/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 143 * @response: 24-octet Response (OUT) 146 u8 *response) 149 des_encrypt(challenge, password_hash, response); 150 des_encrypt(challenge, password_hash + 7, response + 8); 154 des_encrypt(challenge, zpwd, response + 16); 166 * @response: 24-octet Response (OUT) 172 u8 *response) 182 challenge_response(challenge, password_hash, response); 194 * @response: 24-octet Response (OUT) 201 u8 *response) 145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 16 size_t challenge_len, u8 *response) 27 return md5_vector(3, addr, len, response); 15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 589 u8 *response, size_t response_len) 593 if (challenge == NULL || response == NULL || 597 "attributes (challenge len %lu response len %lu)", 623 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { 637 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { 638 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); 643 response + 2 + 24, 24); 655 u8 *response, size_t response_len) 661 if (challenge == NULL || response == NULL || 665 "attributes (challenge len %lu response le 586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 651 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 143 * @response: 24-octet Response (OUT) 146 u8 *response) 149 des_encrypt(challenge, password_hash, response); 150 des_encrypt(challenge, password_hash + 7, response + 8); 154 des_encrypt(challenge, zpwd, response + 16); 166 * @response: 24-octet Response (OUT) 172 u8 *response) 182 challenge_response(challenge, password_hash, response); 194 * @response: 24-octet Response (OUT) 201 u8 *response) 145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 16 size_t challenge_len, u8 *response) 27 return md5_vector(3, addr, len, response); 15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 589 u8 *response, size_t response_len) 593 if (challenge == NULL || response == NULL || 597 "attributes (challenge len %lu response len %lu)", 623 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { 637 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { 638 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); 643 response + 2 + 24, 24); 655 u8 *response, size_t response_len) 661 if (challenge == NULL || response == NULL || 665 "attributes (challenge len %lu response le 586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 651 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 143 * @response: 24-octet Response (OUT) 146 u8 *response) 149 des_encrypt(challenge, password_hash, response); 150 des_encrypt(challenge, password_hash + 7, response + 8); 154 des_encrypt(challenge, zpwd, response + 16); 166 * @response: 24-octet Response (OUT) 172 u8 *response) 182 challenge_response(challenge, password_hash, response); 194 * @response: 24-octet Response (OUT) 201 u8 *response) 145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 16 size_t challenge_len, u8 *response) 27 return md5_vector(3, addr, len, response); 15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 589 u8 *response, size_t response_len) 593 if (challenge == NULL || response == NULL || 597 "attributes (challenge len %lu response len %lu)", 623 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { 637 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { 638 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); 643 response + 2 + 24, 24); 655 u8 *response, size_t response_len) 661 if (challenge == NULL || response == NULL || 665 "attributes (challenge len %lu response le 586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 651 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument [all...] |
/external/tcpdump/ |
H A D | print-lwres.c | 67 #define LWRES_LWPACKETFLAG_RESPONSE 0x0001U /* if set, pkt is a response */ 303 int response; local 319 response = EXTRACT_16BITS(&np->pktflags) & LWRES_LWPACKETFLAG_RESPONSE; 324 printf(" %s%s", s, response ? "" : "?"); 346 if (!response) {
|
H A D | print-smb.c | 1093 int name_trn_id, response, opcode, nm_flags, rcode; local 1101 response = (data[2] >> 7); 1130 if (response) { 1137 if (response)
|
/external/strace/linux/ |
H A D | fanotify.h | 73 * All events which require a permission response from userspace 96 __u32 response; member in struct:fanotify_response
|
/external/smack/asmack-master/lib/ |
H A D | httpclient-4.1.3.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/cookie/ ... |
H A D | httpcore-4.1.4.jar | ... protocol.HttpContext) org.apache.http.HttpResponse response
org.apache.http.protocol.HttpContext context ... |
/external/smack/src/com/kenai/jbosh/ |
H A D | BOSHClient.java | 79 * All incoming messages will be published to all response listeners as they 282 * response acknowledgements. 287 * The highest RID that we've already received a response for. This value 288 * is used to implement response acks. 434 * Adds a response message listener to the session. 436 * @param listener response listener to add, if not already added 447 * Removes a response message listener from the session, if previously 744 * Evaluates the HTTP response code and response message and returns the 747 * @param respCode HTTP response cod 1445 fireResponseReceived(final AbstractBody response) argument [all...] |
H A D | HTTPExchange.java | 26 * A request and response pair representing a single exchange with a remote 28 * the relationship between the request and response but allows the response 50 * Condition used to signal when the response has been set. 57 private HTTPResponse response; field in class:HTTPExchange 63 * Create a new request/response pair object. 94 if (response != null) { 98 response = resp; 113 while (response == null) { 120 return response; [all...] |
/external/smack/src/org/apache/harmony/javax/security/sasl/ |
H A D | SaslServer.java | 24 byte[] evaluateResponse(byte[] response) throws SaslException; argument
|
/external/smack/src/org/jivesoftware/smackx/ |
H A D | ServiceDiscoveryManager.java | 44 * <li>Automatic response when this XMPP entity is queried for information. 219 DiscoverItems response = new DiscoverItems(); 220 response.setType(IQ.Type.RESULT); 221 response.setTo(discoverItems.getFrom()); 222 response.setPacketID(discoverItems.getPacketID()); 223 response.setNode(discoverItems.getNode()); 231 response.addItems(nodeInformationProvider.getNodeItems()); 233 response.addExtensions(nodeInformationProvider.getNodePacketExtensions()); 237 response.setType(IQ.Type.ERROR); 238 response 299 addDiscoverInfoTo(DiscoverInfo response) argument [all...] |
/external/smack/src/org/jivesoftware/smackx/commands/ |
H A D | AdHocCommand.java | 44 * "cancel" action when submitting a stage response indicating that the command
163 * response to the execution of an action. All the notes added here are
198 * response. It could be a form to fill out the information needed to go to
219 * the <code>response</code>. This form must be the answer form of the
224 * @param response the form answer of the previous stage.
227 public abstract void next(Form response) throws XMPPException;
argument 231 * <code>response</code>. This form must be the answer form of the
236 * @param response the form answer of the previous stage.
239 public abstract void complete(Form response) throws XMPPException;
argument 275 * when creating a response [all...] |
H A D | AdHocCommandManager.java | 382 // Creates the response with the corresponding data
383 AdHocCommandData response = new AdHocCommandData();
384 response.setTo(requestData.getFrom());
385 response.setPacketID(requestData.getPacketID());
386 response.setNode(requestData.getNode());
387 response.setId(requestData.getTo());
398 respondError(response, XMPPError.Condition.item_not_found);
410 response.setType(IQ.Type.RESULT);
411 command.setData(response);
417 respondError(response, XMPPErro 642 respondError(AdHocCommandData response, XMPPError.Condition condition) argument 654 respondError(AdHocCommandData response, XMPPError.Condition condition, AdHocCommand.SpecificErrorCondition specificCondition) argument 668 respondError(AdHocCommandData response, XMPPError error) argument [all...] |
/external/smack/src/org/jivesoftware/smackx/workgroup/ext/macros/ |
H A D | Macro.java | 33 private String response;
field in class:Macro 53 return response;
56 public void setResponse(String response) {
argument 57 this.response = response;
|
/external/smack/src/org/xbill/DNS/ |
H A D | ExtendedResolver.java | 27 Message response; field in class:ExtendedResolver.Resolution 105 * Wait for a successful response or for each 117 /* Return the response or throw an exception */ 118 if (response != null) 119 return response; 139 * Receive a response. If the resolution hasn't been completed, 150 response = m; 157 listener.receiveMessage(this, response); 181 * If this is the first response from server n, 202 * Problem with the response; do [all...] |
H A D | Lookup.java | 406 processResponse(Name name, SetResponse response) { argument 407 if (response.isSuccessful()) { 408 RRset [] rrsets = response.answers(); 422 } else if (response.isNXDOMAIN()) { 429 } else if (response.isNXRRSET()) { 433 } else if (response.isCNAME()) { 434 CNAMERecord cname = response.getCNAME(); 436 } else if (response.isDNAME()) { 437 DNAMERecord dname = response.getDNAME(); 445 } else if (response [all...] |
H A D | SimpleResolver.java | 195 verifyTSIG(Message query, Message response, byte [] b, TSIG tsig) { argument 198 int error = tsig.verify(response, b, query.getTSIG()); 220 * Sends a message to a single server and waits for a response. No checking 221 * is done to ensure that the response is associated with the query. 223 * @return The response. 261 * Check that the response is long enough. 268 * Check that the response ID matches the query ID. We want 270 * if there's a malformed response that's not ours, it 287 Message response = parseMessage(in); 288 verifyTSIG(query, response, i [all...] |
/external/robolectric/lib/main/ |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ... |