/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 142 * @response: 24-octet Response (OUT) 145 u8 *response) 148 des_encrypt(challenge, password_hash, response); 149 des_encrypt(challenge, password_hash + 7, response + 8); 153 des_encrypt(challenge, zpwd, response + 16); 165 * @response: 24-octet Response (OUT) 171 u8 *response) 181 challenge_response(challenge, password_hash, response); 193 * @response: 24-octet Response (OUT) 200 u8 *response) 144 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument 168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
H A D | tls_gnutls.c | 826 gnutls_datum_t response, buf; local 837 "GnuTLS: No valid OCSP response received"); 842 "GnuTLS: Valid OCSP response was not received - continue since OCSP was not required"); 847 * GnuTLS has already verified the OCSP response in 849 * found to be revoked. However, if the response indicates that the 851 * re-import the OCSP response to check for unknown certificate status, 856 res = gnutls_ocsp_status_request_get(session, &response); 859 "GnuTLS: OCSP response was received, but it was not valid"); 866 res = gnutls_ocsp_resp_import(resp, &response); 869 "GnuTLS: Could not parse received OCSP response [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 16 size_t challenge_len, u8 *response) 27 return md5_vector(3, addr, len, response); 15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server.c | 1399 * the EAP request if no response is received. 1987 const u8 *challenge, const u8 *response) 1998 wpa_snprintf_hex_sep(hex_response, sizeof(hex_response), response, 24, 1985 eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source, const u8 *username, size_t username_len, const u8 *challenge, const u8 *response) argument
|
H A D | eap_server_ttls.c | 589 u8 *response, size_t response_len) 593 if (challenge == NULL || response == NULL || 597 "attributes (challenge len %lu response len %lu)", 624 challenge, response + 2 + 24); 629 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { 643 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { 644 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); 649 response + 2 + 24, 24); 661 u8 *response, size_t response_len) 667 if (challenge == NULL || response 586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 657 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 142 * @response: 24-octet Response (OUT) 145 u8 *response) 148 des_encrypt(challenge, password_hash, response); 149 des_encrypt(challenge, password_hash + 7, response + 8); 153 des_encrypt(challenge, zpwd, response + 16); 165 * @response: 24-octet Response (OUT) 171 u8 *response) 181 challenge_response(challenge, password_hash, response); 193 * @response: 24-octet Response (OUT) 200 u8 *response) 144 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument 168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
H A D | tls_gnutls.c | 826 gnutls_datum_t response, buf; local 837 "GnuTLS: No valid OCSP response received"); 842 "GnuTLS: Valid OCSP response was not received - continue since OCSP was not required"); 847 * GnuTLS has already verified the OCSP response in 849 * found to be revoked. However, if the response indicates that the 851 * re-import the OCSP response to check for unknown certificate status, 856 res = gnutls_ocsp_status_request_get(session, &response); 859 "GnuTLS: OCSP response was received, but it was not valid"); 866 res = gnutls_ocsp_resp_import(resp, &response); 869 "GnuTLS: Could not parse received OCSP response [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 16 size_t challenge_len, u8 *response) 27 return md5_vector(3, addr, len, response); 15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server.c | 1399 * the EAP request if no response is received. 1987 const u8 *challenge, const u8 *response) 1998 wpa_snprintf_hex_sep(hex_response, sizeof(hex_response), response, 24, 1985 eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source, const u8 *username, size_t username_len, const u8 *challenge, const u8 *response) argument
|
H A D | eap_server_ttls.c | 589 u8 *response, size_t response_len) 593 if (challenge == NULL || response == NULL || 597 "attributes (challenge len %lu response len %lu)", 624 challenge, response + 2 + 24); 629 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { 643 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { 644 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); 649 response + 2 + 24, 24); 661 u8 *response, size_t response_len) 667 if (challenge == NULL || response 586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 657 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 142 * @response: 24-octet Response (OUT) 145 u8 *response) 148 des_encrypt(challenge, password_hash, response); 149 des_encrypt(challenge, password_hash + 7, response + 8); 153 des_encrypt(challenge, zpwd, response + 16); 165 * @response: 24-octet Response (OUT) 171 u8 *response) 181 challenge_response(challenge, password_hash, response); 193 * @response: 24-octet Response (OUT) 200 u8 *response) 144 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument 168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
H A D | tls_gnutls.c | 826 gnutls_datum_t response, buf; local 837 "GnuTLS: No valid OCSP response received"); 842 "GnuTLS: Valid OCSP response was not received - continue since OCSP was not required"); 847 * GnuTLS has already verified the OCSP response in 849 * found to be revoked. However, if the response indicates that the 851 * re-import the OCSP response to check for unknown certificate status, 856 res = gnutls_ocsp_status_request_get(session, &response); 859 "GnuTLS: OCSP response was received, but it was not valid"); 866 res = gnutls_ocsp_resp_import(resp, &response); 869 "GnuTLS: Could not parse received OCSP response [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 16 size_t challenge_len, u8 *response) 27 return md5_vector(3, addr, len, response); 15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server.c | 1399 * the EAP request if no response is received. 1987 const u8 *challenge, const u8 *response) 1998 wpa_snprintf_hex_sep(hex_response, sizeof(hex_response), response, 24, 1985 eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source, const u8 *username, size_t username_len, const u8 *challenge, const u8 *response) argument
|
H A D | eap_server_ttls.c | 589 u8 *response, size_t response_len) 593 if (challenge == NULL || response == NULL || 597 "attributes (challenge len %lu response len %lu)", 624 challenge, response + 2 + 24); 629 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { 643 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { 644 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); 649 response + 2 + 24, 24); 661 u8 *response, size_t response_len) 667 if (challenge == NULL || response 586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 657 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument [all...] |
/external/vboot_reference/firmware/lib/tpm_lite/ |
H A D | mocked_tlcl.c | 164 uint32_t TlclSendReceive(const uint8_t* request, uint8_t* response, argument
|
H A D | tlcl.c | 43 /* Gets the size field of a TPM request or response. */ 64 uint8_t* response, int max_length) { 77 response, &response_length); 79 /* Communication with TPM failed, so response is garbage */ 84 /* Otherwise, use the result code from the response */ 85 result = TpmReturnCode(response); 88 * (and possibly expected length from the response header). See 92 VBDEBUG(("TPM: response: %x%x %x%x%x%x %x%x%x%x\n", 93 response[0], response[ 63 TlclSendReceiveNoRetry(const uint8_t* request, uint8_t* response, int max_length) argument 108 TlclSendReceive(const uint8_t* request, uint8_t* response, int max_length) argument 141 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local 176 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local 195 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local 213 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local 235 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local 280 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local 295 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE + TPM_PUBEK_SIZE]; local 326 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local 343 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local 387 uint8_t response[kTpmResponseHeaderLength + kPcrDigestLength]; local 404 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local 421 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local 439 uint8_t response[TPM_LARGE_ENOUGH_COMMAND_SIZE]; local [all...] |
/external/vboot_reference/firmware/stub/ |
H A D | tpm_lite_stub.c | 81 uint8_t response[TPM_MAX_COMMAND_SIZE]; local 96 n = read(tpm_fd, response, sizeof(response)); 105 "TPM response too long for output buffer\n"); 108 Memcpy(out, response, n); 189 uint8_t* response, uint32_t* response_length) { 204 * response); 214 result = TpmExecute(request, request_length, response, response_length); 226 VBDEBUG(("response (%d bytes): ", y)); 227 PrintBytes(response, 1 188 VbExTpmSendReceive(const uint8_t* request, uint32_t request_length, uint8_t* response, uint32_t* response_length) argument [all...] |
/external/vboot_reference/tests/ |
H A D | tlcl_tests.c | 32 uint8_t rsp_buf[32]; /* Default response buffer, if not overridden */ 60 * Set response code and length for call <call_idx>. 84 uint8_t *response, uint32_t *response_length) 97 memset(response, 0, *response_length); 99 memcpy(response, c->rsp, c->rsp_size); 146 "SendReceive error response"); 83 VbExTpmSendReceive(const uint8_t *request, uint32_t request_length, uint8_t *response, uint32_t *response_length) argument
|
/external/vboot_reference/utility/ |
H A D | tpmc.c | 326 uint8_t response[4096]; local 346 bzero(response, sizeof(response)); 347 result = TlclSendReceive(request, response, sizeof(response)); 351 size = TlclPacketSize(response); 352 if (size < 10 || size > sizeof(response)) { 353 fprintf(stderr, "unexpected response size %d\n", size); 357 printf("0x%02x ", response[i]); 412 { "sendraw", "raw", "send a raw request and print raw response", [all...] |
/external/v8/test/mjsunit/ |
H A D | debug-backtrace.js | 62 ParsedResponse.prototype.response = function() { 91 var response; 104 response = new ParsedResponse(resp); 105 backtrace = response.body(); 115 assertEquals("f", response.lookup(frames[0].func.ref).name); 117 assertEquals("", response.lookup(frames[1].func.ref).name); 118 assertEquals("m", response.lookup(frames[1].func.ref).inferredName); 120 assertEquals("g", response.lookup(frames[2].func.ref).name); 122 assertEquals("", response.lookup(frames[3].func.ref).name); 123 assertFalse(response [all...] |
H A D | debug-return-value.js | 44 ParsedResponse.prototype.response = function() { 116 response = new ParsedResponse(resp); 117 frames = response.body().frames; 120 response.lookup(frames[0].returnValue.ref).value);
|
/external/v8/test/mjsunit/regress/ |
H A D | regress-1081309.js | 48 ParsedResponse.prototype.response = function() { 77 var response = new ParsedResponse(dcp.processDebugJSONRequest(json)); 78 var backtrace = response.body(); 82 assertEquals("g", response.lookup(backtrace.frames[0].func.ref).name); 83 assertEquals("", response.lookup(backtrace.frames[1].func.ref).name);
|
/external/v8/src/ |
H A D | d8-debug.cc | 112 Handle<String> response = Handle<String>::Cast(response_val); local 114 // Convert the debugger response into text details and the running state. 116 Shell::DebugMessageDetails(isolate, response);
|
H A D | debug-debugger.js | 5 // Default number of frames to include in the response to backtrace request. 1284 // If message is based on a request this is a response. Fill the initial 1285 // response from the request. 1286 this.type = 'response'; 1375 var response; // Generated response. 1381 // Create an initial response. 1382 response = this.createResponse(request); 1401 response.setOption('inlineRefs', true); 1404 response [all...] |