Home
last modified time | relevance | path

Searched defs:challenge (Results 1 – 25 of 109) sorted by relevance

12345

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash()
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
204 u8 challenge[8]; in generate_nt_response_pwhash() local
247 u8 password_hash_hash[16], challenge[8]; in generate_authenticator_response_pwhash() local
306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash()
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
204 u8 challenge[8]; in generate_nt_response_pwhash() local
247 u8 password_hash_hash[16], challenge[8]; in generate_authenticator_response_pwhash() local
306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response()
/third_party/lwip/src/netif/ppp/
Dchap_ms.c225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { in chapms_generate_challenge()
237 static void chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { in chapms2_generate_challenge()
251 const unsigned char *challenge, const unsigned char *response, in chapms_verify_response()
299 const unsigned char *challenge, const unsigned char *response, in chapms2_verify_response()
375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response()
386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response()
496 static void ChallengeResponse(const u_char *challenge, in ChallengeResponse()
Dchap-md5.c63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response()
96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response()
Dchap-new.c413 const unsigned char *challenge, const unsigned char *response,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5()
/third_party/node/deps/npm/node_modules/sigstore/dist/ca/
Dformat.js4 function toCertificateRequest(identityToken, publicKey, challenge) { argument
Dindex.js15 async createSigningCertificate(identityToken, publicKey, challenge) { argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
/third_party/curl/lib/
Dsmb.h41 unsigned char challenge[8]; member
/third_party/openssl/apps/
Dspkac.c66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
/third_party/node/deps/openssl/openssl/apps/
Dspkac.c66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
/third_party/python/Lib/
Dsmtplib.py664 def auth_cram_md5(self, challenge=None): argument
673 def auth_plain(self, challenge=None): argument
678 def auth_login(self, challenge=None): argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
Deap_server_ttls.c557 const u8 *challenge, in eap_ttls_process_phase2_chap()
620 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap()
695 u8 *challenge, in eap_ttls_process_phase2_mschapv2()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
Deap_server_ttls.c556 const u8 *challenge, in eap_ttls_process_phase2_chap()
619 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap()
694 u8 *challenge, in eap_ttls_process_phase2_mschapv2()
/third_party/openssl/crypto/ec/curve448/
Deddsa.c232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local
331 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/
Deddsa.c232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local
331 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local
/third_party/lwip/src/include/netif/ppp/
Dchap-new.h171 unsigned char challenge[CHAL_MAX_PKTLEN]; member
/third_party/gstreamer/gstplugins_bad/gst/rtmp2/rtmp/
Drtmpclient.c521 const gchar * salt, const gchar * opaque, const gchar * challenge) in do_adobe_auth()
991 const gchar * challenge) in send_secure_token_response()

12345