/external/cronet/tot/net/ntlm/ |
D | ntlm.h | 79 base::span<const uint8_t, kChallengeLen> client_challenge, 88 base::span<const uint8_t, kChallengeLen> client_challenge, 97 base::span<const uint8_t, kChallengeLen> client_challenge, 108 base::span<const uint8_t, kChallengeLen> client_challenge, 138 base::span<const uint8_t, kChallengeLen> client_challenge);
|
D | ntlm.cc | 244 base::span<const uint8_t, kChallengeLen> client_challenge, in GenerateLMResponseV1WithSessionSecurity() argument 248 memcpy(lm_response.data(), client_challenge.data(), kChallengeLen); in GenerateLMResponseV1WithSessionSecurity() 254 base::span<const uint8_t, kChallengeLen> client_challenge, in GenerateSessionHashV1WithSessionSecurity() argument 259 MD5_Update(&ctx, client_challenge.data(), kChallengeLen); in GenerateSessionHashV1WithSessionSecurity() 266 base::span<const uint8_t, kChallengeLen> client_challenge, in GenerateNtlmResponseV1WithSessionSecurity() argument 274 GenerateSessionHashV1WithSessionSecurity(server_challenge, client_challenge, in GenerateNtlmResponseV1WithSessionSecurity() 285 base::span<const uint8_t, kChallengeLen> client_challenge, in GenerateResponsesV1WithSessionSecurity() argument 288 GenerateLMResponseV1WithSessionSecurity(client_challenge, lm_response); in GenerateResponsesV1WithSessionSecurity() 290 client_challenge, ntlm_response); in GenerateResponsesV1WithSessionSecurity() 327 base::span<const uint8_t, kChallengeLen> client_challenge) { in GenerateProofInputV2() argument [all …]
|
D | ntlm_client.h | 98 base::span<const uint8_t, kChallengeLen> client_challenge, 109 base::span<const uint8_t, 8> client_challenge, in GenerateAuthenticateMessageV1() argument 115 client_challenge, server_challenge_message); in GenerateAuthenticateMessageV1()
|
D | ntlm_client.cc | 198 base::span<const uint8_t, kChallengeLen> client_challenge, in GenerateAuthenticateMessage() argument 249 v2_proof_input = GenerateProofInputV2(timestamp, client_challenge); in GenerateAuthenticateMessage() 263 client_challenge, lm_response, in GenerateAuthenticateMessage()
|
/external/cronet/stable/net/ntlm/ |
D | ntlm.h | 79 base::span<const uint8_t, kChallengeLen> client_challenge, 88 base::span<const uint8_t, kChallengeLen> client_challenge, 97 base::span<const uint8_t, kChallengeLen> client_challenge, 108 base::span<const uint8_t, kChallengeLen> client_challenge, 138 base::span<const uint8_t, kChallengeLen> client_challenge);
|
D | ntlm.cc | 244 base::span<const uint8_t, kChallengeLen> client_challenge, in GenerateLMResponseV1WithSessionSecurity() argument 248 memcpy(lm_response.data(), client_challenge.data(), kChallengeLen); in GenerateLMResponseV1WithSessionSecurity() 254 base::span<const uint8_t, kChallengeLen> client_challenge, in GenerateSessionHashV1WithSessionSecurity() argument 259 MD5_Update(&ctx, client_challenge.data(), kChallengeLen); in GenerateSessionHashV1WithSessionSecurity() 266 base::span<const uint8_t, kChallengeLen> client_challenge, in GenerateNtlmResponseV1WithSessionSecurity() argument 274 GenerateSessionHashV1WithSessionSecurity(server_challenge, client_challenge, in GenerateNtlmResponseV1WithSessionSecurity() 285 base::span<const uint8_t, kChallengeLen> client_challenge, in GenerateResponsesV1WithSessionSecurity() argument 288 GenerateLMResponseV1WithSessionSecurity(client_challenge, lm_response); in GenerateResponsesV1WithSessionSecurity() 290 client_challenge, ntlm_response); in GenerateResponsesV1WithSessionSecurity() 327 base::span<const uint8_t, kChallengeLen> client_challenge) { in GenerateProofInputV2() argument [all …]
|
D | ntlm_client.h | 98 base::span<const uint8_t, kChallengeLen> client_challenge, 109 base::span<const uint8_t, 8> client_challenge, in GenerateAuthenticateMessageV1() argument 115 client_challenge, server_challenge_message); in GenerateAuthenticateMessageV1()
|
D | ntlm_client.cc | 198 base::span<const uint8_t, kChallengeLen> client_challenge, in GenerateAuthenticateMessage() argument 249 v2_proof_input = GenerateProofInputV2(timestamp, client_challenge); in GenerateAuthenticateMessage() 263 client_challenge, lm_response, in GenerateAuthenticateMessage()
|
/external/cronet/tot/net/http/ |
D | http_auth_ntlm_mechanism.cc | 151 uint8_t client_challenge[8]; in GenerateAuthToken() local 152 g_generate_random_proc(base::span<uint8_t>(client_challenge)); in GenerateAuthToken() 156 g_get_ms_time_proc(), client_challenge, in GenerateAuthToken()
|
/external/cronet/stable/net/http/ |
D | http_auth_ntlm_mechanism.cc | 151 uint8_t client_challenge[8]; in GenerateAuthToken() local 152 g_generate_random_proc(base::span<uint8_t>(client_challenge)); in GenerateAuthToken() 156 g_get_ms_time_proc(), client_challenge, in GenerateAuthToken()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_fast_common.h | 73 u8 client_challenge[16]; /* MSCHAPv2 ClientChallenge */ member
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_fast.c | 328 data->key_block_p->client_challenge, in eap_fast_derive_key_provisioning() 329 sizeof(data->key_block_p->client_challenge)); in eap_fast_derive_key_provisioning() 951 sm->peer_challenge = data->key_block_p->client_challenge; in eap_fast_phase2_init()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_fast.c | 326 data->key_block_p->client_challenge, in eap_fast_derive_key_provisioning() 327 sizeof(data->key_block_p->client_challenge)); in eap_fast_derive_key_provisioning() 355 sm->peer_challenge = data->key_block_p->client_challenge; in eap_fast_init_phase2_method()
|