HomeSort by relevance Sort by last modified time
    Searched refs:challenge (Results 1 - 25 of 243) sorted by null

1 2 3 4 5 6 7 8 910

  /external/wpa_supplicant_8/src/eap_common/
chap.c 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
25 addr[2] = challenge;
chap.h 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /frameworks/base/telephony/java/com/android/internal/telephony/euicc/
IGetEuiccChallengeCallback.aidl 20 void onComplete(int resultCode, in byte[] challenge);
  /external/ppp/pppd/
chap-md5.c 59 unsigned char *challenge, unsigned char *response,
67 challenge_len = *challenge++;
70 /* Generate hash of ID, secret, challenge */
74 MD5_Update(&ctx, challenge, challenge_len);
89 unsigned char *challenge, char *secret, int secret_len,
94 int challenge_len = *challenge++;
99 MD5_Update(&ctx, challenge, challenge_len);
chap-new.h 52 * Semi-arbitrary limits on challenge and response fields.
97 * Note: challenge and response arguments below are formatted as
98 * a length byte followed by the actual challenge/response data.
100 void (*generate_challenge)(unsigned char *challenge);
103 unsigned char *challenge, unsigned char *response,
106 unsigned char *challenge, char *secret, int secret_len,
114 /* Hook for a plugin to validate CHAP challenge */
117 unsigned char *challenge, unsigned char *response,
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMScheme.java 65 private String challenge; field in class:NTLMScheme
74 this.challenge = null;
98 String challenge = buffer.substringTrimmed(pos, len); local
99 if (challenge.length() == 0) {
105 this.challenge = null;
108 this.challenge = challenge;
135 this.challenge);
NTLMEngine.java 36 * Type2 challenge.
64 * authentication challenge.
70 * @param challenge Type2 challenge.
79 String challenge) throws NTLMEngineException;
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/pdist/
security.py 28 def _compare_challenge_response(self, challenge, response):
29 return self._encode_challenge(challenge) == response
31 def _encode_challenge(self, challenge):
33 return pow(long(challenge), p, m)
  /external/python/cpython2/Demo/pdist/
security.py 28 def _compare_challenge_response(self, challenge, response):
29 return self._encode_challenge(challenge) == response
31 def _encode_challenge(self, challenge):
33 return pow(long(challenge), p, m)
  /hardware/libhardware/include/hardware/
hw_auth_token.h 41 uint64_t challenge; member in struct:__anon48237
  /frameworks/base/obex/javax/obex/
ObexSession.java 60 * Called when the server received an authentication challenge header. This
61 * will cause the authenticator to handle the authentication challenge.
62 * @param header the header with the authentication challenge
73 * An authentication challenge is made up of one required and two
75 * the authentication challenge and it represents the challenge digest
81 byte[] challenge = ObexHelper.getTagValue((byte)0x00, header.mAuthChall);
156 * will be sent. The second optional tag is 0x02 and is the challenge
169 byte[] digest = new byte[challenge.length + password.length + 1];
170 System.arraycopy(challenge, 0, digest, 0, challenge.length)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
NetscapeCertRequest.java 51 String challenge; field in class:NetscapeCertRequest
95 // challenge IA5STRING
106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString();
129 String challenge,
135 this.challenge = challenge;
142 content_der.add(new DERIA5String(challenge));
156 return challenge;
161 challenge = value;
194 public boolean verify(String challenge) throws NoSuchAlgorithmException
    [all...]
  /external/boringssl/src/crypto/x509/
x_spki.c 69 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
  /external/nist-sip/java/gov/nist/javax/sip/parser/
ChallengeParser.java 33 * Parser for the challenge portion of the authentication header.
47 * @param String challenge message to parse to set
49 protected ChallengeParser(String challenge) {
50 super(challenge);
55 * @param String challenge message to parse to set
62 * Get the parameter of the challenge string
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
AuthenticatorAdapter.java 19 import com.squareup.okhttp.Challenge;
38 List<Challenge> challenges = response.challenges();
42 Challenge challenge = challenges.get(i); local
43 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue;
47 challenge.getRealm(), challenge.getScheme(), url.url(), RequestorType.SERVER);
60 List<Challenge> challenges = response.challenges();
64 Challenge challenge = challenges.get(i) local
    [all...]
  /frameworks/base/core/java/android/service/gatekeeper/
IGateKeeperService.aidl 57 * @param challenge a challenge to authenticate agaisnt the device credential. If successful
65 GateKeeperResponse verifyChallenge(int uid, long challenge, in byte[] enrolledPasswordHandle,
  /external/webrtc/webrtc/libjingle/xmpp/
saslmechanism.h 37 // Should respond to a SASL "<challenge>" request. Default is
38 // to abort (for mechanisms that do not do challenge-response)
39 virtual XmlElement * HandleSaslChallenge(const XmlElement * challenge);
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 34 const u8 *pos, *challenge, *password; local
55 * CHAP Challenge:
56 * Value-Size (1 octet) | Value(Challenge) | Name(optional)
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
69 challenge, challenge_len);
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
  /packages/apps/Settings/src/com/android/settings/password/
ChooseLockSettingsHelper.java 41 public static final String EXTRA_KEY_CHALLENGE = "challenge";
160 * @param challenge a challenge to be verified against the device credential.
166 long challenge) {
168 true, false, true, challenge, Utils.getCredentialOwnerUserId(mActivity));
177 * @param challenge a challenge to be verified against the device credential.
184 long challenge, int userId) {
186 true, false, true, challenge, Utils.enforceSameOwner(mActivity, userId));
198 * @param challenge a challenge to be verified against the device credential
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.c 78 * @challenge: 8-octet Challenge (OUT)
82 const u8 *username, size_t username_len, u8 *challenge)
97 os_memcpy(challenge, hash, 8);
140 * @challenge: 8-octet Challenge (IN)
145 int challenge_response(const u8 *challenge, const u8 *password_hash,
150 if (des_encrypt(challenge, password_hash, response) < 0 ||
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0)
156 return des_encrypt(challenge, zpwd, response + 16)
176 u8 challenge[8]; local
204 u8 challenge[8]; local
247 u8 password_hash_hash[16], challenge[8]; local
    [all...]
ms_funcs.h 31 int nt_challenge_response(const u8 *challenge, const u8 *password,
34 int challenge_response(const u8 *challenge, const u8 *password_hash,
37 const u8 *username, size_t username_len, u8 *challenge);
  /frameworks/base/core/java/com/android/internal/widget/
LockPatternChecker.java 47 * @param attestation The attestation that the challenge was verified, or null.
59 * @param challenge The challenge to verify against the pattern.
65 final long challenge,
82 return utils.verifyPattern(patternCopy, challenge, userId);
150 * @param challenge The challenge to verify against the pattern.
156 final long challenge,
165 return utils.verifyPassword(password, challenge, userId);
186 * @param challenge The challenge to verify against the pattern
    [all...]
  /device/generic/goldfish/gatekeeper/
SoftGateKeeperDevice.h 66 int verify(uint32_t uid, uint64_t challenge,
  /device/google/cuttlefish_common/guest/hals/gatekeeper/
SoftGateKeeperDevice.h 66 int verify(uint32_t uid, uint64_t challenge,
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
clientpairingsession.h 33 // @param challenge the challenge
38 PoloChallengeResponse* challenge,

Completed in 2710 milliseconds

1 2 3 4 5 6 7 8 910