/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state; 65 data->state = CHALLENGE; 132 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 223 case CHALLENGE: 254 if (data->state == CHALLENGE && 323 "Peer-Challenge"); 326 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 340 * challenge-response calculation, so remove domain prefix 364 u8 challenge[8]; local 367 username, username_len, challenge) == 0) [all...] |
/packages/apps/Dialer/java/com/android/voicemail/impl/mail/store/ |
ImapConnection.java | 235 // The server will issue us a challenge, asking to run MD5 on the nonce with our password 245 Map<String, String> challenge = DigestMd5Utils.parseDigestMessage(decodedChallenge); local 246 DigestMd5Utils.Data data = new DigestMd5Utils.Data(imapStore, transport, challenge); 249 // Respond to the challenge. If the server accepts it, it will reply a response-auth which
|
/device/generic/goldfish/fingerprint/ |
fingerprint.c | 82 uint64_t challenge; member in struct:qemu_fingerprint_device_t 322 if (hat->challenge == dev->challenge) { 335 if (hat->challenge != dev->challenge && !(hat->authenticator_type & HW_AUTH_FINGERPRINT)) { 362 uint64_t challenge = 0; local 365 // The challenge will typically be a cryptographically-secure key 368 challenge = get_64bit_rand(); 371 qdev->challenge = challenge; [all...] |
/external/mtpd/ |
l2tp.c | 73 #define CHALLENGE htons(11) 107 static uint8_t challenge[CHALLENGE_SIZE]; variable 335 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) { 341 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); 374 static uint8_t *compute_response(uint8_t type, void *challenge, int size) 381 MD5_Update(&ctx, challenge, size); 394 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE), 403 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local 404 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE) [all...] |
/packages/apps/Settings/src/com/android/settings/password/ |
ConfirmLockPassword.java | 363 long challenge = getActivity().getIntent().getLongExtra( local 387 mLockPatternUtils, pin, challenge, localUserId, onVerifyCallback) 389 mLockPatternUtils, pin, false, challenge, localUserId,
|
/external/apache-http/src/org/apache/http/impl/client/ |
DefaultRequestDirector.java | 1077 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local [all...] |
/external/curl/lib/ |
smb.h | 38 unsigned char challenge[8]; member in struct:smb_conn
|
/external/robolectric/v1/src/main/java/com/xtremelabs/robolectric/tester/org/apache/http/impl/client/ |
DefaultRequestDirector.java | 1107 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local [all...] |
/external/robolectric-shadows/shadows/httpclient/src/main/java/org/robolectric/shadows/httpclient/ |
DefaultRequestDirector.java | 1125 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local [all...] |
/external/webrtc/webrtc/base/ |
httpcommon.cc | 745 const char * challenge, size_t len, 752 challenge = DIGEST_CHALLENGE; 753 len = strlen(challenge); 757 HttpParseAttributes(challenge, len, args); 923 std::string challenge, decoded_challenge; local 924 if (HttpHasNthAttribute(args, 1, &challenge, NULL) 925 && Base64::Decode(challenge, Base64::DO_STRICT,
|
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.h | 29 const u8 *challenge; member in struct:ieee802_11_elems
|
/external/libvncserver/libvncclient/ |
rfbproto.c | 642 uint8_t challenge[CHALLENGESIZE]; local 646 if (!ReadFromRFBServer(client, (char *)challenge, CHALLENGESIZE)) return FALSE; 660 rfbClientEncryptBytes(challenge, passwd); 668 if (!WriteToRFBServer(client, (char *)challenge, CHALLENGESIZE)) return FALSE; [all...] |
/external/mdnsresponder/mDNSShared/ |
dnsextd.c | 2208 PktMsg challenge; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 221 u16 auth_transaction, const u8 *challenge, 230 if (!sta->challenge) { 231 /* Generate a pseudo-random challenge */ 234 sta->challenge = os_zalloc(WLAN_AUTH_CHALLENGE_LEN); 235 if (sta->challenge == NULL) 239 os_free(sta->challenge); 240 sta->challenge = NULL; 245 sta->challenge, WLAN_AUTH_CHALLENGE_LEN); 254 if (!iswep || !sta->challenge || !challenge || 1632 const u8 *challenge = NULL; local [all...] |
sta_info.h | 149 u8 *challenge; /* IEEE 802.11 Shared Key Authentication Challenge */ member in struct:sta_info
|
/packages/apps/Settings/src/com/android/settings/fingerprint/ |
FingerprintSettings.java | 625 long challenge = mFingerprintManager.preEnroll(); local 629 null, null, challenge, mUserId)) { 637 intent.putExtra(ChooseLockSettingsHelper.EXTRA_KEY_CHALLENGE, challenge); [all...] |
/external/boringssl/src/include/openssl/ |
x509.h | 485 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member in struct:Netscape_spkac_st 490 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ [all...] |
/external/tcpdump/ |
print-802_11.c | 283 struct challenge_t challenge; member in struct:mgmt_body_t 852 "Authentication rejected because of challenge failure", /* 15 */ 1004 struct challenge_t challenge; local 1060 memcpy(&challenge, p + offset, 2); 1063 if (challenge.length != 0) { 1064 if (challenge.length > 1065 sizeof(challenge.text) - 1) 1067 memcpy(&challenge.text, p + offset, 1068 challenge.length); 1069 offset += challenge.length [all...] |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.2.1/ |
httpclient-4.2.1.jar | |
/prebuilts/devtools/tools/lib/ |
httpclient-4.1.1.jar | |
/prebuilts/tools/common/http-client/ |
httpclient-4.1.1.jar | |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.1.1/ |
httpclient-4.1.1.jar | |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.2.6/ |
httpclient-4.2.6.jar | |
/prebuilts/tools/common/offline-m2/org/apache/httpcomponents/httpclient/4.1.1/ |
httpclient-4.1.1.jar | |
/external/robolectric/v3/ |
shadows-httpclient-3.1-SNAPSHOT.jar | |