Home
last modified time | relevance | path

Searched refs:CHALLENGE (Results 1 – 18 of 18) sorted by relevance

/external/libese/ready_se/google/keymint/KM200/Applet/src/com/android/javacard/keymaster/
DKMVerificationToken.java32 public static final byte CHALLENGE = 0x00; field in KMVerificationToken
43 arr.add(CHALLENGE, KMInteger.exp()); in exp()
60 arr.add(CHALLENGE, KMInteger.uint_16((short) 0)); in instance()
99 return KMArray.cast(arrPtr).get(CHALLENGE); in getChallenge()
105 KMArray.cast(arrPtr).add(CHALLENGE, vals); in setChallenge()
DKMHardwareAuthToken.java32 public static final byte CHALLENGE = 0x00; field in KMHardwareAuthToken
46 arr.add(CHALLENGE, KMInteger.exp()); in exp()
66 arr.add(CHALLENGE, KMInteger.uint_16((short) 0)); in instance()
108 return KMArray.cast(arrPtr).get(CHALLENGE); in getChallenge()
114 KMArray.cast(arrPtr).add(CHALLENGE, vals); in setChallenge()
DKMRemotelyProvisionedComponentDevice.java160 private static final byte CHALLENGE = 6; field in KMRemotelyProvisionedComponentDevice
542 short dataEntryIndex = createEntry(CHALLENGE, challengeLen); in processUpdateChallenge()
957 short dataEntryIndex = getEntry(CHALLENGE); in createSignedMac()
958 short challengePtr = KMByteBlob.instance(data, dataEntryIndex, getEntryLength(CHALLENGE)); in createSignedMac()
/external/libese/ready_se/google/keymint/KM300/Applet/src/com/android/javacard/keymaster/
DKMVerificationToken.java32 public static final byte CHALLENGE = 0x00; field in KMVerificationToken
43 arr.add(CHALLENGE, KMInteger.exp()); in exp()
60 arr.add(CHALLENGE, KMInteger.uint_16((short) 0)); in instance()
99 return KMArray.cast(arrPtr).get(CHALLENGE); in getChallenge()
105 KMArray.cast(arrPtr).add(CHALLENGE, vals); in setChallenge()
DKMHardwareAuthToken.java32 public static final byte CHALLENGE = 0x00; field in KMHardwareAuthToken
46 arr.add(CHALLENGE, KMInteger.exp()); in exp()
66 arr.add(CHALLENGE, KMInteger.uint_16((short) 0)); in instance()
108 return KMArray.cast(arrPtr).get(CHALLENGE); in getChallenge()
114 KMArray.cast(arrPtr).add(CHALLENGE, vals); in setChallenge()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_sake.c18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator
38 case CHALLENGE: in eap_sake_state_txt()
68 data->state = CHALLENGE; in eap_sake_init()
222 case CHALLENGE: in eap_sake_buildReq()
271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check()
297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity()
309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
Deap_server_mschapv2.c51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state; enumerator
65 data->state = CHALLENGE; in eap_mschapv2_init()
229 case CHALLENGE: in eap_mschapv2_buildReq()
260 if (data->state == CHALLENGE && in eap_mschapv2_check()
523 case CHALLENGE: in eap_mschapv2_process()
Deap_server_sim.c34 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE enumerator
52 case CHALLENGE: in eap_sim_state_txt()
350 case CHALLENGE: in eap_sim_buildReq()
395 case CHALLENGE: in eap_sim_unexpected_subtype()
644 eap_sim_state(data, CHALLENGE); in eap_sim_process_start()
829 (data->state == START || data->state == CHALLENGE || in eap_sim_process()
849 case CHALLENGE: in eap_sim_process()
Deap_server_aka.c37 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE enumerator
67 case CHALLENGE: in eap_aka_state_txt()
653 case CHALLENGE: in eap_aka_buildReq()
700 case CHALLENGE: in eap_aka_subtype_ok()
936 eap_aka_state(data, CHALLENGE); in eap_aka_fullauth()
1319 case CHALLENGE: in eap_aka_process()
/external/python/cpython2/Lib/multiprocessing/
Dconnection.py412 CHALLENGE = b'#CHALLENGE#' variable
420 connection.send_bytes(CHALLENGE + message)
433 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
434 message = message[len(CHALLENGE):]
/external/wpa_supplicant_8/src/eap_peer/
Deap_sake.c17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator
42 case CHALLENGE: in eap_sake_state_txt()
177 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity()
195 if (data->state != IDENTITY && data->state != CHALLENGE) { in eap_sake_process_challenge()
202 eap_sake_state(data, CHALLENGE); in eap_sake_process_challenge()
/external/openthread/tests/scripts/thread-cert/
Dv1_2_LowPower_6_1_07_PreferringARouterOverAReed.py119 .filter_mle_has_tlv(TlvType.CHALLENGE, TlvType.MODE) \
137 .filter_mle_has_tlv(TlvType.CHALLENGE, TlvType.MODE) \
Dconfig.py254 mle.TlvType.CHALLENGE: mle.ChallengeFactory(),
Dmle.py71 CHALLENGE = 3 variable in TlvType
/external/python/cpython3/Lib/multiprocessing/
Dconnection.py733 CHALLENGE = b'#CHALLENGE#' variable
743 connection.send_bytes(CHALLENGE + message)
758 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
759 message = message[len(CHALLENGE):]
/external/mtpd/
Dl2tp.c78 #define CHALLENGE htons(11) macro
347 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); in l2tp_connect()
504 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE); in answer_challenge()
/external/python/cpython2/Lib/test/
Dtest_multiprocessing.py2459 return multiprocessing.connection.CHALLENGE
/external/python/cpython3/Lib/test/
D_test_multiprocessing.py4595 return multiprocessing.connection.CHALLENGE