Searched defs:challenge (Results 1 - 25 of 88) sorted by relevance

1234

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/apache-http/src/org/apache/http/impl/auth/
H A DNTLMEngine.java36 * Type2 challenge.
64 * authentication challenge.
70 * @param challenge Type2 challenge.
79 String challenge) throws NTLMEngineException;
74 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
H A DNTLMScheme.java65 private String challenge; field in class:NTLMScheme
74 this.challenge = null;
98 String challenge = buffer.substringTrimmed(pos, len);
99 if (challenge.length() == 0) {
105 this.challenge = null;
108 this.challenge = challenge;
135 this.challenge);
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
H A DAuthenticationHelper.java35 * @param challenge
36 * the 401/407 challenge response
55 public abstract ClientTransaction handleChallenge(Response challenge, argument
H A DAuthenticationHelperImpl.java125 public ClientTransaction handleChallenge(Response challenge, argument
130 sipStack.getStackLogger().logDebug("handleChallenge: " + challenge);
149 * in-dialog challenge.
171 if (challenge == null || reoriginatedRequest == null) {
172 throw new NullPointerException("A null argument was passed to handle challenge.");
177 if (challenge.getStatusCode() == Response.UNAUTHORIZED) {
178 authHeaders = challenge.getHeaders(WWWAuthenticateHeader.NAME);
179 } else if (challenge.getStatusCode() == Response.PROXY_AUTHENTICATION_REQUIRED) {
180 authHeaders = challenge.getHeaders(ProxyAuthenticateHeader.NAME);
288 * @param authHeader the challenge tha
[all...]
/external/nist-sip/java/gov/nist/javax/sip/parser/
H A DChallengeParser.java33 * Parser for the challenge portion of the authentication header.
47 * @param String challenge message to parse to set
49 protected ChallengeParser(String challenge) { argument
50 super(challenge);
55 * @param String challenge message to parse to set
62 * Get the parameter of the challenge string
/external/openssh/
H A Dauth-chall.c50 char *challenge, *name, *info, **prompts; local
72 challenge = xstrdup(prompts[0]);
80 return (challenge);
H A Dauth-bsdauth.c57 char *challenge = NULL; local
66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
67 if (challenge == NULL) {
73 if (challenge == NULL) {
78 authctxt->style, "auth-ssh", &challenge);
80 challenge = NULL;
81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
84 if (challenge == NULL)
92 (*prompts)[0] = xstrdup(challenge);
[all...]
H A Dauth-skey.c56 char challenge[1024]; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
60 sizeof(challenge)) == -1)
69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
/external/webrtc/webrtc/libjingle/xmpp/
H A Dsaslmechanism.cc26 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/
H A Dserverpairingsession.cc26 PoloChallengeResponse* challenge,
28 : PairingSession(wire, context, challenge),
24 ServerPairingSession(wire::PoloWireAdapter *wire, PairingContext *context, PoloChallengeResponse* challenge, const std::string& server_name) argument
H A Dclientpairingsession.cc28 PoloChallengeResponse* challenge,
31 : PairingSession(wire, context, challenge),
26 ClientPairingSession(wire::PoloWireAdapter *wire, PairingContext *context, PoloChallengeResponse* challenge, const std::string &service_name, const std::string &client_name) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/
H A Dclientpairingsessiontest.cc35 PoloChallengeResponse* challenge)
36 : ClientPairingSession(wire, context, challenge, "service1", "client1") {
33 TestClientPairingSession(wire::PoloWireAdapter* wire, PairingContext* context, PoloChallengeResponse* challenge) argument
H A Dpairingsessiontest.cc37 PoloChallengeResponse* challenge)
38 : PairingSession(wire, context, challenge) {
35 TestPairingSession(wire::PoloWireAdapter* wire, PairingContext* context, PoloChallengeResponse* challenge) argument
H A Dserverpairingsessiontest.cc35 PoloChallengeResponse* challenge)
36 : ServerPairingSession(wire, context, challenge, "server1") {
33 TestServerPairingSession(wire::PoloWireAdapter* wire, PairingContext* context, PoloChallengeResponse* challenge) argument
/external/ppp/pppd/
H A Dchap-md5.c59 unsigned char *challenge, unsigned char *response,
67 challenge_len = *challenge++;
70 /* Generate hash of ID, secret, challenge */
74 MD5_Update(&ctx, challenge, challenge_len);
89 unsigned char *challenge, char *secret, int secret_len,
94 int challenge_len = *challenge++;
99 MD5_Update(&ctx, challenge, challenge_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
H A DNetscapeCertRequest.java51 String challenge; field in class:NetscapeCertRequest
95 // challenge IA5STRING
106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString();
129 String challenge,
135 this.challenge = challenge;
142 content_der.add(new DERIA5String(challenge));
156 return challenge;
161 challenge = value;
194 public boolean verify(String challenge) throw argument
128 NetscapeCertRequest( String challenge, AlgorithmIdentifier signing_alg, PublicKey pub_key) argument
[all...]

Completed in 2414 milliseconds

1234