Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 9 of 9) sorted by relevance

/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/pdist/
Dsecurity.py28 def _compare_challenge_response(self, challenge, response): argument
29 return self._encode_challenge(challenge) == response
31 def _encode_challenge(self, challenge): argument
33 return pow(long(challenge), p, m)
Dserver.py125 challenge = self._generate_challenge()
126 conn.send("%d\n" % challenge)
139 if not self._compare_challenge_response(challenge, response):
Dclient.py140 challenge = string.atoi(string.strip(line))
141 response = self._encode_challenge(challenge)
DREADME119 class chooses a random number z (the challenge) in the range
/device/generic/goldfish/fingerprint/
Dfingerprint.c81 uint64_t challenge; member
317 if (hat->challenge == dev->challenge) { in fingerprint_enroll()
329 if (hat->challenge != dev->challenge && !(hat->authenticator_type & HW_AUTH_FINGERPRINT)) { in fingerprint_enroll()
354 uint64_t challenge = 0; in fingerprint_pre_enroll() local
360 challenge = get_64bit_rand(); in fingerprint_pre_enroll()
363 qdev->challenge = challenge; in fingerprint_pre_enroll()
366 return challenge; in fingerprint_pre_enroll()
374 qdev->challenge = 0; in fingerprint_post_enroll()
569 auth_msg.data.authenticated.hat.challenge = qdev->op_id; in send_scan_notice()
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
Dsmtplib.py551 def encode_cram_md5(challenge, user, password): argument
552 challenge = base64.decodestring(challenge)
553 response = user + " " + hmac.HMAC(password, challenge).hexdigest()
Dimaplib.py521 def _CRAM_MD5_AUTH(self, challenge): argument
524 return self.user + " " + hmac.HMAC(self.password, challenge).hexdigest()
Durllib2.py960 token, challenge = auth.split(' ', 1)
961 chal = parse_keqv_list(parse_http_list(challenge))
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/
DREADME21 challenge.