Searched defs:response (Results 1 - 25 of 334) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.c142 * @response: 24-octet Response (OUT)
145 u8 *response)
148 des_encrypt(challenge, password_hash, response);
149 des_encrypt(challenge, password_hash + 7, response + 8);
153 des_encrypt(challenge, zpwd, response + 16);
165 * @response: 24-octet Response (OUT)
171 u8 *response)
181 challenge_response(challenge, password_hash, response);
193 * @response: 24-octet Response (OUT)
200 u8 *response)
144 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument
168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
H A Dtls_gnutls.c826 gnutls_datum_t response, buf; local
837 "GnuTLS: No valid OCSP response received");
842 "GnuTLS: Valid OCSP response was not received - continue since OCSP was not required");
847 * GnuTLS has already verified the OCSP response in
849 * found to be revoked. However, if the response indicates that the
851 * re-import the OCSP response to check for unknown certificate status,
856 res = gnutls_ocsp_status_request_get(session, &response);
859 "GnuTLS: OCSP response was received, but it was not valid");
866 res = gnutls_ocsp_resp_import(resp, &response);
869 "GnuTLS: Could not parse received OCSP response
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c16 size_t challenge_len, u8 *response)
27 return md5_vector(3, addr, len, response);
15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server.c1399 * the EAP request if no response is received.
1987 const u8 *challenge, const u8 *response)
1998 wpa_snprintf_hex_sep(hex_response, sizeof(hex_response), response, 24,
1985 eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source, const u8 *username, size_t username_len, const u8 *challenge, const u8 *response) argument
H A Deap_server_ttls.c589 u8 *response, size_t response_len)
593 if (challenge == NULL || response == NULL ||
597 "attributes (challenge len %lu response len %lu)",
624 challenge, response + 2 + 24);
629 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
643 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
644 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
649 response + 2 + 24, 24);
661 u8 *response, size_t response_len)
667 if (challenge == NULL || response
586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
657 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.c142 * @response: 24-octet Response (OUT)
145 u8 *response)
148 des_encrypt(challenge, password_hash, response);
149 des_encrypt(challenge, password_hash + 7, response + 8);
153 des_encrypt(challenge, zpwd, response + 16);
165 * @response: 24-octet Response (OUT)
171 u8 *response)
181 challenge_response(challenge, password_hash, response);
193 * @response: 24-octet Response (OUT)
200 u8 *response)
144 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument
168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
H A Dtls_gnutls.c826 gnutls_datum_t response, buf; local
837 "GnuTLS: No valid OCSP response received");
842 "GnuTLS: Valid OCSP response was not received - continue since OCSP was not required");
847 * GnuTLS has already verified the OCSP response in
849 * found to be revoked. However, if the response indicates that the
851 * re-import the OCSP response to check for unknown certificate status,
856 res = gnutls_ocsp_status_request_get(session, &response);
859 "GnuTLS: OCSP response was received, but it was not valid");
866 res = gnutls_ocsp_resp_import(resp, &response);
869 "GnuTLS: Could not parse received OCSP response
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c16 size_t challenge_len, u8 *response)
27 return md5_vector(3, addr, len, response);
15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server.c1399 * the EAP request if no response is received.
1987 const u8 *challenge, const u8 *response)
1998 wpa_snprintf_hex_sep(hex_response, sizeof(hex_response), response, 24,
1985 eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source, const u8 *username, size_t username_len, const u8 *challenge, const u8 *response) argument
H A Deap_server_ttls.c589 u8 *response, size_t response_len)
593 if (challenge == NULL || response == NULL ||
597 "attributes (challenge len %lu response len %lu)",
624 challenge, response + 2 + 24);
629 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
643 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
644 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
649 response + 2 + 24, 24);
661 u8 *response, size_t response_len)
667 if (challenge == NULL || response
586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
657 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.c142 * @response: 24-octet Response (OUT)
145 u8 *response)
148 des_encrypt(challenge, password_hash, response);
149 des_encrypt(challenge, password_hash + 7, response + 8);
153 des_encrypt(challenge, zpwd, response + 16);
165 * @response: 24-octet Response (OUT)
171 u8 *response)
181 challenge_response(challenge, password_hash, response);
193 * @response: 24-octet Response (OUT)
200 u8 *response)
144 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument
168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
H A Dtls_gnutls.c826 gnutls_datum_t response, buf; local
837 "GnuTLS: No valid OCSP response received");
842 "GnuTLS: Valid OCSP response was not received - continue since OCSP was not required");
847 * GnuTLS has already verified the OCSP response in
849 * found to be revoked. However, if the response indicates that the
851 * re-import the OCSP response to check for unknown certificate status,
856 res = gnutls_ocsp_status_request_get(session, &response);
859 "GnuTLS: OCSP response was received, but it was not valid");
866 res = gnutls_ocsp_resp_import(resp, &response);
869 "GnuTLS: Could not parse received OCSP response
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c16 size_t challenge_len, u8 *response)
27 return md5_vector(3, addr, len, response);
15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server.c1399 * the EAP request if no response is received.
1987 const u8 *challenge, const u8 *response)
1998 wpa_snprintf_hex_sep(hex_response, sizeof(hex_response), response, 24,
1985 eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source, const u8 *username, size_t username_len, const u8 *challenge, const u8 *response) argument
H A Deap_server_ttls.c589 u8 *response, size_t response_len)
593 if (challenge == NULL || response == NULL ||
597 "attributes (challenge len %lu response len %lu)",
624 challenge, response + 2 + 24);
629 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
643 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
644 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
649 response + 2 + 24, 24);
661 u8 *response, size_t response_len)
667 if (challenge == NULL || response
586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
657 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
/external/vboot_reference/firmware/lib/tpm_lite/
H A Dmocked_tlcl.c164 uint32_t TlclSendReceive(const uint8_t* request, uint8_t* response, argument
H A Dtlcl.c43 /* Gets the size field of a TPM request or response. */
64 uint8_t* response, int max_length) {
77 response, &response_length);
79 /* Communication with TPM failed, so response is garbage */
84 /* Otherwise, use the result code from the response */
85 result = TpmReturnCode(response);
88 * (and possibly expected length from the response header). See
92 VBDEBUG(("TPM: response: %x%x %x%x%x%x %x%x%x%x\n",
93 response[0], response[
63 TlclSendReceiveNoRetry(const uint8_t* request, uint8_t* response, int max_length) argument
108 TlclSendReceive(const uint8_t* request, uint8_t* response, int max_length) argument
141 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
176 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
195 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
213 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
235 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
280 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
295 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE + TPM_PUBEK_SIZE]; local
326 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
343 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
387 uint8_t response[kTpmResponseHeaderLength + kPcrDigestLength]; local
404 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
421 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
439 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local
[all...]
/external/vboot_reference/firmware/stub/
H A Dtpm_lite_stub.c81 uint8_t response[TPM_MAX_COMMAND_SIZE]; local
96 n = read(tpm_fd, response, sizeof(response));
105 "TPM response too long for output buffer\n");
108 Memcpy(out, response, n);
189 uint8_t* response, uint32_t* response_length) {
204 * response);
214 result = TpmExecute(request, request_length, response, response_length);
226 VBDEBUG(("response (%d bytes): ", y));
227 PrintBytes(response, 1
188 VbExTpmSendReceive(const uint8_t* request, uint32_t request_length, uint8_t* response, uint32_t* response_length) argument
[all...]
/external/vboot_reference/tests/
H A Dtlcl_tests.c32 uint8_t rsp_buf[32]; /* Default response buffer, if not overridden */
60 * Set response code and length for call <call_idx>.
84 uint8_t *response, uint32_t *response_length)
97 memset(response, 0, *response_length);
99 memcpy(response, c->rsp, c->rsp_size);
146 "SendReceive error response");
83 VbExTpmSendReceive(const uint8_t *request, uint32_t request_length, uint8_t *response, uint32_t *response_length) argument
/external/vboot_reference/utility/
H A Dtpmc.c326 uint8_t response[4096]; local
346 bzero(response, sizeof(response));
347 result = TlclSendReceive(request, response, sizeof(response));
351 size = TlclPacketSize(response);
352 if (size < 10 || size > sizeof(response)) {
353 fprintf(stderr, "unexpected response size %d\n", size);
357 printf("0x%02x ", response[i]);
412 { "sendraw", "raw", "send a raw request and print raw response",
[all...]
/external/v8/test/mjsunit/
H A Ddebug-backtrace.js62 ParsedResponse.prototype.response = function() {
91 var response;
104 response = new ParsedResponse(resp);
105 backtrace = response.body();
115 assertEquals("f", response.lookup(frames[0].func.ref).name);
117 assertEquals("", response.lookup(frames[1].func.ref).name);
118 assertEquals("m", response.lookup(frames[1].func.ref).inferredName);
120 assertEquals("g", response.lookup(frames[2].func.ref).name);
122 assertEquals("", response.lookup(frames[3].func.ref).name);
123 assertFalse(response
[all...]
H A Ddebug-return-value.js44 ParsedResponse.prototype.response = function() {
116 response = new ParsedResponse(resp);
117 frames = response.body().frames;
120 response.lookup(frames[0].returnValue.ref).value);
/external/v8/test/mjsunit/regress/
H A Dregress-1081309.js48 ParsedResponse.prototype.response = function() {
77 var response = new ParsedResponse(dcp.processDebugJSONRequest(json));
78 var backtrace = response.body();
82 assertEquals("g", response.lookup(backtrace.frames[0].func.ref).name);
83 assertEquals("", response.lookup(backtrace.frames[1].func.ref).name);
/external/v8/src/
H A Dd8-debug.cc112 Handle<String> response = Handle<String>::Cast(response_val); local
114 // Convert the debugger response into text details and the running state.
116 Shell::DebugMessageDetails(isolate, response);
H A Ddebug-debugger.js5 // Default number of frames to include in the response to backtrace request.
1284 // If message is based on a request this is a response. Fill the initial
1285 // response from the request.
1286 this.type = 'response';
1375 var response; // Generated response.
1381 // Create an initial response.
1382 response = this.createResponse(request);
1401 response.setOption('inlineRefs', true);
1404 response
[all...]

Completed in 553 milliseconds

1234567891011>>