Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 16 of 16) sorted by relevance

/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/pdist/
Dsecurity.py28 def _compare_challenge_response(self, challenge, response): argument
29 return self._encode_challenge(challenge) == response
31 def _encode_challenge(self, challenge): argument
33 return pow(long(challenge), p, m)
Dserver.py125 challenge = self._generate_challenge()
126 conn.send("%d\n" % challenge)
139 if not self._compare_challenge_response(challenge, response):
Dclient.py140 challenge = string.atoi(string.strip(line))
141 response = self._encode_challenge(challenge)
DREADME119 class chooses a random number z (the challenge) in the range
/device/generic/goldfish/fingerprint/
Dfingerprint.c82 uint64_t challenge; member
322 if (hat->challenge == dev->challenge) { in fingerprint_enroll()
335 if (hat->challenge != dev->challenge && !(hat->authenticator_type & HW_AUTH_FINGERPRINT)) { in fingerprint_enroll()
362 uint64_t challenge = 0; in fingerprint_pre_enroll() local
368 challenge = get_64bit_rand(); in fingerprint_pre_enroll()
371 qdev->challenge = challenge; in fingerprint_pre_enroll()
374 return challenge; in fingerprint_pre_enroll()
382 qdev->challenge = 0; in fingerprint_post_enroll()
587 auth_msg.data.authenticated.hat.challenge = qdev->op_id; in send_scan_notice()
/device/google/cuttlefish_common/guest/hals/gatekeeper/
DSoftGateKeeperDevice.cpp77 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument
93 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); in verify()
Dmodule.cpp58 static int verify(const struct gatekeeper_device *dev __unused, uint32_t uid, uint64_t challenge, in verify() argument
65 return s_gatekeeper->verify(uid, challenge, in verify()
DSoftGateKeeperDevice.h66 int verify(uint32_t uid, uint64_t challenge,
/device/generic/goldfish/gatekeeper/
DSoftGateKeeperDevice.cpp77 uint64_t challenge, const uint8_t *enrolled_password_handle, in verify() argument
93 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer); in verify()
Dmodule.cpp58 static int verify(const struct gatekeeper_device *dev __unused, uint32_t uid, uint64_t challenge, in verify() argument
65 return s_gatekeeper->verify(uid, challenge, in verify()
DSoftGateKeeperDevice.h66 int verify(uint32_t uid, uint64_t challenge,
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
Dsmtplib.py551 def encode_cram_md5(challenge, user, password): argument
552 challenge = base64.decodestring(challenge)
553 response = user + " " + hmac.HMAC(password, challenge).hexdigest()
Dimaplib.py521 def _CRAM_MD5_AUTH(self, challenge): argument
524 return self.user + " " + hmac.HMAC(self.password, challenge).hexdigest()
Durllib2.py960 token, challenge = auth.split(' ', 1)
961 chal = parse_keqv_list(parse_http_list(challenge))
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/
DREADME21 challenge.
/device/google/cuttlefish_common/guest/hals/ril/libril/
Dril_service.cpp384 const ::android::hardware::hidl_string& challenge);
2049 Return<void> RadioImpl_1_4::requestIsimAuthentication(int32_t serial, const hidl_string& challenge)… in requestIsimAuthentication() argument
2054 challenge.c_str()); in requestIsimAuthentication()