Searched defs:response (Results 1 - 25 of 710) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.c143 * @response: 24-octet Response (OUT)
146 u8 *response)
149 des_encrypt(challenge, password_hash, response);
150 des_encrypt(challenge, password_hash + 7, response + 8);
154 des_encrypt(challenge, zpwd, response + 16);
166 * @response: 24-octet Response (OUT)
172 u8 *response)
182 challenge_response(challenge, password_hash, response);
194 * @response: 24-octet Response (OUT)
201 u8 *response)
145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c16 size_t challenge_len, u8 *response)
27 return md5_vector(3, addr, len, response);
15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ttls.c589 u8 *response, size_t response_len)
593 if (challenge == NULL || response == NULL ||
597 "attributes (challenge len %lu response len %lu)",
623 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
637 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
638 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
643 response + 2 + 24, 24);
655 u8 *response, size_t response_len)
661 if (challenge == NULL || response == NULL ||
665 "attributes (challenge len %lu response le
586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
651 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.c143 * @response: 24-octet Response (OUT)
146 u8 *response)
149 des_encrypt(challenge, password_hash, response);
150 des_encrypt(challenge, password_hash + 7, response + 8);
154 des_encrypt(challenge, zpwd, response + 16);
166 * @response: 24-octet Response (OUT)
172 u8 *response)
182 challenge_response(challenge, password_hash, response);
194 * @response: 24-octet Response (OUT)
201 u8 *response)
145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c16 size_t challenge_len, u8 *response)
27 return md5_vector(3, addr, len, response);
15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_ttls.c589 u8 *response, size_t response_len)
593 if (challenge == NULL || response == NULL ||
597 "attributes (challenge len %lu response len %lu)",
623 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
637 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
638 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
643 response + 2 + 24, 24);
655 u8 *response, size_t response_len)
661 if (challenge == NULL || response == NULL ||
665 "attributes (challenge len %lu response le
586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
651 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.c143 * @response: 24-octet Response (OUT)
146 u8 *response)
149 des_encrypt(challenge, password_hash, response);
150 des_encrypt(challenge, password_hash + 7, response + 8);
154 des_encrypt(challenge, zpwd, response + 16);
166 * @response: 24-octet Response (OUT)
172 u8 *response)
182 challenge_response(challenge, password_hash, response);
194 * @response: 24-octet Response (OUT)
201 u8 *response)
145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c16 size_t challenge_len, u8 *response)
27 return md5_vector(3, addr, len, response);
15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c589 u8 *response, size_t response_len)
593 if (challenge == NULL || response == NULL ||
597 "attributes (challenge len %lu response len %lu)",
623 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
637 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
638 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
643 response + 2 + 24, 24);
655 u8 *response, size_t response_len)
661 if (challenge == NULL || response == NULL ||
665 "attributes (challenge len %lu response le
586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
651 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
/external/tcpdump/
H A Dprint-lwres.c67 #define LWRES_LWPACKETFLAG_RESPONSE 0x0001U /* if set, pkt is a response */
303 int response; local
319 response = EXTRACT_16BITS(&np->pktflags) & LWRES_LWPACKETFLAG_RESPONSE;
324 printf(" %s%s", s, response ? "" : "?");
346 if (!response) {
H A Dprint-smb.c1093 int name_trn_id, response, opcode, nm_flags, rcode; local
1101 response = (data[2] >> 7);
1130 if (response) {
1137 if (response)
/external/strace/linux/
H A Dfanotify.h73 * All events which require a permission response from userspace
96 __u32 response; member in struct:fanotify_response
/external/smack/asmack-master/lib/
H A Dhttpclient-4.1.3.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/cookie/ ...
H A Dhttpcore-4.1.4.jar ... protocol.HttpContext) org.apache.http.HttpResponse response org.apache.http.protocol.HttpContext context ...
/external/smack/src/com/kenai/jbosh/
H A DBOSHClient.java79 * All incoming messages will be published to all response listeners as they
282 * response acknowledgements.
287 * The highest RID that we've already received a response for. This value
288 * is used to implement response acks.
434 * Adds a response message listener to the session.
436 * @param listener response listener to add, if not already added
447 * Removes a response message listener from the session, if previously
744 * Evaluates the HTTP response code and response message and returns the
747 * @param respCode HTTP response cod
1445 fireResponseReceived(final AbstractBody response) argument
[all...]
H A DHTTPExchange.java26 * A request and response pair representing a single exchange with a remote
28 * the relationship between the request and response but allows the response
50 * Condition used to signal when the response has been set.
57 private HTTPResponse response; field in class:HTTPExchange
63 * Create a new request/response pair object.
94 if (response != null) {
98 response = resp;
113 while (response == null) {
120 return response;
[all...]
/external/smack/src/org/apache/harmony/javax/security/sasl/
H A DSaslServer.java24 byte[] evaluateResponse(byte[] response) throws SaslException; argument
/external/smack/src/org/jivesoftware/smackx/
H A DServiceDiscoveryManager.java44 * <li>Automatic response when this XMPP entity is queried for information.
219 DiscoverItems response = new DiscoverItems();
220 response.setType(IQ.Type.RESULT);
221 response.setTo(discoverItems.getFrom());
222 response.setPacketID(discoverItems.getPacketID());
223 response.setNode(discoverItems.getNode());
231 response.addItems(nodeInformationProvider.getNodeItems());
233 response.addExtensions(nodeInformationProvider.getNodePacketExtensions());
237 response.setType(IQ.Type.ERROR);
238 response
299 addDiscoverInfoTo(DiscoverInfo response) argument
[all...]
/external/smack/src/org/jivesoftware/smackx/commands/
H A DAdHocCommand.java44 * "cancel" action when submitting a stage response indicating that the command
163 * response to the execution of an action. All the notes added here are
198 * response. It could be a form to fill out the information needed to go to
219 * the <code>response</code>. This form must be the answer form of the
224 * @param response the form answer of the previous stage.
227 public abstract void next(Form response) throws XMPPException; argument
231 * <code>response</code>. This form must be the answer form of the
236 * @param response the form answer of the previous stage.
239 public abstract void complete(Form response) throws XMPPException; argument
275 * when creating a response
[all...]
H A DAdHocCommandManager.java382 // Creates the response with the corresponding data
383 AdHocCommandData response = new AdHocCommandData();
384 response.setTo(requestData.getFrom());
385 response.setPacketID(requestData.getPacketID());
386 response.setNode(requestData.getNode());
387 response.setId(requestData.getTo());
398 respondError(response, XMPPError.Condition.item_not_found);
410 response.setType(IQ.Type.RESULT);
411 command.setData(response);
417 respondError(response, XMPPErro
642 respondError(AdHocCommandData response, XMPPError.Condition condition) argument
654 respondError(AdHocCommandData response, XMPPError.Condition condition, AdHocCommand.SpecificErrorCondition specificCondition) argument
668 respondError(AdHocCommandData response, XMPPError error) argument
[all...]
/external/smack/src/org/jivesoftware/smackx/workgroup/ext/macros/
H A DMacro.java33 private String response; field in class:Macro
53 return response;
56 public void setResponse(String response) { argument
57 this.response = response;
/external/smack/src/org/xbill/DNS/
H A DExtendedResolver.java27 Message response; field in class:ExtendedResolver.Resolution
105 * Wait for a successful response or for each
117 /* Return the response or throw an exception */
118 if (response != null)
119 return response;
139 * Receive a response. If the resolution hasn't been completed,
150 response = m;
157 listener.receiveMessage(this, response);
181 * If this is the first response from server n,
202 * Problem with the response; do
[all...]
H A DLookup.java406 processResponse(Name name, SetResponse response) { argument
407 if (response.isSuccessful()) {
408 RRset [] rrsets = response.answers();
422 } else if (response.isNXDOMAIN()) {
429 } else if (response.isNXRRSET()) {
433 } else if (response.isCNAME()) {
434 CNAMERecord cname = response.getCNAME();
436 } else if (response.isDNAME()) {
437 DNAMERecord dname = response.getDNAME();
445 } else if (response
[all...]
H A DSimpleResolver.java195 verifyTSIG(Message query, Message response, byte [] b, TSIG tsig) { argument
198 int error = tsig.verify(response, b, query.getTSIG());
220 * Sends a message to a single server and waits for a response. No checking
221 * is done to ensure that the response is associated with the query.
223 * @return The response.
261 * Check that the response is long enough.
268 * Check that the response ID matches the query ID. We want
270 * if there's a malformed response that's not ours, it
287 Message response = parseMessage(in);
288 verifyTSIG(query, response, i
[all...]
/external/robolectric/lib/main/
H A Dandroid.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ...

Completed in 1431 milliseconds

1234567891011>>