loader, unsigned long identifier, const AuthenticationChallenge& challenge)
171 COMPtr<WebURLAuthenticationChallenge> webChallenge(AdoptCOM, WebURLAuthenticationChallenge::createInstance(challenge));
    [all...]
  /external/chromium/chrome/browser/ui/login/
login_prompt_browsertest.cc 52 const net::AuthChallengeInfo* challenge = handler->auth_info(); local
54 ASSERT_TRUE(challenge);
56 auth_map_.find(challenge->realm);
  /external/openssl/include/openssl/
ssl2.h 200 unsigned char challenge[SSL2_MAX_CHALLENGE_LENGTH]; member in struct:ssl2_state_st
  /external/openssl/ssl/
ssl2.h 200 unsigned char challenge[SSL2_MAX_CHALLENGE_LENGTH]; member in struct:ssl2_state_st
  /external/webkit/Source/WebKit/chromium/public/
WebKitClient.h 154 // generated key pair and the supplied challenge string. keySizeindex
157 const WebKit::WebString& challenge,
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
ieee802_11_common.c 192 elems->challenge = pos;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_mschapv2.c 92 /* Optional challenge values generated in EAP-FAST Phase 1 negotiation
165 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
229 * eap_mschapv2_process - Process an EAP-MSCHAPv2 challenge message
245 const u8 *pos, *challenge; local
251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
253 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data "
262 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length "
269 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge"
277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
279 challenge = data->passwd_change_challenge
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 87 /* Optional challenge values generated in EAP-FAST Phase 1 negotiation
160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
229 * eap_mschapv2_process - Process an EAP-MSCHAPv2 challenge message
245 const u8 *pos, *challenge; local
251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
253 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data "
262 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length "
269 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge"
277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
279 challenge = data->passwd_change_challenge
    [all...]
  /external/openssl/apps/
openssl.cnf 157 challengePassword = A challenge password
  /external/quake/quake/src/QW/server/
sv_main.c 453 Returns a challenge number that can be used
457 challenge, they must give a valid IP address.
469 // see if we already have a challenge for this ip
484 svs.challenges[oldest].challenge = (rand() << 16) ^ rand();
492 svs.challenges[i].challenge);
517 int challenge; local
529 challenge = atoi(Cmd_Argv(3));
535 // see if the challenge is valid
540 if (challenge == svs.challenges[i].challenge)
    [all...]
  /external/dbus/dbus/
dbus-auth.c 44 * challenge/response, but we don't currently allow that in our
179 DBusString challenge; /**< Challenge sent to client */ member in struct:DBusAuth
189 unsigned int already_asked_for_initial_response : 1; /**< Already sent a blank challenge to get an initial response */
371 if (!_dbus_string_init (&auth->challenge))
403 _dbus_string_free (&auth->challenge);
514 * challenge.
522 /* We haven't sent a challenge yet, we're expecting a desired
532 _dbus_string_set_length (&auth->challenge, 0);
646 _dbus_string_set_length (&auth->challenge, 0)
    [all...]
  /external/webkit/Source/WebKit/android/jni/
JavaBridge.cpp 85 const WTF::String& challenge, const WebCore::KURL& url);
321 const WTF::String& challenge, const WebCore::KURL& url) {
326 jstring jChallenge = wtfStringToJstring(env, challenge);

Completed in 4653 milliseconds

1 2 3 4 56 7 8