HomeSort by relevance Sort by last modified time
    Searched full:nt_response (Results 1 - 21 of 21) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
mschapv2.c 47 u8 *nt_response, u8 *auth_response,
74 password, nt_response);
77 username, username_len, nt_response, auth_response);
83 password, password_len, nt_response);
87 nt_response, auth_response);
90 nt_response, MSCHAPV2_NT_RESPONSE_LEN);
101 get_master_key(password_hash_hash, nt_response, master_key);
mschapv2.h 29 u8 *nt_response, u8 *auth_response,
eap_mschapv2.c 48 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response
58 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password
214 peer_challenge, r->nt_response,
580 cp->nt_response);
582 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN);
590 cp->nt_response, data->auth_response);
597 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 47 u8 *nt_response, u8 *auth_response,
74 password, nt_response);
77 username, username_len, nt_response, auth_response);
83 password, password_len, nt_response);
87 nt_response, auth_response);
90 nt_response, MSCHAPV2_NT_RESPONSE_LEN);
103 get_master_key(password_hash_hash, nt_response, master_key);
mschapv2.h 29 u8 *nt_response, u8 *auth_response,
eap_mschapv2.c 49 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response
59 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password
215 peer_challenge, r->nt_response,
586 cp->nt_response);
588 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN);
596 cp->nt_response, data->auth_response);
603 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
  /external/wpa_supplicant/
ms_funcs.h 31 const u8 *nt_response, u8 *response);
36 const u8 *nt_response, u8 *response);
45 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
ms_funcs.c 161 * @nt_response: 24-octet NT-Response (IN)
173 const u8 *nt_response, u8 *response)
196 addr1[1] = nt_response;
216 * @nt_response: 24-octet NT-Response (IN)
228 const u8 *nt_response, u8 *response)
235 nt_response, response);
258 * @nt_response: 24-octet NTResponse (IN)
261 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
274 addr[1] = nt_response;
eap_mschapv2.c 50 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response
60 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password
185 u8 *nt_response)
199 password, password_len, nt_response);
200 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: response", nt_response,
206 username, username_len, nt_response,
214 get_master_key(password_hash_hash, nt_response, data->master_key);
286 r->nt_response);
633 cp->nt_response);
635 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN)
    [all...]
eap_ttls.c 725 get_master_key(pw_hash_hash, pos /* nt_response */,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
ms_funcs.h 31 const u8 *nt_response, u8 *response);
36 const u8 *nt_response, u8 *response);
45 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
ms_funcs.c 161 * @nt_response: 24-octet NT-Response (IN)
173 const u8 *nt_response, u8 *response)
196 addr1[1] = nt_response;
216 * @nt_response: 24-octet NT-Response (IN)
228 const u8 *nt_response, u8 *response)
235 nt_response, response);
258 * @nt_response: 24-octet NTResponse (IN)
261 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
274 addr[1] = nt_response;
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 31 const u8 *nt_response, u8 *response);
36 const u8 *nt_response, u8 *response);
45 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
ms_funcs.c 172 * @nt_response: 24-octet NT-Response (IN)
185 const u8 *nt_response, u8 *response)
208 addr1[1] = nt_response;
230 * @nt_response: 24-octet NT-Response (IN)
243 const u8 *nt_response, u8 *response)
250 username, username_len, nt_response, response);
276 * @nt_response: 24-octet NTResponse (IN)
280 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
293 addr[1] = nt_response;
  /external/wpa_supplicant/tests/
test_ms_funcs.c 36 u8 nt_response[] = { local
82 if (memcmp(nt_response, buf, sizeof(nt_response)) != 0) {
96 nt_response, buf);
103 get_master_key(password_hash_hash, nt_response, buf);
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_ms_funcs.c 36 u8 nt_response[] = { local
82 if (memcmp(nt_response, buf, sizeof(nt_response)) != 0) {
96 nt_response, buf);
103 get_master_key(password_hash_hash, nt_response, buf);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_ttls.c 740 u8 *chal, nt_response[24]; local
780 challenge_response(challenge, sm->user->password, nt_response);
783 sm->user->password_len, nt_response);
785 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) {
794 nt_response, 24);
806 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
874 nt_response);
880 nt_response);
884 if (os_memcmp(nt_response, rx_resp, 24) == 0) {
902 get_master_key(pw_hash_hash, nt_response, master_key)
    [all...]
eap_mschapv2.c 292 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
320 nt_response = pos;
333 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
388 if (os_memcmp(nt_response, expected, 24) == 0) {
408 username, username_len, nt_response,
412 get_master_key(pw_hash_hash, nt_response, data->master_key);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 718 u8 *chal, nt_response[24]; local
758 challenge_response(challenge, sm->user->password, nt_response);
761 sm->user->password_len, nt_response);
763 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) {
772 nt_response, 24);
784 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
852 nt_response);
858 nt_response);
862 if (os_memcmp(nt_response, rx_resp, 24) == 0) {
880 get_master_key(pw_hash_hash, nt_response, master_key)
    [all...]
eap_server_mschapv2.c 293 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
322 nt_response = pos;
335 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
395 if (os_memcmp(nt_response, expected, 24) == 0) {
415 username, username_len, nt_response,
419 get_master_key(pw_hash_hash, nt_response, data->master_key);
  /external/ppp/pppd/plugins/
winbind.c 258 const u_char *nt_response,
381 sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]);
556 u_char *nt_response = NULL; local
568 nt_response = rmd->NTResp;
591 nt_response,
592 nt_response ? nt_response_size: 0,

Completed in 1302 milliseconds