HomeSort by relevance Sort by last modified time
    Searched defs:auth_response (Results 1 - 7 of 7) sorted by null

  /system/tpm/trunks/
password_authorization_delegate.cc 56 TPMS_AUTH_RESPONSE auth_response; local
60 parse_error = Parse_TPMS_AUTH_RESPONSE(&mutable_auth_string, &auth_response,
70 if (auth_response.nonce.size != 0) {
74 if (auth_response.hmac.size != 0) {
78 if (auth_response.session_attributes != kContinueSession) {
hmac_authorization_delegate_test.cc 179 TPMS_AUTH_RESPONSE auth_response; local
180 auth_response.session_attributes = kContinueSession;
181 auth_response.nonce.size = kAesKeySize;
182 memset(auth_response.nonce.buffer, 0, kAesKeySize);
183 auth_response.hmac.size = kHashDigestSize;
189 memcpy(auth_response.hmac.buffer, hmac_buffer, kHashDigestSize);
193 Serialize_TPMS_AUTH_RESPONSE(auth_response, &authorization));
hmac_authorization_delegate.cc 115 TPMS_AUTH_RESPONSE auth_response; local
119 Parse_TPMS_AUTH_RESPONSE(&mutable_auth_string, &auth_response, nullptr);
124 if (auth_response.hmac.size != kHashDigestSize) {
128 if (auth_response.nonce.size < kNonceMinSize ||
129 auth_response.nonce.size > kNonceMaxSize) {
133 tpm_nonce_ = auth_response.nonce;
135 CHECK_EQ(Serialize_TPMA_SESSION(auth_response.session_attributes,
161 CHECK_EQ(digest.size(), auth_response.hmac.size);
162 if (!crypto::SecureMemEqual(digest.data(), auth_response.hmac.buffer,
  /external/ppp/pppd/
chap_ms.c 331 unsigned char auth_response[MS_AUTH_RESPONSE_LENGTH]; member in struct:chapms2_response_cache_entry
343 unsigned char *auth_response)
351 memcpy(chapms2_response_cache[i].auth_response,
352 auth_response, MS_AUTH_RESPONSE_LENGTH);
362 unsigned char *auth_response)
372 && (!auth_response
373 || memcmp(auth_response,
374 chapms2_response_cache[i].auth_response,
389 unsigned char auth_response[MS_AUTH_RESPONSE_LENGTH+1]; local
404 our_name, secret, secret_len, response, auth_response,
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 79 u8 auth_response[MSCHAPV2_AUTH_RESPONSE_LEN]; member in struct:eap_mschapv2_data
210 data->auth_response, data->master_key)) {
358 mschapv2_verify_auth_response(data->auth_response, pos, len)) {
611 cp->nt_response, data->auth_response);
eap_ttls.c 51 u8 auth_response[MSCHAPV2_AUTH_RESPONSE_LEN]; member in struct:eap_ttls_data
543 peer_challenge, pos, data->auth_response,
1162 mschapv2_verify_auth_response(data->auth_response,
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 50 u8 auth_response[20]; member in struct:eap_mschapv2_data
150 ms_len = sizeof(*ms) + 2 + 2 * sizeof(data->auth_response) + 1 + 2 +
170 wpabuf_put(req, sizeof(data->auth_response) * 2),
171 sizeof(data->auth_response) * 2 + 1,
172 data->auth_response, sizeof(data->auth_response));
433 data->auth_response) < 0 ||

Completed in 182 milliseconds