Searched refs:server_challenge (Results 1 - 5 of 5) sorted by relevance
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | mschap.h | 86 const uint8_t server_challenge[MSCHAP_NT_CHALLENGE_SIZE],
|
H A D | mschap.c | 222 const uint8_t server_challenge[MSCHAP_NT_CHALLENGE_SIZE], 244 bcopy(server_challenge, input + offset, MSCHAP_NT_CHALLENGE_SIZE); 248 NTChallengeResponse(server_challenge, unicode_password, 219 NTSessionKey16(const uint8_t * password, uint32_t password_len, const uint8_t client_challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t server_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t server_challenge[MSCHAP_NT_CHALLENGE_SIZE], uint8_t key[NT_SESSION_KEY_SIZE]) argument
|
H A D | eapmschapv2_plugin.c | 391 CFDataRef server_challenge; local 410 server_challenge 413 if (server_challenge != NULL) { 414 if (CFDataGetLength(server_challenge) 418 CFDataGetLength(server_challenge), 424 memcpy(context->auth_challenge, CFDataGetBytePtr(server_challenge),
|
H A D | eapfast_plugin.c | 1330 CFDataRef server_challenge; local 1334 server_challenge 1340 server_challenge); 1341 CFRelease(server_challenge); 1514 * session_key_seed, server_challenge, and client_challenge buffers. 1534 uint8_t server_challenge[MSCHAP2_CHALLENGE_SIZE], 1607 memcpy(server_challenge, key_block + key_block_offset, 1532 eapfast_generate_key_material(EAPFASTPluginDataRef context, uint8_t session_key_seed[SESSION_KEY_SEED_LENGTH], uint8_t server_challenge[MSCHAP2_CHALLENGE_SIZE], uint8_t client_challenge[MSCHAP2_CHALLENGE_SIZE]) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/ |
H A D | test_ntlm.c | 266 const unsigned char server_challenge[8] = local 274 server_challenge,
|
Completed in 183 milliseconds