/minix3/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
H A D | apop.c | 70 heim_apop_create(const char *challenge, const char *password) in heim_apop_create() 90 heim_apop_verify(const char *challenge, const char *password, const char *response) in heim_apop_verify() 197 heim_cram_md5_verify_ctx(heim_cram_md5 ctx, const char *challenge, const char *response) in heim_cram_md5_verify_ctx() 230 heim_cram_md5_create(const char *challenge, const char *password) in heim_cram_md5_create() 250 heim_cram_md5_verify(const char *challenge, const char *password, const char *response) in heim_cram_md5_verify()
|
H A D | heimntlm.h | 134 unsigned char challenge[8]; /**< */ member
|
H A D | digest.c | 355 heim_digest_parse_challenge(heim_digest_t context, const char *challenge) in heim_digest_parse_challenge()
|
H A D | ntlm.c | 1018 unsigned char *challenge, in splitandenc()
|
/minix3/crypto/external/bsd/netpgp/dist/src/libpaa/ |
H A D | libpaa.c | 67 genchallenge(paa_challenge_t *challenge, paa_server_info_t *server) in genchallenge() 189 paa_format_challenge(paa_challenge_t *challenge, paa_server_info_t *server, char *buf, size_t size) in paa_format_challenge() 229 char challenge[2048 * 2]; in paa_format_response() local 267 paa_check_response(paa_challenge_t *challenge, paa_identity_t *id, netpgp_t *netpgp, char *response) in paa_check_response()
|
H A D | client.c | 47 char challenge[2048]; in main() local
|
H A D | server.c | 46 paa_challenge_t challenge; in main() local
|
H A D | libpaa.h | 52 char challenge[512]; /* the output challenge */ member 63 char challenge[PAA_CHALLENGE_SIZE]; /* input challenge */ member
|
/minix3/minix/lib/liblwip/dist/src/netif/ppp/ |
H A D | chap-md5.c | 63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response() 96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response()
|
H A D | chap_ms.c | 225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { in chapms_generate_challenge() 237 static void chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { in chapms2_generate_challenge() 251 const unsigned char *challenge, const unsigned char *response, in chapms_verify_response() 299 const unsigned char *challenge, const unsigned char *response, in chapms2_verify_response() 375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response() 386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response() 496 static void ChallengeResponse(const u_char *challenge, in ChallengeResponse()
|
H A D | chap-new.c | 413 const unsigned char *challenge, const unsigned char *response,
|
/minix3/crypto/external/bsd/openssl/dist/apps/ |
H A D | spkac.c | 93 char *challenge = NULL, *keyfile = NULL; in MAIN() local
|
/minix3/crypto/external/bsd/heimdal/dist/kuser/ |
H A D | kdigest.c | 278 unsigned char md[SHA_DIGEST_LENGTH], challenge[SHA_DIGEST_LENGTH]; in client_mschapv2() local 438 krb5_data challenge, opaque; in ntlm_server_init() local
|
/minix3/minix/lib/liblwip/dist/src/include/netif/ppp/ |
H A D | chap-new.h | 167 unsigned char challenge[CHAL_MAX_PKTLEN]; member
|
/minix3/lib/libtelnet/ |
H A D | spx.c | 107 static Block challenge = { 0 }; variable
|
/minix3/crypto/external/bsd/openssl/dist/ssl/ |
H A D | ssl2.h | 196 unsigned char challenge[SSL2_MAX_CHALLENGE_LENGTH]; member
|
/minix3/usr.bin/ftp/ |
H A D | fetch.c | 156 auth_url(const char *challenge, char **response, const char *guser, in auth_url()
|
/minix3/external/bsd/tcpdump/dist/ |
H A D | print-802_11.c | 284 struct challenge_t challenge; member 1304 struct challenge_t challenge; in parse_elements() local
|
/minix3/crypto/external/bsd/libsaslc/dist/src/ |
H A D | mech_digestmd5.c | 1591 saslc__mech_digestmd5_parse_challenge(saslc_sess_t *sess, const char *challenge) in saslc__mech_digestmd5_parse_challenge()
|
/minix3/crypto/external/bsd/openssl/dist/crypto/x509/ |
H A D | x509.h | 515 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member
|