HomeSort by relevance Sort by last modified time
    Searched refs:challenge (Results 26 - 50 of 243) sorted by null

12 3 4 5 6 7 8 910

  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
serverpairingsession.h 33 // @param challenge the challenge response
37 PoloChallengeResponse* challenge,
pairingsession.cc 26 PoloChallengeResponse* challenge)
30 challenge_(challenge),
98 if (!challenge().CheckGamma(secret)) {
103 nonce_ = challenge().ExtractNonce(secret);
109 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_);
162 const Gamma* gamma = challenge().GetGamma(*nonce_);
230 const Alpha* alpha = challenge().GetAlpha(*nonce_);
267 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_);
pairingsession.h 45 // Waiting for the secret challenge messsage or response from the peer.
61 PoloChallengeResponse* challenge);
83 // Gets the encoder used for encoding and decoding the secret challenge. This
157 // Gets the challenge response.
158 const PoloChallengeResponse& challenge() const { return *challenge_; } function in class:polo::pairing::PairingSession
serverpairingsession.cc 26 PoloChallengeResponse* challenge,
28 : PairingSession(wire, context, challenge),
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
AuthenticationHelper.java 30 * the specified Response (Challenge) and appends it to the challenged
35 * @param challenge
36 * the 401/407 challenge response
55 public abstract ClientTransaction handleChallenge(Response challenge,
  /external/nos/host/generic/nugget/proto/nugget/app/keymaster/
keymaster_types.proto 63 uint64 challenge = 1;
72 uint64 challenge = 1;
  /system/core/gatekeeperd/
SoftGateKeeperDevice.h 66 int verify(uint32_t uid, uint64_t challenge,
  /external/ppp/pppd/
chap_ms.c 154 { "mschap-challenge", o_string, &mschap_challenge,
155 "specify CHAP challenge" },
156 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
157 "specify CHAP peer challenge" },
163 * chapms_generate_challenge - generate a challenge for MS-CHAP.
164 * For MS-CHAP the challenge length is fixed at 8 bytes.
165 * The length goes in challenge[0] and the actual challenge starts
166 * at challenge[1].
169 chapms_generate_challenge(unsigned char *challenge)
329 unsigned char challenge[16]; member in struct:chapms2_response_cache_entry
    [all...]
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
FakeGateKeeperService.java 61 public long challenge; field in class:FakeGateKeeperService.AuthToken
64 public AuthToken(long challenge, long sid) {
65 this.challenge = challenge;
74 challenge = buffer.getLong();
81 buffer.putLong(challenge);
124 public GateKeeperResponse verifyChallenge(int uid, long challenge,
136 AuthToken token = new AuthToken(challenge, handle.sid);
  /hardware/interfaces/gatekeeper/1.0/
IGatekeeper.hal 69 * @param challenge An optional challenge to authenticate against, or 0.
89 verify(uint32_t uid, uint64_t challenge,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_md5.c 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
  /external/ppp/pppd/plugins/
winbind.c 100 unsigned char *challenge,
245 const u_char *challenge,
355 sprintf(challenge_hex + i * 2, "%02X", challenge[i]);
357 fprintf(pipe_in, "LANMAN-Challenge: %s\n", challenge_hex);
513 unsigned char *challenge,
525 challenge_len = *challenge++;
580 challenge, challenge_len,
585 mppe_set_keys(challenge, session_key);
595 challenge_len, challenge);
603 u_char Challenge[8]
    [all...]
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
KeySyncUtilsTest.java 226 byte[] challenge = randomBytes(32);
232 challenge,
239 /*header=*/ KeySyncUtils.concat(RECOVERY_CLAIM_HEADER, vaultParams, challenge),
253 /*challenge=*/ randomBytes(32),
264 fail("Should throw if challenge is incorrect.");
273 byte[] challenge = randomBytes(32);
279 challenge,
288 RECOVERY_CLAIM_HEADER, vaultParams, challenge),
300 byte[] challenge = randomBytes(32);
305 challenge,
    [all...]
  /external/syslinux/core/lwip/src/netif/ppp/
chap.h 2 * chap.h - Network Challenge Handshake Authentication Protocol header file.
34 * chap.h - Challenge Handshake Authentication Protocol definitions.
89 * Challenge lengths (for challenges we send) and other limits.
103 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state
104 u_char chal_len; /* challenge length */
105 u_char chal_id; /* ID of last challenge */
108 char *chal_name; /* Our name to use with challenge */
109 int chal_interval; /* Time until we challenge peer again */
111 int max_transmits; /* Maximum # of challenge transmissions *
    [all...]
chpms.c 6 * chpms.c - Network MicroSoft Challenge Handshake Authentication Protocol program file.
126 u_char *challenge, /* IN 8 octets */
143 ChallengeResponse( u_char *challenge, /* IN 8 octets */
156 DesEncrypt(challenge, ZPasswordHash + 0, response + 0);
157 DesEncrypt(challenge, ZPasswordHash + 7, response + 8);
158 DesEncrypt(challenge, ZPasswordHash + 14, response + 16);
  /external/webrtc/webrtc/libjingle/xmpp/
saslmechanism.cc 26 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) {
  /hardware/interfaces/keymaster/4.0/support/
keymaster_utils.cpp 58 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) +
68 pos = copy_bytes_to_iterator(token.challenge, pos);
86 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) +
96 pos = copy_bytes_from_iterator(&token.challenge, pos);
  /packages/apps/Settings/src/com/android/settings/password/
SaveChosenLockWorkerBase.java 30 * verifies if a challenge is given) the chosen lock credential (pattern/pin/password).
64 boolean hasChallenge, long challenge, int userId) {
69 mChallenge = challenge;
94 * @return Intent with challenge token or null.
  /system/core/trusty/gatekeeper/
trusty_gatekeeper.h 61 int Verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle,
112 static int verify(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
  /hardware/interfaces/gatekeeper/1.0/vts/functional/
VtsHalGatekeeperV1_0TargetTest.cpp 49 uint64_t challenge; member in struct:GatekeeperRequest
53 GatekeeperRequest() : uid(0), challenge(0) {}
115 uid_, req.challenge, req.curPwdHandle, req.newPwd,
162 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge,
170 EXPECT_EQ(challenge, auth_token->challenge);
186 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge,
194 verifyReq.challenge = challenge;
196 checkVerify(verifyRsp, challenge, expectSuccess)
    [all...]
  /system/gatekeeper/
gatekeeper_messages.cpp 132 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge,
135 this->challenge = challenge;
159 return sizeof(challenge) + serialized_buffer_size(password_handle)
164 memcpy(buffer, &challenge, sizeof(challenge));
165 buffer += sizeof(challenge);
182 memcpy(&challenge, payload, sizeof(challenge));
183 payload += sizeof(challenge);
    [all...]
  /system/keymaster/tests/
keymaster_enforcement_test.cpp 538 begin_params, 0 /* challenge */, true /* is_begin_operation */));
541 begin_params, 0 /* challenge */, true /* is_begin_operation */));
544 begin_params, 0 /* challenge */,
548 begin_params, 0 /* challenge */, true /* is_begin_operation */));
577 token.challenge = 99;
593 op_params, token.challenge, false /* is_begin_operation */));
600 token.challenge = 99;
618 op_params, token.challenge, false /* is_begin_operation */));
622 op_params, token.challenge, false /* is_begin_operation */));
629 token.challenge = 99
    [all...]
  /external/mtpd/
l2tp.c 73 #define CHALLENGE htons(11)
107 static uint8_t challenge[CHALLENGE_SIZE]; variable
335 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) {
341 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE);
374 static uint8_t *compute_response(uint8_t type, void *challenge, int size)
381 MD5_Update(&ctx, challenge, size);
394 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE),
403 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local
404 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE)
    [all...]
  /device/generic/goldfish/gatekeeper/
SoftGateKeeperDevice.cpp 77 uint64_t challenge, const uint8_t *enrolled_password_handle,
93 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer);
module.cpp 58 static int verify(const struct gatekeeper_device *dev __unused, uint32_t uid, uint64_t challenge,
65 return s_gatekeeper->verify(uid, challenge,

Completed in 321 milliseconds

12 3 4 5 6 7 8 910