/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
serverpairingsession.h | 33 // @param challenge the challenge response 37 PoloChallengeResponse* challenge,
|
pairingsession.cc | 26 PoloChallengeResponse* challenge) 30 challenge_(challenge), 98 if (!challenge().CheckGamma(secret)) { 103 nonce_ = challenge().ExtractNonce(secret); 109 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_); 162 const Gamma* gamma = challenge().GetGamma(*nonce_); 230 const Alpha* alpha = challenge().GetAlpha(*nonce_); 267 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_);
|
pairingsession.h | 45 // Waiting for the secret challenge messsage or response from the peer. 61 PoloChallengeResponse* challenge); 83 // Gets the encoder used for encoding and decoding the secret challenge. This 157 // Gets the challenge response. 158 const PoloChallengeResponse& challenge() const { return *challenge_; } function in class:polo::pairing::PairingSession
|
serverpairingsession.cc | 26 PoloChallengeResponse* challenge, 28 : PairingSession(wire, context, challenge),
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
AuthenticationHelper.java | 30 * the specified Response (Challenge) and appends it to the challenged 35 * @param challenge 36 * the 401/407 challenge response 55 public abstract ClientTransaction handleChallenge(Response challenge,
|
/external/nos/host/generic/nugget/proto/nugget/app/keymaster/ |
keymaster_types.proto | 63 uint64 challenge = 1; 72 uint64 challenge = 1;
|
/system/core/gatekeeperd/ |
SoftGateKeeperDevice.h | 66 int verify(uint32_t uid, uint64_t challenge,
|
/external/ppp/pppd/ |
chap_ms.c | 154 { "mschap-challenge", o_string, &mschap_challenge, 155 "specify CHAP challenge" }, 156 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 157 "specify CHAP peer challenge" }, 163 * chapms_generate_challenge - generate a challenge for MS-CHAP. 164 * For MS-CHAP the challenge length is fixed at 8 bytes. 165 * The length goes in challenge[0] and the actual challenge starts 166 * at challenge[1]. 169 chapms_generate_challenge(unsigned char *challenge) 329 unsigned char challenge[16]; member in struct:chapms2_response_cache_entry [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
FakeGateKeeperService.java | 61 public long challenge; field in class:FakeGateKeeperService.AuthToken 64 public AuthToken(long challenge, long sid) { 65 this.challenge = challenge; 74 challenge = buffer.getLong(); 81 buffer.putLong(challenge); 124 public GateKeeperResponse verifyChallenge(int uid, long challenge, 136 AuthToken token = new AuthToken(challenge, handle.sid);
|
/hardware/interfaces/gatekeeper/1.0/ |
IGatekeeper.hal | 69 * @param challenge An optional challenge to authenticate against, or 0. 89 verify(uint32_t uid, uint64_t challenge,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/external/ppp/pppd/plugins/ |
winbind.c | 100 unsigned char *challenge, 245 const u_char *challenge, 355 sprintf(challenge_hex + i * 2, "%02X", challenge[i]); 357 fprintf(pipe_in, "LANMAN-Challenge: %s\n", challenge_hex); 513 unsigned char *challenge, 525 challenge_len = *challenge++; 580 challenge, challenge_len, 585 mppe_set_keys(challenge, session_key); 595 challenge_len, challenge); 603 u_char Challenge[8] [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
KeySyncUtilsTest.java | 226 byte[] challenge = randomBytes(32); 232 challenge, 239 /*header=*/ KeySyncUtils.concat(RECOVERY_CLAIM_HEADER, vaultParams, challenge), 253 /*challenge=*/ randomBytes(32), 264 fail("Should throw if challenge is incorrect."); 273 byte[] challenge = randomBytes(32); 279 challenge, 288 RECOVERY_CLAIM_HEADER, vaultParams, challenge), 300 byte[] challenge = randomBytes(32); 305 challenge, [all...] |
/external/syslinux/core/lwip/src/netif/ppp/ |
chap.h | 2 * chap.h - Network Challenge Handshake Authentication Protocol header file. 34 * chap.h - Challenge Handshake Authentication Protocol definitions. 89 * Challenge lengths (for challenges we send) and other limits. 103 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state 104 u_char chal_len; /* challenge length */ 105 u_char chal_id; /* ID of last challenge */ 108 char *chal_name; /* Our name to use with challenge */ 109 int chal_interval; /* Time until we challenge peer again */ 111 int max_transmits; /* Maximum # of challenge transmissions * [all...] |
chpms.c | 6 * chpms.c - Network MicroSoft Challenge Handshake Authentication Protocol program file. 126 u_char *challenge, /* IN 8 octets */ 143 ChallengeResponse( u_char *challenge, /* IN 8 octets */ 156 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); 157 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); 158 DesEncrypt(challenge, ZPasswordHash + 14, response + 16);
|
/external/webrtc/webrtc/libjingle/xmpp/ |
saslmechanism.cc | 26 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) {
|
/hardware/interfaces/keymaster/4.0/support/ |
keymaster_utils.cpp | 58 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + 68 pos = copy_bytes_to_iterator(token.challenge, pos); 86 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) + 96 pos = copy_bytes_from_iterator(&token.challenge, pos);
|
/packages/apps/Settings/src/com/android/settings/password/ |
SaveChosenLockWorkerBase.java | 30 * verifies if a challenge is given) the chosen lock credential (pattern/pin/password). 64 boolean hasChallenge, long challenge, int userId) { 69 mChallenge = challenge; 94 * @return Intent with challenge token or null.
|
/system/core/trusty/gatekeeper/ |
trusty_gatekeeper.h | 61 int Verify(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, 112 static int verify(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
|
/hardware/interfaces/gatekeeper/1.0/vts/functional/ |
VtsHalGatekeeperV1_0TargetTest.cpp | 49 uint64_t challenge; member in struct:GatekeeperRequest 53 GatekeeperRequest() : uid(0), challenge(0) {} 115 uid_, req.challenge, req.curPwdHandle, req.newPwd, 162 void checkVerify(GatekeeperResponse &rsp, uint64_t challenge, 170 EXPECT_EQ(challenge, auth_token->challenge); 186 hidl_vec<uint8_t> &passwordHandle, uint64_t challenge, 194 verifyReq.challenge = challenge; 196 checkVerify(verifyRsp, challenge, expectSuccess) [all...] |
/system/gatekeeper/ |
gatekeeper_messages.cpp | 132 VerifyRequest::VerifyRequest(uint32_t user_id, uint64_t challenge, 135 this->challenge = challenge; 159 return sizeof(challenge) + serialized_buffer_size(password_handle) 164 memcpy(buffer, &challenge, sizeof(challenge)); 165 buffer += sizeof(challenge); 182 memcpy(&challenge, payload, sizeof(challenge)); 183 payload += sizeof(challenge); [all...] |
/system/keymaster/tests/ |
keymaster_enforcement_test.cpp | 538 begin_params, 0 /* challenge */, true /* is_begin_operation */)); 541 begin_params, 0 /* challenge */, true /* is_begin_operation */)); 544 begin_params, 0 /* challenge */, 548 begin_params, 0 /* challenge */, true /* is_begin_operation */)); 577 token.challenge = 99; 593 op_params, token.challenge, false /* is_begin_operation */)); 600 token.challenge = 99; 618 op_params, token.challenge, false /* is_begin_operation */)); 622 op_params, token.challenge, false /* is_begin_operation */)); 629 token.challenge = 99 [all...] |
/external/mtpd/ |
l2tp.c | 73 #define CHALLENGE htons(11) 107 static uint8_t challenge[CHALLENGE_SIZE]; variable 335 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) { 341 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); 374 static uint8_t *compute_response(uint8_t type, void *challenge, int size) 381 MD5_Update(&ctx, challenge, size); 394 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE), 403 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local 404 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE) [all...] |
/device/generic/goldfish/gatekeeper/ |
SoftGateKeeperDevice.cpp | 77 uint64_t challenge, const uint8_t *enrolled_password_handle, 93 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer);
|
module.cpp | 58 static int verify(const struct gatekeeper_device *dev __unused, uint32_t uid, uint64_t challenge, 65 return s_gatekeeper->verify(uid, challenge,
|