HomeSort by relevance Sort by last modified time
    Searched defs:challenge (Results 26 - 50 of 105) sorted by null

12 3 4 5

  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state;
65 data->state = CHALLENGE;
132 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge",
223 case CHALLENGE:
254 if (data->state == CHALLENGE &&
323 "Peer-Challenge");
326 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge",
340 * challenge-response calculation, so remove domain prefix
364 u8 challenge[8]; local
367 username, username_len, challenge) == 0)
    [all...]
  /packages/apps/Dialer/java/com/android/voicemail/impl/mail/store/
ImapConnection.java 235 // The server will issue us a challenge, asking to run MD5 on the nonce with our password
245 Map<String, String> challenge = DigestMd5Utils.parseDigestMessage(decodedChallenge); local
246 DigestMd5Utils.Data data = new DigestMd5Utils.Data(imapStore, transport, challenge);
249 // Respond to the challenge. If the server accepts it, it will reply a response-auth which
  /device/generic/goldfish/fingerprint/
fingerprint.c 82 uint64_t challenge; member in struct:qemu_fingerprint_device_t
322 if (hat->challenge == dev->challenge) {
335 if (hat->challenge != dev->challenge && !(hat->authenticator_type & HW_AUTH_FINGERPRINT)) {
362 uint64_t challenge = 0; local
365 // The challenge will typically be a cryptographically-secure key
368 challenge = get_64bit_rand();
371 qdev->challenge = challenge;
    [all...]
  /external/mtpd/
l2tp.c 73 #define CHALLENGE htons(11)
107 static uint8_t challenge[CHALLENGE_SIZE]; variable
335 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) {
341 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE);
374 static uint8_t *compute_response(uint8_t type, void *challenge, int size)
381 MD5_Update(&ctx, challenge, size);
394 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE),
403 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local
404 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE)
    [all...]
  /packages/apps/Settings/src/com/android/settings/password/
ConfirmLockPassword.java 363 long challenge = getActivity().getIntent().getLongExtra( local
387 mLockPatternUtils, pin, challenge, localUserId, onVerifyCallback)
389 mLockPatternUtils, pin, false, challenge, localUserId,
  /external/apache-http/src/org/apache/http/impl/client/
DefaultRequestDirector.java 1077 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local
    [all...]
  /external/curl/lib/
smb.h 38 unsigned char challenge[8]; member in struct:smb_conn
  /external/robolectric/v1/src/main/java/com/xtremelabs/robolectric/tester/org/apache/http/impl/client/
DefaultRequestDirector.java 1107 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local
    [all...]
  /external/robolectric-shadows/shadows/httpclient/src/main/java/org/robolectric/shadows/httpclient/
DefaultRequestDirector.java 1125 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local
    [all...]
  /external/webrtc/webrtc/base/
httpcommon.cc 745 const char * challenge, size_t len,
752 challenge = DIGEST_CHALLENGE;
753 len = strlen(challenge);
757 HttpParseAttributes(challenge, len, args);
923 std::string challenge, decoded_challenge; local
924 if (HttpHasNthAttribute(args, 1, &challenge, NULL)
925 && Base64::Decode(challenge, Base64::DO_STRICT,
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.h 29 const u8 *challenge; member in struct:ieee802_11_elems
  /external/libvncserver/libvncclient/
rfbproto.c 642 uint8_t challenge[CHALLENGESIZE]; local
646 if (!ReadFromRFBServer(client, (char *)challenge, CHALLENGESIZE)) return FALSE;
660 rfbClientEncryptBytes(challenge, passwd);
668 if (!WriteToRFBServer(client, (char *)challenge, CHALLENGESIZE)) return FALSE;
    [all...]
  /external/mdnsresponder/mDNSShared/
dnsextd.c 2208 PktMsg challenge; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 221 u16 auth_transaction, const u8 *challenge,
230 if (!sta->challenge) {
231 /* Generate a pseudo-random challenge */
234 sta->challenge = os_zalloc(WLAN_AUTH_CHALLENGE_LEN);
235 if (sta->challenge == NULL)
239 os_free(sta->challenge);
240 sta->challenge = NULL;
245 sta->challenge, WLAN_AUTH_CHALLENGE_LEN);
254 if (!iswep || !sta->challenge || !challenge ||
1632 const u8 *challenge = NULL; local
    [all...]
sta_info.h 149 u8 *challenge; /* IEEE 802.11 Shared Key Authentication Challenge */ member in struct:sta_info
  /packages/apps/Settings/src/com/android/settings/fingerprint/
FingerprintSettings.java 625 long challenge = mFingerprintManager.preEnroll(); local
629 null, null, challenge, mUserId)) {
637 intent.putExtra(ChooseLockSettingsHelper.EXTRA_KEY_CHALLENGE, challenge);
    [all...]
  /external/boringssl/src/include/openssl/
x509.h 485 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member in struct:Netscape_spkac_st
490 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
    [all...]
  /external/tcpdump/
print-802_11.c 283 struct challenge_t challenge; member in struct:mgmt_body_t
852 "Authentication rejected because of challenge failure", /* 15 */
1004 struct challenge_t challenge; local
1060 memcpy(&challenge, p + offset, 2);
1063 if (challenge.length != 0) {
1064 if (challenge.length >
1065 sizeof(challenge.text) - 1)
1067 memcpy(&challenge.text, p + offset,
1068 challenge.length);
1069 offset += challenge.length
    [all...]
  /prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.2.1/
httpclient-4.2.1.jar 
  /prebuilts/devtools/tools/lib/
httpclient-4.1.1.jar 
  /prebuilts/tools/common/http-client/
httpclient-4.1.1.jar 
  /prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.1.1/
httpclient-4.1.1.jar 
  /prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.2.6/
httpclient-4.2.6.jar 
  /prebuilts/tools/common/offline-m2/org/apache/httpcomponents/httpclient/4.1.1/
httpclient-4.1.1.jar 
  /external/robolectric/v3/
shadows-httpclient-3.1-SNAPSHOT.jar 

Completed in 395 milliseconds

12 3 4 5