/external/ppp/pppd/ |
D | chap_ms.c | 169 chapms_generate_challenge(unsigned char *challenge) in chapms_generate_challenge() argument 171 *challenge++ = 8; in chapms_generate_challenge() 174 memcpy(challenge, mschap_challenge, 8); in chapms_generate_challenge() 177 random_bytes(challenge, 8); in chapms_generate_challenge() 181 chapms2_generate_challenge(unsigned char *challenge) in chapms2_generate_challenge() argument 183 *challenge++ = 16; in chapms2_generate_challenge() 186 memcpy(challenge, mschap_challenge, 16); in chapms2_generate_challenge() 189 random_bytes(challenge, 16); in chapms2_generate_challenge() 195 unsigned char *challenge, unsigned char *response, in chapms_verify_response() argument 202 challenge_len = *challenge++; /* skip length, is 8 */ in chapms_verify_response() [all …]
|
D | chap-md5.c | 59 unsigned char *challenge, unsigned char *response, in chap_md5_verify_response() argument 67 challenge_len = *challenge++; in chap_md5_verify_response() 74 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_verify_response() 89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument 94 int challenge_len = *challenge++; in chap_md5_make_response() 99 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_make_response()
|
D | chap-new.h | 100 void (*generate_challenge)(unsigned char *challenge); 103 unsigned char *challenge, unsigned char *response, 106 unsigned char *challenge, char *secret, int secret_len, 117 unsigned char *challenge, unsigned char *response,
|
D | chap-new.c | 55 unsigned char *challenge, unsigned char *response, 102 unsigned char challenge[CHAL_MAX_PKTLEN]; member 126 unsigned char *challenge, unsigned char *response, 271 output(0, ss->challenge, ss->challenge_pktlen); in chap_timeout() 287 p = ss->challenge; in chap_generate_challenge() 298 p = ss->challenge + PPP_HDRLEN; in chap_generate_challenge() 321 if (id != ss->challenge[PPP_HDRLEN+1] || len < 2) in chap_handle_response() 349 ss->challenge + PPP_HDRLEN + CHAP_HDRLEN, in chap_handle_response() 414 unsigned char *challenge, unsigned char *response, in chap_verify_response() argument 427 ok = digest->verify_response(id, name, secret, secret_len, challenge, in chap_verify_response()
|
/external/openssh/ |
D | auth-bsdauth.c | 55 char *challenge = NULL; in bsdauth_query() local 64 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query() 65 if (challenge == NULL) { in bsdauth_query() 71 if (challenge == NULL) { in bsdauth_query() 76 authctxt->style, "auth-ssh", &challenge); in bsdauth_query() 78 challenge = NULL; in bsdauth_query() 79 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query() 82 if (challenge == NULL) in bsdauth_query() 90 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
|
/external/wpa_supplicant_8/src/crypto/ |
D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 97 os_memcpy(challenge, hash, 8); in challenge_hash() 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 180 username_len, challenge) || in generate_nt_response() 182 challenge_response(challenge, password_hash, response)) in generate_nt_response() 204 u8 challenge[8]; in generate_nt_response_pwhash() local [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
D | NetscapeCertRequest.java | 51 String challenge; field in NetscapeCertRequest 106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest() 129 String challenge, in NetscapeCertRequest() argument 135 this.challenge = challenge; in NetscapeCertRequest() 142 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest() 156 return challenge; in getChallenge() 161 challenge = value; in setChallenge() 194 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument 197 if (!challenge.equals(this.challenge)) in verify() 239 pkac.add(new DERIA5String(challenge)); in sign() [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jce/netscape/ |
D | NetscapeCertRequest.java | 53 String challenge; field in NetscapeCertRequest 108 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest() 131 String challenge, in NetscapeCertRequest() argument 137 this.challenge = challenge; in NetscapeCertRequest() 144 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest() 158 return challenge; in getChallenge() 163 challenge = value; in setChallenge() 196 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument 199 if (!challenge.equals(this.challenge)) in verify() 241 pkac.add(new DERIA5String(challenge)); in sign() [all …]
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jce/netscape/ |
D | NetscapeCertRequest.java | 53 String challenge; field in NetscapeCertRequest 108 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest() 131 String challenge, in NetscapeCertRequest() argument 137 this.challenge = challenge; in NetscapeCertRequest() 144 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest() 158 return challenge; in getChallenge() 163 challenge = value; in setChallenge() 196 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument 199 if (!challenge.equals(this.challenge)) in verify() 241 pkac.add(new DERIA5String(challenge)); in sign() [all …]
|
/external/python/httplib2/python2/httplib2/ |
D | __init__.py | 673 challenge = _parse_www_authenticate(response, "www-authenticate") 674 self.challenge = challenge["digest"] 675 qop = self.challenge.get("qop", "auth") 676 self.challenge["qop"] = ( 679 if self.challenge["qop"] is None: 683 self.challenge["algorithm"] = self.challenge.get("algorithm", "MD5").upper() 684 if self.challenge["algorithm"] != "MD5": 686 _("Unsupported value for algorithm: %s." % self.challenge["algorithm"]) 692 self.challenge["realm"], 697 self.challenge["nc"] = 1 [all …]
|
/external/python/httplib2/python3/httplib2/ |
D | __init__.py | 648 challenge = _parse_www_authenticate(response, "www-authenticate") 649 self.challenge = challenge["digest"] 650 qop = self.challenge.get("qop", "auth") 651 self.challenge["qop"] = ( 654 if self.challenge["qop"] is None: 658 self.challenge["algorithm"] = self.challenge.get("algorithm", "MD5").upper() 659 if self.challenge["algorithm"] != "MD5": 661 _("Unsupported value for algorithm: %s." % self.challenge["algorithm"]) 667 self.challenge["realm"], 672 self.challenge["nc"] = 1 [all …]
|
/external/apache-http/src/org/apache/http/impl/auth/ |
D | NTLMScheme.java | 65 private String challenge; field in NTLMScheme 74 this.challenge = null; in NTLMScheme() 98 String challenge = buffer.substringTrimmed(pos, len); in parseChallenge() local 99 if (challenge.length() == 0) { in parseChallenge() 105 this.challenge = null; in parseChallenge() 108 this.challenge = challenge; in parseChallenge() 135 this.challenge); in authenticate()
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
D | AuthenticatorAdapter.java | 42 Challenge challenge = challenges.get(i); in authenticate() local 43 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticate() 47 challenge.getRealm(), challenge.getScheme(), url.url(), RequestorType.SERVER); in authenticate() 64 Challenge challenge = challenges.get(i); in authenticateProxy() local 65 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticateProxy() 70 url.scheme(), challenge.getRealm(), challenge.getScheme(), url.url(), in authenticateProxy()
|
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/http/ |
D | AuthenticatorAdapter.java | 44 Challenge challenge = challenges.get(i); in authenticate() local 45 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticate() 49 challenge.getRealm(), challenge.getScheme(), url.url(), RequestorType.SERVER); in authenticate() 66 Challenge challenge = challenges.get(i); in authenticateProxy() local 67 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticateProxy() 72 url.scheme(), challenge.getRealm(), challenge.getScheme(), url.url(), in authenticateProxy()
|
/external/ppp/pppd/plugins/ |
D | winbind.c | 100 unsigned char *challenge, 245 const u_char *challenge, in run_ntlm_auth() argument 355 sprintf(challenge_hex + i * 2, "%02X", challenge[i]); in run_ntlm_auth() 513 unsigned char *challenge, in winbind_chap_verify() argument 525 challenge_len = *challenge++; in winbind_chap_verify() 580 challenge, challenge_len, in winbind_chap_verify() 585 mppe_set_keys(challenge, session_key); in winbind_chap_verify() 595 challenge_len, challenge); in winbind_chap_verify() 610 ChallengeHash(&response[MS_CHAP2_PEER_CHALLENGE], challenge, in winbind_chap_verify() 629 challenge, user, saresponse); in winbind_chap_verify() [all …]
|
/external/python/cpython2/Demo/pdist/ |
D | security.py | 28 def _compare_challenge_response(self, challenge, response): argument 29 return self._encode_challenge(challenge) == response 31 def _encode_challenge(self, challenge): argument 33 return pow(long(challenge), p, m)
|
/external/autotest/client/common_lib/cros/ |
D | g2f_utils.py | 44 def G2fRegister(client, dev, challenge, application, p1=0): argument 50 ' --challenge=' + challenge + 55 def G2fAuth(client, dev, challenge, application, key_handle, p1=0): argument 61 ' --challenge=' + challenge +
|
/external/openscreen/cast/receiver/channel/ |
D | device_auth_namespace_handler.cc | 85 const AuthChallenge& challenge = device_auth_message.challenge(); in OnMessage() local 86 const SignatureAlgorithm sig_alg = challenge.signature_algorithm(); in OnMessage() 87 HashAlgorithm hash_alg = challenge.hash_algorithm(); in OnMessage() 121 if (challenge.has_sender_nonce()) { in OnMessage() 122 sender_nonce = challenge.sender_nonce(); in OnMessage()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local 67 challenge = pos; in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
D | eap_ttls.c | 516 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2() 541 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2() 543 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2() 552 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2() 558 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2() 562 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 573 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() 576 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 585 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 610 u8 *buf, *pos, *challenge; in eap_ttls_phase2_request_mschap() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq() 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq() 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq() 123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
|
/external/autotest/server/site_tests/firmware_Cr50RMAOpen/ |
D | control | 21 - Authcodes can't be reused once another challenge is generated. 24 Generate the challenge and calculate the response using rma_reset -c. Verify 27 If the generated challenge has the wrong version, make sure the challenge
|
D | firmware_Cr50RMAOpen.py | 102 def parse_challenge(self, challenge): argument 104 return re.sub('\s', '', challenge.strip()) 107 def generate_response(self, challenge): argument 117 stdout = self.host.run('rma_reset -c ' + challenge).stdout 239 challenge = challenge_func() 240 logging.info(challenge) 244 authcode, unsupported_key = self.generate_response(challenge)
|
D | control.faft_cr50_tot | 21 - Authcodes can't be reused once another challenge is generated. 24 Generate the challenge and calculate the response using rma_reset -c. Verify 27 If the generated challenge has the wrong version, make sure the challenge
|
/external/avb/tools/ |
D | at_auth_unlock.py | 240 def SelectMatchingUnlockCredential(all_creds, challenge): argument 254 if GetAtxCertificateSubject(creds.unlock_cert) == challenge.product_id_hash: 258 def MakeAtxUnlockCredential(creds, challenge, out_file): argument 279 hash = SHA512.new(challenge.challenge_data) 324 challenge = UnlockChallenge(challenge_file) 326 binascii.hexlify(challenge.product_id_hash))) 328 selected_cred = SelectMatchingUnlockCredential(all_creds, challenge) 336 MakeAtxUnlockCredential(selected_cred, challenge, credential_file)
|