/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 25 addr[2] = challenge;
|
chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/frameworks/base/telephony/java/com/android/internal/telephony/euicc/ |
IGetEuiccChallengeCallback.aidl | 20 void onComplete(int resultCode, in byte[] challenge);
|
/external/ppp/pppd/ |
chap-md5.c | 59 unsigned char *challenge, unsigned char *response, 67 challenge_len = *challenge++; 70 /* Generate hash of ID, secret, challenge */ 74 MD5_Update(&ctx, challenge, challenge_len); 89 unsigned char *challenge, char *secret, int secret_len, 94 int challenge_len = *challenge++; 99 MD5_Update(&ctx, challenge, challenge_len);
|
chap-new.h | 52 * Semi-arbitrary limits on challenge and response fields. 97 * Note: challenge and response arguments below are formatted as 98 * a length byte followed by the actual challenge/response data. 100 void (*generate_challenge)(unsigned char *challenge); 103 unsigned char *challenge, unsigned char *response, 106 unsigned char *challenge, char *secret, int secret_len, 114 /* Hook for a plugin to validate CHAP challenge */ 117 unsigned char *challenge, unsigned char *response,
|
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMScheme.java | 65 private String challenge; field in class:NTLMScheme 74 this.challenge = null; 98 String challenge = buffer.substringTrimmed(pos, len); local 99 if (challenge.length() == 0) { 105 this.challenge = null; 108 this.challenge = challenge; 135 this.challenge);
|
NTLMEngine.java | 36 * Type2 challenge. 64 * authentication challenge. 70 * @param challenge Type2 challenge. 79 String challenge) throws NTLMEngineException;
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/pdist/ |
security.py | 28 def _compare_challenge_response(self, challenge, response):
29 return self._encode_challenge(challenge) == response
31 def _encode_challenge(self, challenge):
33 return pow(long(challenge), p, m)
|
/external/python/cpython2/Demo/pdist/ |
security.py | 28 def _compare_challenge_response(self, challenge, response): 29 return self._encode_challenge(challenge) == response 31 def _encode_challenge(self, challenge): 33 return pow(long(challenge), p, m)
|
/hardware/libhardware/include/hardware/ |
hw_auth_token.h | 41 uint64_t challenge; member in struct:__anon48237
|
/frameworks/base/obex/javax/obex/ |
ObexSession.java | 60 * Called when the server received an authentication challenge header. This 61 * will cause the authenticator to handle the authentication challenge. 62 * @param header the header with the authentication challenge 73 * An authentication challenge is made up of one required and two 75 * the authentication challenge and it represents the challenge digest 81 byte[] challenge = ObexHelper.getTagValue((byte)0x00, header.mAuthChall); 156 * will be sent. The second optional tag is 0x02 and is the challenge 169 byte[] digest = new byte[challenge.length + password.length + 1]; 170 System.arraycopy(challenge, 0, digest, 0, challenge.length) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 51 String challenge; field in class:NetscapeCertRequest 95 // challenge IA5STRING 106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); 129 String challenge, 135 this.challenge = challenge; 142 content_der.add(new DERIA5String(challenge)); 156 return challenge; 161 challenge = value; 194 public boolean verify(String challenge) throws NoSuchAlgorithmException [all...] |
/external/boringssl/src/crypto/x509/ |
x_spki.c | 69 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
ChallengeParser.java | 33 * Parser for the challenge portion of the authentication header. 47 * @param String challenge message to parse to set 49 protected ChallengeParser(String challenge) { 50 super(challenge); 55 * @param String challenge message to parse to set 62 * Get the parameter of the challenge string
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
AuthenticatorAdapter.java | 19 import com.squareup.okhttp.Challenge; 38 List<Challenge> challenges = response.challenges(); 42 Challenge challenge = challenges.get(i); local 43 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; 47 challenge.getRealm(), challenge.getScheme(), url.url(), RequestorType.SERVER); 60 List<Challenge> challenges = response.challenges(); 64 Challenge challenge = challenges.get(i) local [all...] |
/frameworks/base/core/java/android/service/gatekeeper/ |
IGateKeeperService.aidl | 57 * @param challenge a challenge to authenticate agaisnt the device credential. If successful 65 GateKeeperResponse verifyChallenge(int uid, long challenge, in byte[] enrolledPasswordHandle,
|
/external/webrtc/webrtc/libjingle/xmpp/ |
saslmechanism.h | 37 // Should respond to a SASL "<challenge>" request. Default is 38 // to abort (for mechanisms that do not do challenge-response) 39 virtual XmlElement * HandleSaslChallenge(const XmlElement * challenge);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 34 const u8 *pos, *challenge, *password; local 55 * CHAP Challenge: 56 * Value-Size (1 octet) | Value(Challenge) | Name(optional) 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 69 challenge, challenge_len); 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/packages/apps/Settings/src/com/android/settings/password/ |
ChooseLockSettingsHelper.java | 41 public static final String EXTRA_KEY_CHALLENGE = "challenge"; 160 * @param challenge a challenge to be verified against the device credential. 166 long challenge) { 168 true, false, true, challenge, Utils.getCredentialOwnerUserId(mActivity)); 177 * @param challenge a challenge to be verified against the device credential. 184 long challenge, int userId) { 186 true, false, true, challenge, Utils.enforceSameOwner(mActivity, userId)); 198 * @param challenge a challenge to be verified against the device credential [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 78 * @challenge: 8-octet Challenge (OUT) 82 const u8 *username, size_t username_len, u8 *challenge) 97 os_memcpy(challenge, hash, 8); 140 * @challenge: 8-octet Challenge (IN) 145 int challenge_response(const u8 *challenge, const u8 *password_hash, 150 if (des_encrypt(challenge, password_hash, response) < 0 || 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) 156 return des_encrypt(challenge, zpwd, response + 16) 176 u8 challenge[8]; local 204 u8 challenge[8]; local 247 u8 password_hash_hash[16], challenge[8]; local [all...] |
ms_funcs.h | 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 34 int challenge_response(const u8 *challenge, const u8 *password_hash, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternChecker.java | 47 * @param attestation The attestation that the challenge was verified, or null. 59 * @param challenge The challenge to verify against the pattern. 65 final long challenge, 82 return utils.verifyPattern(patternCopy, challenge, userId); 150 * @param challenge The challenge to verify against the pattern. 156 final long challenge, 165 return utils.verifyPassword(password, challenge, userId); 186 * @param challenge The challenge to verify against the pattern [all...] |
/device/generic/goldfish/gatekeeper/ |
SoftGateKeeperDevice.h | 66 int verify(uint32_t uid, uint64_t challenge,
|
/device/google/cuttlefish_common/guest/hals/gatekeeper/ |
SoftGateKeeperDevice.h | 66 int verify(uint32_t uid, uint64_t challenge,
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
clientpairingsession.h | 33 // @param challenge the challenge 38 PoloChallengeResponse* challenge,
|