HomeSort by relevance Sort by last modified time
    Searched defs:nt_response (Results 1 - 5 of 5) sorted by null

  /external/ppp/pppd/plugins/
winbind.c 258 const u_char *nt_response,
381 sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]);
556 u_char *nt_response = NULL; local
568 nt_response = rmd->NTResp;
591 nt_response,
592 nt_response ? nt_response_size: 0,
  /external/libppp/src/
radius.c 105 u_char nt_response[24]; member in struct:mschap_response
985 memcpy(msresp.nt_response, key + 25, 24);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 286 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
315 nt_response = pos;
328 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
388 if (os_memcmp(nt_response, expected, 24) == 0) {
411 username, username_len, nt_response,
415 get_master_key(pw_hash_hash, nt_response, data->master_key);
eap_server_ttls.c 589 u8 *chal, nt_response[24]; local
629 challenge_response(challenge, sm->user->password, nt_response);
632 sm->user->password_len, nt_response);
634 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) {
642 nt_response, 24);
654 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
729 nt_response);
735 nt_response);
739 if (os_memcmp(nt_response, rx_resp, 24) == 0) {
748 username, username_len, nt_response,
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response
53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password
209 peer_challenge, r->nt_response,
582 cp->nt_response);
584 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN);
592 cp->nt_response, data->auth_response);
599 get_master_key(password_hash_hash, cp->nt_response, data->master_key);

Completed in 1118 milliseconds