/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMEngine.java | 36 * Type2 challenge. 64 * authentication challenge. 70 * @param challenge Type2 challenge. 79 String challenge) throws NTLMEngineException; 74 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
H A D | NTLMScheme.java | 65 private String challenge; field in class:NTLMScheme 74 this.challenge = null; 98 String challenge = buffer.substringTrimmed(pos, len); 99 if (challenge.length() == 0) { 105 this.challenge = null; 108 this.challenge = challenge; 135 this.challenge);
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
H A D | AuthenticationHelper.java | 35 * @param challenge 36 * the 401/407 challenge response 55 public abstract ClientTransaction handleChallenge(Response challenge, argument
|
H A D | AuthenticationHelperImpl.java | 125 public ClientTransaction handleChallenge(Response challenge, argument 130 sipStack.getStackLogger().logDebug("handleChallenge: " + challenge); 149 * in-dialog challenge. 171 if (challenge == null || reoriginatedRequest == null) { 172 throw new NullPointerException("A null argument was passed to handle challenge."); 177 if (challenge.getStatusCode() == Response.UNAUTHORIZED) { 178 authHeaders = challenge.getHeaders(WWWAuthenticateHeader.NAME); 179 } else if (challenge.getStatusCode() == Response.PROXY_AUTHENTICATION_REQUIRED) { 180 authHeaders = challenge.getHeaders(ProxyAuthenticateHeader.NAME); 288 * @param authHeader the challenge tha [all...] |
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
H A D | ChallengeParser.java | 33 * Parser for the challenge portion of the authentication header. 47 * @param String challenge message to parse to set 49 protected ChallengeParser(String challenge) { argument 50 super(challenge); 55 * @param String challenge message to parse to set 62 * Get the parameter of the challenge string
|
/external/openssh/ |
H A D | auth-chall.c | 50 char *challenge, *name, *info, **prompts; local 72 challenge = xstrdup(prompts[0]); 80 return (challenge);
|
H A D | auth-bsdauth.c | 57 char *challenge = NULL; local 66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 67 if (challenge == NULL) { 73 if (challenge == NULL) { 78 authctxt->style, "auth-ssh", &challenge); 80 challenge = NULL; 81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 84 if (challenge == NULL) 92 (*prompts)[0] = xstrdup(challenge); [all...] |
H A D | auth-skey.c | 56 char challenge[1024]; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 60 sizeof(challenge)) == -1) 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
|
/external/webrtc/webrtc/libjingle/xmpp/ |
H A D | saslmechanism.cc | 26 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
H A D | serverpairingsession.cc | 26 PoloChallengeResponse* challenge, 28 : PairingSession(wire, context, challenge), 24 ServerPairingSession(wire::PoloWireAdapter *wire, PairingContext *context, PoloChallengeResponse* challenge, const std::string& server_name) argument
|
H A D | clientpairingsession.cc | 28 PoloChallengeResponse* challenge, 31 : PairingSession(wire, context, challenge), 26 ClientPairingSession(wire::PoloWireAdapter *wire, PairingContext *context, PoloChallengeResponse* challenge, const std::string &service_name, const std::string &client_name) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
H A D | clientpairingsessiontest.cc | 35 PoloChallengeResponse* challenge) 36 : ClientPairingSession(wire, context, challenge, "service1", "client1") { 33 TestClientPairingSession(wire::PoloWireAdapter* wire, PairingContext* context, PoloChallengeResponse* challenge) argument
|
H A D | pairingsessiontest.cc | 37 PoloChallengeResponse* challenge) 38 : PairingSession(wire, context, challenge) { 35 TestPairingSession(wire::PoloWireAdapter* wire, PairingContext* context, PoloChallengeResponse* challenge) argument
|
H A D | serverpairingsessiontest.cc | 35 PoloChallengeResponse* challenge) 36 : ServerPairingSession(wire, context, challenge, "server1") { 33 TestServerPairingSession(wire::PoloWireAdapter* wire, PairingContext* context, PoloChallengeResponse* challenge) argument
|
/external/ppp/pppd/ |
H A D | chap-md5.c | 59 unsigned char *challenge, unsigned char *response, 67 challenge_len = *challenge++; 70 /* Generate hash of ID, secret, challenge */ 74 MD5_Update(&ctx, challenge, challenge_len); 89 unsigned char *challenge, char *secret, int secret_len, 94 int challenge_len = *challenge++; 99 MD5_Update(&ctx, challenge, challenge_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
H A D | NetscapeCertRequest.java | 51 String challenge; field in class:NetscapeCertRequest 95 // challenge IA5STRING 106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); 129 String challenge, 135 this.challenge = challenge; 142 content_der.add(new DERIA5String(challenge)); 156 return challenge; 161 challenge = value; 194 public boolean verify(String challenge) throw argument 128 NetscapeCertRequest( String challenge, AlgorithmIdentifier signing_alg, PublicKey pub_key) argument [all...] |