HomeSort by: relevance | last modified time | path
    Searched refs:nt_response (Results 1 - 16 of 16) sorted by relevancy

  /src/external/bsd/wpa/dist/src/eap_peer/
mschapv2.c 41 u8 *nt_response, u8 *auth_response,
68 password, nt_response) ||
71 username, username_len, nt_response,
80 nt_response) ||
85 nt_response,
90 nt_response, MSCHAPV2_NT_RESPONSE_LEN);
103 if (get_master_key(password_hash_hash, nt_response, master_key))
mschapv2.c 41 u8 *nt_response, u8 *auth_response,
68 password, nt_response) ||
71 username, username_len, nt_response,
80 nt_response) ||
85 nt_response,
90 nt_response, MSCHAPV2_NT_RESPONSE_LEN);
103 if (get_master_key(password_hash_hash, nt_response, master_key))
mschapv2.h 23 u8 *nt_response, u8 *auth_response,
mschapv2.h 23 u8 *nt_response, u8 *auth_response,
eap_mschapv2.c 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response
53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password
213 peer_challenge, r->nt_response,
605 cp->nt_response);
607 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN);
615 cp->nt_response, data->auth_response);
622 get_master_key(password_hash_hash, cp->nt_response,
eap_mschapv2.c 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response
53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password
213 peer_challenge, r->nt_response,
605 cp->nt_response);
607 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN);
615 cp->nt_response, data->auth_response);
622 get_master_key(password_hash_hash, cp->nt_response,
  /src/external/bsd/wpa/dist/src/crypto/
ms_funcs.h 25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
41 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
ms_funcs.h 25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
41 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
ms_funcs.c 218 * @nt_response: 24-octet NT-Response (IN)
231 const u8 *nt_response, u8 *response)
254 addr1[1] = nt_response;
274 * @nt_response: 24-octet NT-Response (IN)
287 const u8 *nt_response, u8 *response)
294 username, username_len, nt_response, response);
321 * @nt_response: 24-octet NTResponse (IN)
325 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
338 addr[1] = nt_response;
ms_funcs.c 218 * @nt_response: 24-octet NT-Response (IN)
231 const u8 *nt_response, u8 *response)
254 addr1[1] = nt_response;
274 * @nt_response: 24-octet NT-Response (IN)
287 const u8 *nt_response, u8 *response)
294 username, username_len, nt_response, response);
321 * @nt_response: 24-octet NTResponse (IN)
325 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
338 addr[1] = nt_response;
crypto_module_tests.c 2491 u8 nt_response[] = { local
2525 os_memcmp(nt_response, buf, sizeof(nt_response)) != 0) {
2542 nt_response, buf) ||
2549 if (get_master_key(password_hash_hash, nt_response, buf) ||
crypto_module_tests.c 2491 u8 nt_response[] = { local
2525 os_memcmp(nt_response, buf, sizeof(nt_response)) != 0) {
2542 nt_response, buf) ||
2549 if (get_master_key(password_hash_hash, nt_response, buf) ||
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_mschapv2.c 291 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
321 nt_response = pos;
334 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
376 challenge, nt_response);
414 if (os_memcmp_const(nt_response, expected, 24) == 0) {
437 username, username_len, nt_response,
440 get_master_key(pw_hash_hash, nt_response,
eap_server_mschapv2.c 291 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
321 nt_response = pos;
334 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
376 challenge, nt_response);
414 if (os_memcmp_const(nt_response, expected, 24) == 0) {
437 username, username_len, nt_response,
440 get_master_key(pw_hash_hash, nt_response,
eap_server_ttls.c 624 u8 *chal, nt_response[24]; local
671 challenge_response(challenge, sm->user->password, nt_response)) ||
674 sm->user->password_len, nt_response))) {
679 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
688 nt_response, 24);
700 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
776 nt_response);
782 nt_response);
798 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) {
807 username, username_len, nt_response,
    [all...]
eap_server_ttls.c 624 u8 *chal, nt_response[24]; local
671 challenge_response(challenge, sm->user->password, nt_response)) ||
674 sm->user->password_len, nt_response))) {
679 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
688 nt_response, 24);
700 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
776 nt_response);
782 nt_response);
798 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) {
807 username, username_len, nt_response,
    [all...]

Completed in 160 milliseconds