HomeSort by relevance Sort by last modified time
    Searched defs:nt_response (Results 1 - 5 of 5) sorted by null

  /external/ppp/pppd/plugins/
winbind.c 249 const u_char *nt_response,
375 sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]);
550 u_char *nt_response = NULL; local
561 nt_response = &response[MS_CHAP_NTRESP];
582 nt_response, nt_response_size,
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response
53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password
209 peer_challenge, r->nt_response,
601 cp->nt_response);
603 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN);
611 cp->nt_response, data->auth_response);
618 get_master_key(password_hash_hash, cp->nt_response,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 286 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
316 nt_response = pos;
329 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
371 challenge, nt_response);
409 if (os_memcmp_const(nt_response, expected, 24) == 0) {
432 username, username_len, nt_response,
435 get_master_key(pw_hash_hash, nt_response,
eap_server_ttls.c 623 u8 *chal, nt_response[24]; local
670 challenge_response(challenge, sm->user->password, nt_response);
673 sm->user->password_len, nt_response);
675 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
684 nt_response, 24);
696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
772 nt_response);
778 nt_response);
794 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) {
803 username, username_len, nt_response,
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_module_tests.c 1933 u8 nt_response[] = { local
    [all...]

Completed in 330 milliseconds