Home
last modified time | relevance | path

Searched refs:chal (Results 1 - 5 of 5) sorted by relevance

/third_party/node/deps/openssl/openssl/crypto/asn1/
H A Dt_spki.c23 ASN1_IA5STRING *chal; in NETSCAPE_SPKI_print() local
39 chal = spki->spkac->challenge; in NETSCAPE_SPKI_print()
40 if (chal->length) in NETSCAPE_SPKI_print()
41 BIO_printf(out, " Challenge String: %.*s\n", chal->length, chal->data); in NETSCAPE_SPKI_print()
/third_party/openssl/crypto/asn1/
H A Dt_spki.c23 ASN1_IA5STRING *chal; in NETSCAPE_SPKI_print() local
39 chal = spki->spkac->challenge; in NETSCAPE_SPKI_print()
40 if (chal->length) in NETSCAPE_SPKI_print()
41 BIO_printf(out, " Challenge String: %.*s\n", chal->length, chal->data); in NETSCAPE_SPKI_print()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_ttls.c561 u8 *chal, hash[CHAP_MD5_LEN]; in eap_ttls_process_phase2_chap() local
582 chal = eap_ttls_implicit_challenge(sm, data, in eap_ttls_process_phase2_chap()
584 if (chal == NULL) { in eap_ttls_process_phase2_chap()
591 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap()
593 password[0] != chal[EAP_TTLS_CHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_chap()
595 os_free(chal); in eap_ttls_process_phase2_chap()
599 os_free(chal); in eap_ttls_process_phase2_chap()
622 u8 *chal, nt_response[24]; in eap_ttls_process_phase2_mschap() local
643 chal = eap_ttls_implicit_challenge(sm, data, in eap_ttls_process_phase2_mschap()
645 if (chal in eap_ttls_process_phase2_mschap()
698 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, eap_ttls_process_phase2_mschapv2() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_ttls.c562 u8 *chal, hash[CHAP_MD5_LEN]; in eap_ttls_process_phase2_chap() local
583 chal = eap_ttls_implicit_challenge(sm, data, in eap_ttls_process_phase2_chap()
585 if (chal == NULL) { in eap_ttls_process_phase2_chap()
592 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap()
594 password[0] != chal[EAP_TTLS_CHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_chap()
596 os_free(chal); in eap_ttls_process_phase2_chap()
600 os_free(chal); in eap_ttls_process_phase2_chap()
623 u8 *chal, nt_response[24]; in eap_ttls_process_phase2_mschap() local
644 chal = eap_ttls_implicit_challenge(sm, data, in eap_ttls_process_phase2_mschap()
646 if (chal in eap_ttls_process_phase2_mschap()
699 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, eap_ttls_process_phase2_mschapv2() local
[all...]
/third_party/python/Lib/urllib/
H A Drequest.py1125 chal = parse_keqv_list(filter(None, parse_http_list(challenge)))
1126 auth = self.get_authorization(req, chal)
1146 def get_authorization(self, req, chal):
1148 realm = chal['realm']
1149 nonce = chal['nonce']
1150 qop = chal.get('qop')
1151 algorithm = chal.get('algorithm', 'MD5')
1154 opaque = chal.get('opaque', None)
1168 entdig = self.get_entity_digest(req.data, chal)
1221 def get_entity_digest(self, data, chal)
[all...]

Completed in 5 milliseconds