/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 34 const u8 *pos, *challenge, *password; local 55 * CHAP Challenge: 56 * Value-Size (1 octet) | Value(Challenge) | Name(optional) 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 69 challenge, challenge_len); 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " 102 challenge = pos; 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 105 challenge, LEAP_CHALLENGE_LEN); 107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 118 if ((pwhash && challenge_response(challenge, password, rpos)) || 120 nt_challenge_response(challenge, password, password_len, rpos))) { 171 "for challenge"); [all...] |
eap_mschapv2.c | 87 /* Optional challenge values generated in EAP-FAST Phase 1 negotiation 158 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 227 * eap_mschapv2_process - Process an EAP-MSCHAPv2 challenge message 243 const u8 *pos, *challenge; local 249 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 251 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " 260 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " 267 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" 275 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 277 challenge = data->passwd_change_challenge [all...] |
/hardware/interfaces/radio/1.0/vts/functional/ |
radio_hidl_hal_ims.cpp | 169 std::string challenge = ""; local 171 radio->requestIsimAuthentication(serial, challenge);
|
/hardware/libhardware/include/hardware/ |
hw_auth_token.h | 41 uint64_t challenge; member in struct:__anon48237
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
AuthenticatorAdapter.java | 19 import com.squareup.okhttp.Challenge; 38 List<Challenge> challenges = response.challenges(); 42 Challenge challenge = challenges.get(i); local 43 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; 47 challenge.getRealm(), challenge.getScheme(), url.url(), RequestorType.SERVER); 60 List<Challenge> challenges = response.challenges(); 64 Challenge challenge = challenges.get(i) local [all...] |
/system/core/gatekeeperd/ |
IGateKeeperService.cpp | 110 uint64_t challenge = data.readInt64(); local 125 int ret = verifyChallenge(uid, challenge, (uint8_t *) currentPasswordHandle,
|
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMScheme.java | 65 private String challenge; field in class:NTLMScheme 74 this.challenge = null; 98 String challenge = buffer.substringTrimmed(pos, len); local 99 if (challenge.length() == 0) { 105 this.challenge = null; 108 this.challenge = challenge; 135 this.challenge);
|
/external/apache-http/src/org/apache/http/impl/client/ |
AbstractAuthenticationHandler.java | 139 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local 141 if (challenge != null) { 156 this.log.debug("Challenge for " + id + " authentication scheme not available");
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingsession.h | 45 // Waiting for the secret challenge messsage or response from the peer. 61 PoloChallengeResponse* challenge); 83 // Gets the encoder used for encoding and decoding the secret challenge. This 157 // Gets the challenge response. 158 const PoloChallengeResponse& challenge() const { return *challenge_; } function in class:polo::pairing::PairingSession
|
/packages/apps/Settings/src/com/android/settings/password/ |
SetNewPasswordController.java | 67 // separate profile challenge, it is the current user to set new password. Otherwise, 122 long challenge = mFingerprintManager.preEnroll(); local 128 chooseLockExtras.putLong(ChooseLockSettingsHelper.EXTRA_KEY_CHALLENGE, challenge);
|
/system/gatekeeper/include/gatekeeper/ |
gatekeeper_messages.h | 140 uint64_t challenge, 150 uint64_t challenge; member in struct:gatekeeper::VerifyRequest
|
/external/boringssl/src/ssl/ |
s3_both.cc | 318 CBS cipher_specs, session_id, challenge; local 326 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || 335 // The client_random is the V2ClientHello challenge. Truncate or left-pad with 337 size_t rand_len = CBS_len(&challenge); 343 OPENSSL_memcpy(random + (SSL3_RANDOM_SIZE - rand_len), CBS_data(&challenge),
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 51 String challenge; field in class:NetscapeCertRequest 95 // challenge IA5STRING 106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); 129 String challenge, 135 this.challenge = challenge; 142 content_der.add(new DERIA5String(challenge)); 156 return challenge; 161 challenge = value; 194 public boolean verify(String challenge) throws NoSuchAlgorithmException [all...] |
/external/ppp/pppd/ |
chap-new.c | 52 /* Hook for a plugin to validate CHAP challenge */ 55 unsigned char *challenge, unsigned char *response, 71 { "chap-max-challenge", o_int, &chap_max_transmits, 72 "Set max #xmits for challenge", OPT_PRIO }, 89 * These limits apply to challenge and response packets we send. 102 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state 126 unsigned char *challenge, unsigned char *response, 225 * There isn't much to do until we receive a challenge. 250 * chap_timeout - It's time to send another challenge to the peer. 251 * This could be either a retransmission of a previous challenge, [all...] |
chap_ms.c | 154 { "mschap-challenge", o_string, &mschap_challenge, 155 "specify CHAP challenge" }, 156 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 157 "specify CHAP peer challenge" }, 163 * chapms_generate_challenge - generate a challenge for MS-CHAP. 164 * For MS-CHAP the challenge length is fixed at 8 bytes. 165 * The length goes in challenge[0] and the actual challenge starts 166 * at challenge[1]. 169 chapms_generate_challenge(unsigned char *challenge) 329 unsigned char challenge[16]; member in struct:chapms2_response_cache_entry [all...] |
/external/syslinux/core/lwip/src/netif/ppp/ |
chap.h | 2 * chap.h - Network Challenge Handshake Authentication Protocol header file. 34 * chap.h - Challenge Handshake Authentication Protocol definitions. 89 * Challenge lengths (for challenges we send) and other limits. 103 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state 104 u_char chal_len; /* challenge length */ 105 u_char chal_id; /* ID of last challenge */ 108 char *chal_name; /* Our name to use with challenge */ 109 int chal_interval; /* Time until we challenge peer again */ 111 int max_transmits; /* Maximum # of challenge transmissions * [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 78 * @challenge: 8-octet Challenge (OUT) 82 const u8 *username, size_t username_len, u8 *challenge) 97 os_memcpy(challenge, hash, 8); 140 * @challenge: 8-octet Challenge (IN) 145 int challenge_response(const u8 *challenge, const u8 *password_hash, 150 if (des_encrypt(challenge, password_hash, response) < 0 || 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) 156 return des_encrypt(challenge, zpwd, response + 16) 176 u8 challenge[8]; local 204 u8 challenge[8]; local 247 u8 password_hash_hash[16], challenge[8]; local [all...] |
/frameworks/base/core/tests/coretests/src/android/net/http/ |
DefaultHttpClientTest.java | 132 String challenge = "Digest realm=\"protected area\", " local 136 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge));
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
FakeGateKeeperService.java | 61 public long challenge; field in class:FakeGateKeeperService.AuthToken 64 public AuthToken(long challenge, long sid) { 65 this.challenge = challenge; 74 challenge = buffer.getLong(); 81 buffer.putLong(challenge); 124 public GateKeeperResponse verifyChallenge(int uid, long challenge, 136 AuthToken token = new AuthToken(challenge, handle.sid);
|
LockSettingsServiceTests.java | 114 // clear auth token and wait for verify challenge from primary user to re-generate it. 141 // Clear unified challenge 169 // clear auth token and make sure verify challenge from primary user does not regenerate it. 211 final long challenge = 54321; local 212 VerifyCredentialResponse response = mService.verifyCredential(credential, type, challenge, 233 incorrectType, challenge, userId).getResponseCode()); 236 type, challenge, userId).getResponseCode());
|
/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
VtsHalGatekeeperV1_0TargetTest.cpp | 49 uint64_t challenge; member in struct:GatekeeperRequest 53 GatekeeperRequest() : uid(0), challenge(0) {} 115 uid_, req.challenge, req.curPwdHandle, req.newPwd, 162 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge, 170 EXPECT_EQ(challenge, auth_token->challenge); 186 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge, 194 verifyReq.challenge = challenge; 196 checkVerify(verifyRsp, challenge, expectSuccess) [all...] |
/packages/apps/Settings/src/com/android/settings/fingerprint/ |
FingerprintEnrollFindSensor.java | 209 long challenge = Utils.getFingerprintManagerOrNull(this).preEnroll(); local 215 null, null, challenge); 219 null, null, challenge, mUserId);
|
FingerprintEnrollIntroduction.java | 130 long challenge = Utils.getFingerprintManagerOrNull(this).preEnroll(); local 135 intent.putExtra(ChooseLockSettingsHelper.EXTRA_KEY_CHALLENGE, challenge);
|