HomeSort by relevance Sort by last modified time
    Searched defs:challenge (Results 1 - 25 of 105) sorted by null

1 2 3 4 5

  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 34 const u8 *pos, *challenge, *password; local
55 * CHAP Challenge:
56 * Value-Size (1 octet) | Value(Challenge) | Name(optional)
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
69 challenge, challenge_len);
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
eap_leap.c 65 const u8 *pos, *challenge, *identity, *password; local
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge "
102 challenge = pos;
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP",
105 challenge, LEAP_CHALLENGE_LEN);
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
118 if ((pwhash && challenge_response(challenge, password, rpos)) ||
120 nt_challenge_response(challenge, password, password_len, rpos))) {
171 "for challenge");
    [all...]
eap_mschapv2.c 87 /* Optional challenge values generated in EAP-FAST Phase 1 negotiation
158 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
227 * eap_mschapv2_process - Process an EAP-MSCHAPv2 challenge message
243 const u8 *pos, *challenge; local
249 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
251 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data "
260 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length "
267 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge"
275 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
277 challenge = data->passwd_change_challenge
    [all...]
  /hardware/interfaces/radio/1.0/vts/functional/
radio_hidl_hal_ims.cpp 169 std::string challenge = ""; local
171 radio->requestIsimAuthentication(serial, challenge);
  /hardware/libhardware/include/hardware/
hw_auth_token.h 41 uint64_t challenge; member in struct:__anon48237
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
AuthenticatorAdapter.java 19 import com.squareup.okhttp.Challenge;
38 List<Challenge> challenges = response.challenges();
42 Challenge challenge = challenges.get(i); local
43 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue;
47 challenge.getRealm(), challenge.getScheme(), url.url(), RequestorType.SERVER);
60 List<Challenge> challenges = response.challenges();
64 Challenge challenge = challenges.get(i) local
    [all...]
  /system/core/gatekeeperd/
IGateKeeperService.cpp 110 uint64_t challenge = data.readInt64(); local
125 int ret = verifyChallenge(uid, challenge, (uint8_t *) currentPasswordHandle,
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMScheme.java 65 private String challenge; field in class:NTLMScheme
74 this.challenge = null;
98 String challenge = buffer.substringTrimmed(pos, len); local
99 if (challenge.length() == 0) {
105 this.challenge = null;
108 this.challenge = challenge;
135 this.challenge);
  /external/apache-http/src/org/apache/http/impl/client/
AbstractAuthenticationHandler.java 139 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local
141 if (challenge != null) {
156 this.log.debug("Challenge for " + id + " authentication scheme not available");
  /external/wpa_supplicant_8/src/eap_server/
eap_server_md5.c 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
pairingsession.h 45 // Waiting for the secret challenge messsage or response from the peer.
61 PoloChallengeResponse* challenge);
83 // Gets the encoder used for encoding and decoding the secret challenge. This
157 // Gets the challenge response.
158 const PoloChallengeResponse& challenge() const { return *challenge_; } function in class:polo::pairing::PairingSession
  /packages/apps/Settings/src/com/android/settings/password/
SetNewPasswordController.java 67 // separate profile challenge, it is the current user to set new password. Otherwise,
122 long challenge = mFingerprintManager.preEnroll(); local
128 chooseLockExtras.putLong(ChooseLockSettingsHelper.EXTRA_KEY_CHALLENGE, challenge);
  /system/gatekeeper/include/gatekeeper/
gatekeeper_messages.h 140 uint64_t challenge,
150 uint64_t challenge; member in struct:gatekeeper::VerifyRequest
  /external/boringssl/src/ssl/
s3_both.cc 318 CBS cipher_specs, session_id, challenge; local
326 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) ||
335 // The client_random is the V2ClientHello challenge. Truncate or left-pad with
337 size_t rand_len = CBS_len(&challenge);
343 OPENSSL_memcpy(random + (SSL3_RANDOM_SIZE - rand_len), CBS_data(&challenge),
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
NetscapeCertRequest.java 51 String challenge; field in class:NetscapeCertRequest
95 // challenge IA5STRING
106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString();
129 String challenge,
135 this.challenge = challenge;
142 content_der.add(new DERIA5String(challenge));
156 return challenge;
161 challenge = value;
194 public boolean verify(String challenge) throws NoSuchAlgorithmException
    [all...]
  /external/ppp/pppd/
chap-new.c 52 /* Hook for a plugin to validate CHAP challenge */
55 unsigned char *challenge, unsigned char *response,
71 { "chap-max-challenge", o_int, &chap_max_transmits,
72 "Set max #xmits for challenge", OPT_PRIO },
89 * These limits apply to challenge and response packets we send.
102 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state
126 unsigned char *challenge, unsigned char *response,
225 * There isn't much to do until we receive a challenge.
250 * chap_timeout - It's time to send another challenge to the peer.
251 * This could be either a retransmission of a previous challenge,
    [all...]
chap_ms.c 154 { "mschap-challenge", o_string, &mschap_challenge,
155 "specify CHAP challenge" },
156 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
157 "specify CHAP peer challenge" },
163 * chapms_generate_challenge - generate a challenge for MS-CHAP.
164 * For MS-CHAP the challenge length is fixed at 8 bytes.
165 * The length goes in challenge[0] and the actual challenge starts
166 * at challenge[1].
169 chapms_generate_challenge(unsigned char *challenge)
329 unsigned char challenge[16]; member in struct:chapms2_response_cache_entry
    [all...]
  /external/syslinux/core/lwip/src/netif/ppp/
chap.h 2 * chap.h - Network Challenge Handshake Authentication Protocol header file.
34 * chap.h - Challenge Handshake Authentication Protocol definitions.
89 * Challenge lengths (for challenges we send) and other limits.
103 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state
104 u_char chal_len; /* challenge length */
105 u_char chal_id; /* ID of last challenge */
108 char *chal_name; /* Our name to use with challenge */
109 int chal_interval; /* Time until we challenge peer again */
111 int max_transmits; /* Maximum # of challenge transmissions *
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.c 78 * @challenge: 8-octet Challenge (OUT)
82 const u8 *username, size_t username_len, u8 *challenge)
97 os_memcpy(challenge, hash, 8);
140 * @challenge: 8-octet Challenge (IN)
145 int challenge_response(const u8 *challenge, const u8 *password_hash,
150 if (des_encrypt(challenge, password_hash, response) < 0 ||
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0)
156 return des_encrypt(challenge, zpwd, response + 16)
176 u8 challenge[8]; local
204 u8 challenge[8]; local
247 u8 password_hash_hash[16], challenge[8]; local
    [all...]
  /frameworks/base/core/tests/coretests/src/android/net/http/
DefaultHttpClientTest.java 132 String challenge = "Digest realm=\"protected area\", " local
136 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge));
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
FakeGateKeeperService.java 61 public long challenge; field in class:FakeGateKeeperService.AuthToken
64 public AuthToken(long challenge, long sid) {
65 this.challenge = challenge;
74 challenge = buffer.getLong();
81 buffer.putLong(challenge);
124 public GateKeeperResponse verifyChallenge(int uid, long challenge,
136 AuthToken token = new AuthToken(challenge, handle.sid);
LockSettingsServiceTests.java 114 // clear auth token and wait for verify challenge from primary user to re-generate it.
141 // Clear unified challenge
169 // clear auth token and make sure verify challenge from primary user does not regenerate it.
211 final long challenge = 54321; local
212 VerifyCredentialResponse response = mService.verifyCredential(credential, type, challenge,
233 incorrectType, challenge, userId).getResponseCode());
236 type, challenge, userId).getResponseCode());
  /hardware/interfaces/gatekeeper/1.0/vts/functional/
VtsHalGatekeeperV1_0TargetTest.cpp 49 uint64_t challenge; member in struct:GatekeeperRequest
53 GatekeeperRequest() : uid(0), challenge(0) {}
115 uid_, req.challenge, req.curPwdHandle, req.newPwd,
162 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge,
170 EXPECT_EQ(challenge, auth_token->challenge);
186 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge,
194 verifyReq.challenge = challenge;
196 checkVerify(verifyRsp, challenge, expectSuccess)
    [all...]
  /packages/apps/Settings/src/com/android/settings/fingerprint/
FingerprintEnrollFindSensor.java 209 long challenge = Utils.getFingerprintManagerOrNull(this).preEnroll(); local
215 null, null, challenge);
219 null, null, challenge, mUserId);
FingerprintEnrollIntroduction.java 130 long challenge = Utils.getFingerprintManagerOrNull(this).preEnroll(); local
135 intent.putExtra(ChooseLockSettingsHelper.EXTRA_KEY_CHALLENGE, challenge);

Completed in 695 milliseconds

1 2 3 4 5