/system/tpm/trunks/ |
password_authorization_delegate.cc | 56 TPMS_AUTH_RESPONSE auth_response; local 60 parse_error = Parse_TPMS_AUTH_RESPONSE(&mutable_auth_string, &auth_response, 70 if (auth_response.nonce.size != 0) { 74 if (auth_response.hmac.size != 0) { 78 if (auth_response.session_attributes != kContinueSession) {
|
hmac_authorization_delegate_test.cc | 187 TPMS_AUTH_RESPONSE auth_response; local 188 auth_response.session_attributes = kContinueSession; 189 auth_response.nonce.size = kAesKeySize; 190 memset(auth_response.nonce.buffer, 0, kAesKeySize); 191 auth_response.hmac.size = kHashDigestSize; 198 memcpy(auth_response.hmac.buffer, hmac_buffer, kHashDigestSize); 201 EXPECT_EQ(TPM_RC_SUCCESS, Serialize_TPMS_AUTH_RESPONSE(auth_response,
|
hmac_authorization_delegate.cc | 115 TPMS_AUTH_RESPONSE auth_response; local 119 &auth_response, 125 if (auth_response.hmac.size != kHashDigestSize) { 129 if (auth_response.nonce.size < kNonceMinSize || 130 auth_response.nonce.size > kNonceMaxSize) { 134 tpm_nonce_ = auth_response.nonce; 136 CHECK_EQ(Serialize_TPMA_SESSION(auth_response.session_attributes, 161 CHECK_EQ(digest.size(), auth_response.hmac.size); 162 if (!crypto::SecureMemEqual(digest.data(), auth_response.hmac.buffer,
|
/external/ppp/pppd/ |
chap_ms.c | 331 unsigned char auth_response[MS_AUTH_RESPONSE_LENGTH]; member in struct:chapms2_response_cache_entry 343 unsigned char *auth_response) 351 memcpy(chapms2_response_cache[i].auth_response, 352 auth_response, MS_AUTH_RESPONSE_LENGTH); 362 unsigned char *auth_response) 372 && (!auth_response 373 || memcmp(auth_response, 374 chapms2_response_cache[i].auth_response, 389 unsigned char auth_response[MS_AUTH_RESPONSE_LENGTH+1]; local 404 our_name, secret, secret_len, response, auth_response, [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 79 u8 auth_response[MSCHAPV2_AUTH_RESPONSE_LEN]; member in struct:eap_mschapv2_data 210 data->auth_response, data->master_key)) { 358 mschapv2_verify_auth_response(data->auth_response, pos, len)) { 611 cp->nt_response, data->auth_response);
|
eap_ttls.c | 51 u8 auth_response[MSCHAPV2_AUTH_RESPONSE_LEN]; member in struct:eap_ttls_data 543 peer_challenge, pos, data->auth_response, 1162 mschapv2_verify_auth_response(data->auth_response, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 50 u8 auth_response[20]; member in struct:eap_mschapv2_data 150 ms_len = sizeof(*ms) + 2 + 2 * sizeof(data->auth_response) + 1 + 2 + 170 wpabuf_put(req, sizeof(data->auth_response) * 2), 171 sizeof(data->auth_response) * 2 + 1, 172 data->auth_response, sizeof(data->auth_response)); 433 data->auth_response) < 0 ||
|