Home
last modified time | relevance | path

Searched defs:challenge (Results 1 – 25 of 50) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash()
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
204 u8 challenge[8]; in generate_nt_response_pwhash() local
247 u8 password_hash_hash[16], challenge[8]; in generate_authenticator_response_pwhash() local
306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash()
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
204 u8 challenge[8]; in generate_nt_response_pwhash() local
247 u8 password_hash_hash[16], challenge[8]; in generate_authenticator_response_pwhash() local
306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response()
/third_party/lwip/src/netif/ppp/
Dchap-md5.c63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response()
96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response()
Dchap_ms.c225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { in chapms_generate_challenge()
237 static void chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { in chapms2_generate_challenge()
251 const unsigned char *challenge, const unsigned char *response, in chapms_verify_response()
299 const unsigned char *challenge, const unsigned char *response, in chapms2_verify_response()
375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response()
386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response()
496 static void ChallengeResponse(const u_char *challenge, in ChallengeResponse()
Dchap-new.c413 const unsigned char *challenge, const unsigned char *response,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
/third_party/openssl/crypto/ec/curve448/
Deddsa.c202 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in c448_ed448_sign() local
296 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in c448_ed448_verify() local
/third_party/libsoup/libsoup/
Dsoup-auth-domain.h31 char * (*challenge) (SoupAuthDomain *domain, member
Dsoup-auth-manager.c320 GString *challenge; in soup_auth_manager_extract_challenge() local
356 char *challenge = NULL; in create_auth() local
382 char *challenge = NULL; in check_auth() local
Dsoup-auth-domain-basic.c263 GString *challenge; in soup_auth_domain_basic_challenge() local
Dsoup-auth-domain.c623 char *challenge; in soup_auth_domain_challenge() local
/third_party/openssl/apps/
Dspkac.c57 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
/third_party/python/Lib/
Dsmtplib.py664 def auth_cram_md5(self, challenge=None): argument
673 def auth_plain(self, challenge=None): argument
678 def auth_login(self, challenge=None): argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
Deap_server_ttls.c557 const u8 *challenge, in eap_ttls_process_phase2_chap()
620 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap()
695 u8 *challenge, in eap_ttls_process_phase2_mschapv2()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
Deap_server_ttls.c556 const u8 *challenge, in eap_ttls_process_phase2_chap()
619 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap()
694 u8 *challenge, in eap_ttls_process_phase2_mschapv2()
/third_party/lwip/src/include/netif/ppp/
Dchap-new.h171 unsigned char challenge[CHAL_MAX_PKTLEN]; member
/third_party/glib/gio/
Dgdbusauthmechanismsha1.c240 GString *challenge; in random_ascii_string() local
252 GString *challenge; in random_blob() local
/third_party/gstreamer/gstplugins_bad/gst/rtmp2/rtmp/
Drtmpclient.c521 const gchar * salt, const gchar * opaque, const gchar * challenge) in do_adobe_auth()
991 const gchar * challenge) in send_secure_token_response()

12