Searched refs:server_challenge (Results 1 – 6 of 6) sorted by relevance
/external/cronet/net/ntlm/ |
D | ntlm.h | 54 base::span<const uint8_t, kChallengeLen> server_challenge, 70 base::span<const uint8_t, kChallengeLen> server_challenge, 88 base::span<const uint8_t, kChallengeLen> server_challenge, 97 base::span<const uint8_t, kChallengeLen> server_challenge, 108 base::span<const uint8_t, kChallengeLen> server_challenge, 150 base::span<const uint8_t, kChallengeLen> server_challenge,
|
D | ntlm.cc | 219 base::span<const uint8_t, kChallengeLen> server_challenge, in GenerateNtlmResponseV1() argument 223 GenerateResponseDesl(ntlm_hash, server_challenge, ntlm_response); in GenerateNtlmResponseV1() 228 base::span<const uint8_t, kChallengeLen> server_challenge, in GenerateResponsesV1() argument 231 GenerateNtlmResponseV1(password, server_challenge, ntlm_response); in GenerateResponsesV1() 248 base::span<const uint8_t, kChallengeLen> server_challenge, in GenerateSessionHashV1WithSessionSecurity() argument 253 MD5_Update(&ctx, server_challenge.data(), kChallengeLen); in GenerateSessionHashV1WithSessionSecurity() 260 base::span<const uint8_t, kChallengeLen> server_challenge, in GenerateNtlmResponseV1WithSessionSecurity() argument 269 GenerateSessionHashV1WithSessionSecurity(server_challenge, client_challenge, in GenerateNtlmResponseV1WithSessionSecurity() 279 base::span<const uint8_t, kChallengeLen> server_challenge, in GenerateResponsesV1WithSessionSecurity() argument 284 GenerateNtlmResponseV1WithSessionSecurity(password, server_challenge, in GenerateResponsesV1WithSessionSecurity() [all …]
|
D | ntlm_client.cc | 27 base::span<uint8_t, kChallengeLen> server_challenge) { in ParseChallengeMessage() argument 33 challenge_reader.ReadBytes(server_challenge); in ParseChallengeMessage() 41 base::span<uint8_t, kChallengeLen> server_challenge, in ParseChallengeMessageV2() argument 48 challenge_reader.ReadBytes(server_challenge) && in ParseChallengeMessageV2() 214 uint8_t server_challenge[kChallengeLen]; in GenerateAuthenticateMessage() local 227 server_challenge, &av_pairs)) { in GenerateAuthenticateMessage() 245 GenerateNtlmProofV2(v2_hash, server_challenge, in GenerateAuthenticateMessage() 251 server_challenge)) { in GenerateAuthenticateMessage() 256 GenerateResponsesV1WithSessionSecurity(password, server_challenge, in GenerateAuthenticateMessage()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_fast_common.h | 72 u8 server_challenge[16]; /* MSCHAPv2 ServerChallenge */ member
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_fast.c | 325 data->key_block_p->server_challenge, in eap_fast_derive_key_provisioning() 326 sizeof(data->key_block_p->server_challenge)); in eap_fast_derive_key_provisioning() 950 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_phase2_init()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_fast.c | 323 data->key_block_p->server_challenge, in eap_fast_derive_key_provisioning() 324 sizeof(data->key_block_p->server_challenge)); in eap_fast_derive_key_provisioning() 354 sm->auth_challenge = data->key_block_p->server_challenge; in eap_fast_init_phase2_method()
|