/external/tcpdump/ |
print-802_11.c | 118 "Authentication rejected because of challenge failure", /* 15 */ 198 memcpy(&pbody->challenge, p + offset, 2); 200 if (pbody->challenge.length != 0) { 201 if (pbody->challenge.length > 202 sizeof(pbody->challenge.text) - 1) 204 if (!TTEST2(*(p + offset), pbody->challenge.length)) 206 memcpy(&pbody->challenge.text, p + offset, 207 pbody->challenge.length); 208 offset += pbody->challenge.length; 210 pbody->challenge.text[pbody->challenge.length] = '\0' [all...] |
/external/openssh/ |
monitor_wrap.c | 954 char *challenge; local 965 debug3("%s: no challenge", __func__); 970 /* Get the challenge, and format the response */ 971 challenge = buffer_get_string(&m, NULL); 975 (*prompts)[0] = challenge; 977 debug3("%s: received challenge: %s", __func__, challenge); 1012 char *challenge; local 1023 debug3("%s: no challenge", __func__); 1028 /* Get the challenge, and format the response * 1122 BIGNUM *challenge; local [all...] |
roaming_common.c | 224 calculate_new_key(u_int64_t *key, u_int64_t cookie, u_int64_t challenge) 234 buffer_put_int64(&b, challenge);
|
ssh-agent.c | 248 BIGNUM *challenge; local 257 if ((challenge = BN_new()) == NULL) 263 buffer_get_bignum(&e->request, challenge); 276 /* Decrypt the challenge using the private key. */ 277 if (rsa_private_decrypt(challenge, challenge, private->rsa) <= 0) 280 /* The response is MD5 of decrypted challenge plus session id. */ 281 len = BN_num_bytes(challenge); 283 logit("process_authentication_challenge: bad challenge length %d", len); 287 BN_bn2bin(challenge, buf + 32 - len) [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 176 u16 auth_transaction, const u8 *challenge, 185 if (!sta->challenge) { 186 /* Generate a pseudo-random challenge */ 190 sta->challenge = os_zalloc(WLAN_AUTH_CHALLENGE_LEN); 191 if (sta->challenge == NULL) 199 sta->challenge, WLAN_AUTH_CHALLENGE_LEN); 208 if (!iswep || !sta->challenge || !challenge || 209 os_memcmp(sta->challenge, challenge, WLAN_AUTH_CHALLENGE_LEN)) 307 const u8 *challenge = NULL; local [all...] |
sta_info.h | 87 u8 *challenge; /* IEEE 802.11 Shared Key Authentication Challenge */ member in struct:sta_info
|
/external/webkit/Source/WebCore/websockets/ |
WebSocketHandshake.cpp | 152 unsigned char challenge[16]; local 153 setChallengeNumber(&challenge[0], number1); 154 setChallengeNumber(&challenge[4], number2); 155 memcpy(&challenge[8], key3, 8); 157 md5.addBytes(challenge, sizeof(challenge));
|
/external/webkit/Source/WebKit2/WebProcess/Downloads/mac/ |
DownloadMac.mm | 233 - (void)download:(NSURLDownload *)download didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 236 _download->didReceiveAuthenticationChallenge(core(challenge)); 239 - (void)download:(NSURLDownload *)download didCancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
|
/external/chromium/webkit/glue/ |
webkitclient_impl.h | 40 unsigned key_size_index, const WebKit::WebString& challenge,
|
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
PlatformBridge.cpp | 67 String PlatformBridge::getSignedPublicKeyAndChallengeString(unsigned index, const String& challenge, const KURL& url) 73 return client->getSignedPublicKeyAndChallengeString(index, challenge, url);
|
/external/webkit/Source/WebKit2/WebProcess/Downloads/cfnet/ |
DownloadCFNet.cpp | 47 static void didReceiveAuthenticationChallengeCallback(CFURLDownloadRef download, CFURLAuthChallengeRef challenge, const void* clientInfo); 157 void didReceiveAuthenticationChallengeCallback(CFURLDownloadRef, CFURLAuthChallengeRef challenge, const void* clientInfo)
|
/frameworks/base/core/java/android/webkit/ |
JWebCoreJavaBridge.java | 260 synchronized private String getSignedPublicKey(int index, String challenge, 267 current.getContext(), index, challenge);
|
/external/chromium/third_party/libjingle/source/talk/base/ |
httpcommon.cc | 747 const char * challenge, size_t len, 754 challenge = DIGEST_CHALLENGE; 755 len = strlen(challenge); 759 HttpParseAttributes(challenge, len, args); 924 std::string challenge, decoded_challenge; local 925 if (HttpHasNthAttribute(args, 1, &challenge, NULL) 926 && Base64::Decode(challenge, Base64::DO_STRICT,
|
/external/webkit/Source/WebKit/win/WebCoreSupport/ |
WebFrameLoaderClient.cpp | 143 void WebFrameLoaderClient::dispatchDidReceiveAuthenticationChallenge(DocumentLoader* loader, unsigned long identifier, const AuthenticationChallenge& challenge) 146 ASSERT(challenge.authenticationClient()); 151 COMPtr<WebURLAuthenticationChallenge> webChallenge(AdoptCOM, WebURLAuthenticationChallenge::createInstance(challenge)); 158 challenge.authenticationClient()->receivedRequestToContinueWithoutCredential(challenge); 164 void WebFrameLoaderClient::dispatchDidCancelAuthenticationChallenge(DocumentLoader* loader, unsigned long identifier, const AuthenticationChallenge& challenge) 171 COMPtr<WebURLAuthenticationChallenge> webChallenge(AdoptCOM, WebURLAuthenticationChallenge::createInstance(challenge)); [all...] |
/external/chromium/chrome/browser/ui/login/ |
login_prompt_browsertest.cc | 52 const net::AuthChallengeInfo* challenge = handler->auth_info(); local 54 ASSERT_TRUE(challenge); 56 auth_map_.find(challenge->realm);
|
/external/openssl/include/openssl/ |
ssl2.h | 200 unsigned char challenge[SSL2_MAX_CHALLENGE_LENGTH]; member in struct:ssl2_state_st
|
/external/openssl/ssl/ |
ssl2.h | 200 unsigned char challenge[SSL2_MAX_CHALLENGE_LENGTH]; member in struct:ssl2_state_st
|
/external/webkit/Source/WebKit/chromium/public/ |
WebKitClient.h | 154 // generated key pair and the supplied challenge string. keySizeindex 157 const WebKit::WebString& challenge,
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
ieee802_11_common.c | 192 elems->challenge = pos;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_mschapv2.c | 92 /* Optional challenge values generated in EAP-FAST Phase 1 negotiation 165 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 229 * eap_mschapv2_process - Process an EAP-MSCHAPv2 challenge message 245 const u8 *pos, *challenge; local 251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 253 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " 262 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " 269 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" 277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 279 challenge = data->passwd_change_challenge [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 87 /* Optional challenge values generated in EAP-FAST Phase 1 negotiation 160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 229 * eap_mschapv2_process - Process an EAP-MSCHAPv2 challenge message 245 const u8 *pos, *challenge; local 251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 253 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " 262 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " 269 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" 277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 279 challenge = data->passwd_change_challenge [all...] |
/external/openssl/apps/ |
openssl.cnf | 157 challengePassword = A challenge password
|
/external/quake/quake/src/QW/server/ |
sv_main.c | 453 Returns a challenge number that can be used 457 challenge, they must give a valid IP address. 469 // see if we already have a challenge for this ip 484 svs.challenges[oldest].challenge = (rand() << 16) ^ rand(); 492 svs.challenges[i].challenge); 517 int challenge; local 529 challenge = atoi(Cmd_Argv(3)); 535 // see if the challenge is valid 540 if (challenge == svs.challenges[i].challenge) [all...] |
/external/dbus/dbus/ |
dbus-auth.c | 44 * challenge/response, but we don't currently allow that in our 179 DBusString challenge; /**< Challenge sent to client */ member in struct:DBusAuth 189 unsigned int already_asked_for_initial_response : 1; /**< Already sent a blank challenge to get an initial response */ 371 if (!_dbus_string_init (&auth->challenge)) 403 _dbus_string_free (&auth->challenge); 514 * challenge. 522 /* We haven't sent a challenge yet, we're expecting a desired 532 _dbus_string_set_length (&auth->challenge, 0); 646 _dbus_string_set_length (&auth->challenge, 0) [all...] |
/external/webkit/Source/WebKit/android/jni/ |
JavaBridge.cpp | 85 const WTF::String& challenge, const WebCore::KURL& url); 321 const WTF::String& challenge, const WebCore::KURL& url) { 326 jstring jChallenge = wtfStringToJstring(env, challenge);
|