/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
mschapv2.c | 47 u8 *nt_response, u8 *auth_response, 74 password, nt_response); 77 username, username_len, nt_response, auth_response); 83 password, password_len, nt_response); 87 nt_response, auth_response); 90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); 101 get_master_key(password_hash_hash, nt_response, master_key);
|
mschapv2.h | 29 u8 *nt_response, u8 *auth_response,
|
eap_mschapv2.c | 48 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response 58 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password 214 peer_challenge, r->nt_response, 580 cp->nt_response); 582 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); 590 cp->nt_response, data->auth_response); 597 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
|
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 47 u8 *nt_response, u8 *auth_response, 74 password, nt_response); 77 username, username_len, nt_response, auth_response); 83 password, password_len, nt_response); 87 nt_response, auth_response); 90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); 103 get_master_key(password_hash_hash, nt_response, master_key);
|
mschapv2.h | 29 u8 *nt_response, u8 *auth_response,
|
eap_mschapv2.c | 49 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response 59 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password 215 peer_challenge, r->nt_response, 586 cp->nt_response); 588 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); 596 cp->nt_response, data->auth_response); 603 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
|
/external/wpa_supplicant/ |
ms_funcs.h | 31 const u8 *nt_response, u8 *response); 36 const u8 *nt_response, u8 *response); 45 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
|
ms_funcs.c | 161 * @nt_response: 24-octet NT-Response (IN) 173 const u8 *nt_response, u8 *response) 196 addr1[1] = nt_response; 216 * @nt_response: 24-octet NT-Response (IN) 228 const u8 *nt_response, u8 *response) 235 nt_response, response); 258 * @nt_response: 24-octet NTResponse (IN) 261 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response, 274 addr[1] = nt_response;
|
eap_mschapv2.c | 50 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response 60 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password 185 u8 *nt_response) 199 password, password_len, nt_response); 200 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: response", nt_response, 206 username, username_len, nt_response, 214 get_master_key(password_hash_hash, nt_response, data->master_key); 286 r->nt_response); 633 cp->nt_response); 635 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN) [all...] |
eap_ttls.c | 725 get_master_key(pw_hash_hash, pos /* nt_response */, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.h | 31 const u8 *nt_response, u8 *response); 36 const u8 *nt_response, u8 *response); 45 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
|
ms_funcs.c | 161 * @nt_response: 24-octet NT-Response (IN) 173 const u8 *nt_response, u8 *response) 196 addr1[1] = nt_response; 216 * @nt_response: 24-octet NT-Response (IN) 228 const u8 *nt_response, u8 *response) 235 nt_response, response); 258 * @nt_response: 24-octet NTResponse (IN) 261 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response, 274 addr[1] = nt_response;
|
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 31 const u8 *nt_response, u8 *response); 36 const u8 *nt_response, u8 *response); 45 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
|
ms_funcs.c | 172 * @nt_response: 24-octet NT-Response (IN) 185 const u8 *nt_response, u8 *response) 208 addr1[1] = nt_response; 230 * @nt_response: 24-octet NT-Response (IN) 243 const u8 *nt_response, u8 *response) 250 username, username_len, nt_response, response); 276 * @nt_response: 24-octet NTResponse (IN) 280 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, 293 addr[1] = nt_response;
|
/external/wpa_supplicant/tests/ |
test_ms_funcs.c | 36 u8 nt_response[] = { local 82 if (memcmp(nt_response, buf, sizeof(nt_response)) != 0) { 96 nt_response, buf); 103 get_master_key(password_hash_hash, nt_response, buf);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_ms_funcs.c | 36 u8 nt_response[] = { local 82 if (memcmp(nt_response, buf, sizeof(nt_response)) != 0) { 96 nt_response, buf); 103 get_master_key(password_hash_hash, nt_response, buf);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_ttls.c | 740 u8 *chal, nt_response[24]; local 780 challenge_response(challenge, sm->user->password, nt_response); 783 sm->user->password_len, nt_response); 785 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) { 794 nt_response, 24); 806 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 874 nt_response); 880 nt_response); 884 if (os_memcmp(nt_response, rx_resp, 24) == 0) { 902 get_master_key(pw_hash_hash, nt_response, master_key) [all...] |
eap_mschapv2.c | 292 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 320 nt_response = pos; 333 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 388 if (os_memcmp(nt_response, expected, 24) == 0) { 408 username, username_len, nt_response, 412 get_master_key(pw_hash_hash, nt_response, data->master_key);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 718 u8 *chal, nt_response[24]; local 758 challenge_response(challenge, sm->user->password, nt_response); 761 sm->user->password_len, nt_response); 763 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) { 772 nt_response, 24); 784 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 852 nt_response); 858 nt_response); 862 if (os_memcmp(nt_response, rx_resp, 24) == 0) { 880 get_master_key(pw_hash_hash, nt_response, master_key) [all...] |
eap_server_mschapv2.c | 293 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 322 nt_response = pos; 335 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 395 if (os_memcmp(nt_response, expected, 24) == 0) { 415 username, username_len, nt_response, 419 get_master_key(pw_hash_hash, nt_response, data->master_key);
|
/external/ppp/pppd/plugins/ |
winbind.c | 258 const u_char *nt_response, 381 sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]); 556 u_char *nt_response = NULL; local 568 nt_response = rmd->NTResp; 591 nt_response, 592 nt_response ? nt_response_size: 0,
|