/external/libese/ready_se/google/keymint/KM200/Applet/src/com/android/javacard/keymaster/ |
D | KMVerificationToken.java | 32 public static final byte CHALLENGE = 0x00; field in KMVerificationToken 43 arr.add(CHALLENGE, KMInteger.exp()); in exp() 60 arr.add(CHALLENGE, KMInteger.uint_16((short) 0)); in instance() 99 return KMArray.cast(arrPtr).get(CHALLENGE); in getChallenge() 105 KMArray.cast(arrPtr).add(CHALLENGE, vals); in setChallenge()
|
D | KMHardwareAuthToken.java | 32 public static final byte CHALLENGE = 0x00; field in KMHardwareAuthToken 46 arr.add(CHALLENGE, KMInteger.exp()); in exp() 66 arr.add(CHALLENGE, KMInteger.uint_16((short) 0)); in instance() 108 return KMArray.cast(arrPtr).get(CHALLENGE); in getChallenge() 114 KMArray.cast(arrPtr).add(CHALLENGE, vals); in setChallenge()
|
D | KMRemotelyProvisionedComponentDevice.java | 160 private static final byte CHALLENGE = 6; field in KMRemotelyProvisionedComponentDevice 542 short dataEntryIndex = createEntry(CHALLENGE, challengeLen); in processUpdateChallenge() 957 short dataEntryIndex = getEntry(CHALLENGE); in createSignedMac() 958 short challengePtr = KMByteBlob.instance(data, dataEntryIndex, getEntryLength(CHALLENGE)); in createSignedMac()
|
/external/libese/ready_se/google/keymint/KM300/Applet/src/com/android/javacard/keymaster/ |
D | KMVerificationToken.java | 32 public static final byte CHALLENGE = 0x00; field in KMVerificationToken 43 arr.add(CHALLENGE, KMInteger.exp()); in exp() 60 arr.add(CHALLENGE, KMInteger.uint_16((short) 0)); in instance() 99 return KMArray.cast(arrPtr).get(CHALLENGE); in getChallenge() 105 KMArray.cast(arrPtr).add(CHALLENGE, vals); in setChallenge()
|
D | KMHardwareAuthToken.java | 32 public static final byte CHALLENGE = 0x00; field in KMHardwareAuthToken 46 arr.add(CHALLENGE, KMInteger.exp()); in exp() 66 arr.add(CHALLENGE, KMInteger.uint_16((short) 0)); in instance() 108 return KMArray.cast(arrPtr).get(CHALLENGE); in getChallenge() 114 KMArray.cast(arrPtr).add(CHALLENGE, vals); in setChallenge()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator 38 case CHALLENGE: in eap_sake_state_txt() 68 data->state = CHALLENGE; in eap_sake_init() 222 case CHALLENGE: in eap_sake_buildReq() 271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check() 297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity() 309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
|
D | eap_server_mschapv2.c | 51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state; enumerator 65 data->state = CHALLENGE; in eap_mschapv2_init() 229 case CHALLENGE: in eap_mschapv2_buildReq() 260 if (data->state == CHALLENGE && in eap_mschapv2_check() 523 case CHALLENGE: in eap_mschapv2_process()
|
D | eap_server_sim.c | 34 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE enumerator 52 case CHALLENGE: in eap_sim_state_txt() 350 case CHALLENGE: in eap_sim_buildReq() 395 case CHALLENGE: in eap_sim_unexpected_subtype() 644 eap_sim_state(data, CHALLENGE); in eap_sim_process_start() 829 (data->state == START || data->state == CHALLENGE || in eap_sim_process() 849 case CHALLENGE: in eap_sim_process()
|
D | eap_server_aka.c | 37 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE enumerator 67 case CHALLENGE: in eap_aka_state_txt() 653 case CHALLENGE: in eap_aka_buildReq() 700 case CHALLENGE: in eap_aka_subtype_ok() 936 eap_aka_state(data, CHALLENGE); in eap_aka_fullauth() 1319 case CHALLENGE: in eap_aka_process()
|
/external/python/cpython2/Lib/multiprocessing/ |
D | connection.py | 412 CHALLENGE = b'#CHALLENGE#' variable 420 connection.send_bytes(CHALLENGE + message) 433 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 434 message = message[len(CHALLENGE):]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sake.c | 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator 42 case CHALLENGE: in eap_sake_state_txt() 177 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity() 195 if (data->state != IDENTITY && data->state != CHALLENGE) { in eap_sake_process_challenge() 202 eap_sake_state(data, CHALLENGE); in eap_sake_process_challenge()
|
/external/openthread/tests/scripts/thread-cert/ |
D | v1_2_LowPower_6_1_07_PreferringARouterOverAReed.py | 119 .filter_mle_has_tlv(TlvType.CHALLENGE, TlvType.MODE) \ 137 .filter_mle_has_tlv(TlvType.CHALLENGE, TlvType.MODE) \
|
D | config.py | 254 mle.TlvType.CHALLENGE: mle.ChallengeFactory(),
|
D | mle.py | 71 CHALLENGE = 3 variable in TlvType
|
/external/python/cpython3/Lib/multiprocessing/ |
D | connection.py | 733 CHALLENGE = b'#CHALLENGE#' variable 743 connection.send_bytes(CHALLENGE + message) 758 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 759 message = message[len(CHALLENGE):]
|
/external/mtpd/ |
D | l2tp.c | 78 #define CHALLENGE htons(11) macro 347 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); in l2tp_connect() 504 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE); in answer_challenge()
|
/external/python/cpython2/Lib/test/ |
D | test_multiprocessing.py | 2459 return multiprocessing.connection.CHALLENGE
|
/external/python/cpython3/Lib/test/ |
D | _test_multiprocessing.py | 4595 return multiprocessing.connection.CHALLENGE
|