/external/ppp/pppd/plugins/ |
winbind.c | 249 const u_char *nt_response, 375 sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]); 550 u_char *nt_response = NULL; local 561 nt_response = &response[MS_CHAP_NTRESP]; 582 nt_response, nt_response_size,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response 53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password 209 peer_challenge, r->nt_response, 601 cp->nt_response); 603 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); 611 cp->nt_response, data->auth_response); 618 get_master_key(password_hash_hash, cp->nt_response,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 286 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 316 nt_response = pos; 329 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 371 challenge, nt_response); 409 if (os_memcmp_const(nt_response, expected, 24) == 0) { 432 username, username_len, nt_response, 435 get_master_key(pw_hash_hash, nt_response,
|
eap_server_ttls.c | 623 u8 *chal, nt_response[24]; local 670 challenge_response(challenge, sm->user->password, nt_response); 673 sm->user->password_len, nt_response); 675 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { 684 nt_response, 24); 696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 772 nt_response); 778 nt_response); 794 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) { 803 username, username_len, nt_response, [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 1655 u8 nt_response[] = { local [all...] |