/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 204 u8 challenge[8]; in generate_nt_response_pwhash() local 247 u8 password_hash_hash[16], challenge[8]; in generate_authenticator_response_pwhash() local 306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 204 u8 challenge[8]; in generate_nt_response_pwhash() local 247 u8 password_hash_hash[16], challenge[8]; in generate_authenticator_response_pwhash() local 306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response()
|
/third_party/lwip/src/netif/ppp/ |
D | chap_ms.c | 225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { in chapms_generate_challenge() 237 static void chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { in chapms2_generate_challenge() 251 const unsigned char *challenge, const unsigned char *response, in chapms_verify_response() 299 const unsigned char *challenge, const unsigned char *response, in chapms2_verify_response() 375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response() 386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response() 496 static void ChallengeResponse(const u_char *challenge, in ChallengeResponse()
|
D | chap-md5.c | 63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response() 96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response()
|
D | chap-new.c | 413 const unsigned char *challenge, const unsigned char *response,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5()
|
/third_party/node/deps/npm/node_modules/sigstore/dist/ca/ |
D | format.js | 4 function toCertificateRequest(identityToken, publicKey, challenge) { argument
|
D | index.js | 15 async createSigningCertificate(identityToken, publicKey, challenge) { argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local
|
D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local
|
D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
|
/third_party/curl/lib/ |
D | smb.h | 41 unsigned char challenge[8]; member
|
/third_party/openssl/apps/ |
D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
|
/third_party/node/deps/openssl/openssl/apps/ |
D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
|
/third_party/python/Lib/ |
D | smtplib.py | 664 def auth_cram_md5(self, challenge=None): argument 673 def auth_plain(self, challenge=None): argument 678 def auth_login(self, challenge=None): argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member
|
D | eap_server_ttls.c | 557 const u8 *challenge, in eap_ttls_process_phase2_chap() 620 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() 695 u8 *challenge, in eap_ttls_process_phase2_mschapv2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member
|
D | eap_server_ttls.c | 556 const u8 *challenge, in eap_ttls_process_phase2_chap() 619 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() 694 u8 *challenge, in eap_ttls_process_phase2_mschapv2()
|
/third_party/openssl/crypto/ec/curve448/ |
D | eddsa.c | 232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local 331 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local
|
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/ |
D | eddsa.c | 232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local 331 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local
|
/third_party/lwip/src/include/netif/ppp/ |
D | chap-new.h | 171 unsigned char challenge[CHAL_MAX_PKTLEN]; member
|
/third_party/gstreamer/gstplugins_bad/gst/rtmp2/rtmp/ |
D | rtmpclient.c | 521 const gchar * salt, const gchar * opaque, const gchar * challenge) in do_adobe_auth() 991 const gchar * challenge) in send_secure_token_response()
|