/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/pdist/ |
D | security.py | 28 def _compare_challenge_response(self, challenge, response): argument 29 return self._encode_challenge(challenge) == response 31 def _encode_challenge(self, challenge): argument 33 return pow(long(challenge), p, m)
|
D | server.py | 125 challenge = self._generate_challenge() 126 conn.send("%d\n" % challenge) 139 if not self._compare_challenge_response(challenge, response):
|
D | client.py | 140 challenge = string.atoi(string.strip(line)) 141 response = self._encode_challenge(challenge)
|
D | README | 119 class chooses a random number z (the challenge) in the range
|
/device/generic/goldfish/fingerprint/ |
D | fingerprint.c | 82 uint64_t challenge; member 322 if (hat->challenge == dev->challenge) { in fingerprint_enroll() 335 if (hat->challenge != dev->challenge && !(hat->authenticator_type & HW_AUTH_FINGERPRINT)) { in fingerprint_enroll() 362 uint64_t challenge = 0; in fingerprint_pre_enroll() local 368 challenge = get_64bit_rand(); in fingerprint_pre_enroll() 371 qdev->challenge = challenge; in fingerprint_pre_enroll() 374 return challenge; in fingerprint_pre_enroll() 382 qdev->challenge = 0; in fingerprint_post_enroll() 587 auth_msg.data.authenticated.hat.challenge = qdev->op_id; in send_scan_notice()
|
/device/google/cuttlefish_common/guest/hals/gatekeeper/ |
D | SoftGateKeeperDevice.cpp | 77 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument 93 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); in verify()
|
D | module.cpp | 58 static int verify(const struct gatekeeper_device *dev __unused, uint32_t uid, uint64_t challenge, in verify() argument 65 return s_gatekeeper->verify(uid, challenge, in verify()
|
D | SoftGateKeeperDevice.h | 66 int verify(uint32_t uid, uint64_t challenge,
|
/device/generic/goldfish/gatekeeper/ |
D | SoftGateKeeperDevice.cpp | 77 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument 93 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); in verify()
|
D | module.cpp | 58 static int verify(const struct gatekeeper_device *dev __unused, uint32_t uid, uint64_t challenge, in verify() argument 65 return s_gatekeeper->verify(uid, challenge, in verify()
|
D | SoftGateKeeperDevice.h | 66 int verify(uint32_t uid, uint64_t challenge,
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
D | smtplib.py | 551 def encode_cram_md5(challenge, user, password): argument 552 challenge = base64.decodestring(challenge) 553 response = user + " " + hmac.HMAC(password, challenge).hexdigest()
|
D | imaplib.py | 521 def _CRAM_MD5_AUTH(self, challenge): argument 524 return self.user + " " + hmac.HMAC(self.password, challenge).hexdigest()
|
D | urllib2.py | 960 token, challenge = auth.split(' ', 1) 961 chal = parse_keqv_list(parse_http_list(challenge))
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/ |
D | README | 21 challenge.
|
/device/google/cuttlefish_common/guest/hals/ril/libril/ |
D | ril_service.cpp | 384 const ::android::hardware::hidl_string& challenge); 2049 Return<void> RadioImpl_1_4::requestIsimAuthentication(int32_t serial, const hidl_string& challenge)… in requestIsimAuthentication() argument 2054 challenge.c_str()); in requestIsimAuthentication()
|