| /src/external/bsd/wpa/dist/src/eap_peer/ |
| mschapv2.c | 41 u8 *nt_response, u8 *auth_response, 68 password, nt_response) || 71 username, username_len, nt_response, 80 nt_response) || 85 nt_response, 90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); 103 if (get_master_key(password_hash_hash, nt_response, master_key))
|
| mschapv2.c | 41 u8 *nt_response, u8 *auth_response, 68 password, nt_response) || 71 username, username_len, nt_response, 80 nt_response) || 85 nt_response, 90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); 103 if (get_master_key(password_hash_hash, nt_response, master_key))
|
| mschapv2.h | 23 u8 *nt_response, u8 *auth_response,
|
| mschapv2.h | 23 u8 *nt_response, u8 *auth_response,
|
| eap_mschapv2.c | 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response 53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password 213 peer_challenge, r->nt_response, 605 cp->nt_response); 607 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); 615 cp->nt_response, data->auth_response); 622 get_master_key(password_hash_hash, cp->nt_response,
|
| eap_mschapv2.c | 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response 53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password 213 peer_challenge, r->nt_response, 605 cp->nt_response); 607 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); 615 cp->nt_response, data->auth_response); 622 get_master_key(password_hash_hash, cp->nt_response,
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| ms_funcs.h | 25 const u8 *nt_response, u8 *response); 30 const u8 *nt_response, u8 *response); 41 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
|
| ms_funcs.h | 25 const u8 *nt_response, u8 *response); 30 const u8 *nt_response, u8 *response); 41 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
|
| ms_funcs.c | 218 * @nt_response: 24-octet NT-Response (IN) 231 const u8 *nt_response, u8 *response) 254 addr1[1] = nt_response; 274 * @nt_response: 24-octet NT-Response (IN) 287 const u8 *nt_response, u8 *response) 294 username, username_len, nt_response, response); 321 * @nt_response: 24-octet NTResponse (IN) 325 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, 338 addr[1] = nt_response;
|
| ms_funcs.c | 218 * @nt_response: 24-octet NT-Response (IN) 231 const u8 *nt_response, u8 *response) 254 addr1[1] = nt_response; 274 * @nt_response: 24-octet NT-Response (IN) 287 const u8 *nt_response, u8 *response) 294 username, username_len, nt_response, response); 321 * @nt_response: 24-octet NTResponse (IN) 325 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, 338 addr[1] = nt_response;
|
| crypto_module_tests.c | 2491 u8 nt_response[] = { local 2525 os_memcmp(nt_response, buf, sizeof(nt_response)) != 0) { 2542 nt_response, buf) || 2549 if (get_master_key(password_hash_hash, nt_response, buf) ||
|
| crypto_module_tests.c | 2491 u8 nt_response[] = { local 2525 os_memcmp(nt_response, buf, sizeof(nt_response)) != 0) { 2542 nt_response, buf) || 2549 if (get_master_key(password_hash_hash, nt_response, buf) ||
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_mschapv2.c | 291 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 321 nt_response = pos; 334 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 376 challenge, nt_response); 414 if (os_memcmp_const(nt_response, expected, 24) == 0) { 437 username, username_len, nt_response, 440 get_master_key(pw_hash_hash, nt_response,
|
| eap_server_mschapv2.c | 291 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 321 nt_response = pos; 334 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 376 challenge, nt_response); 414 if (os_memcmp_const(nt_response, expected, 24) == 0) { 437 username, username_len, nt_response, 440 get_master_key(pw_hash_hash, nt_response,
|
| eap_server_ttls.c | 624 u8 *chal, nt_response[24]; local 671 challenge_response(challenge, sm->user->password, nt_response)) || 674 sm->user->password_len, nt_response))) { 679 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { 688 nt_response, 24); 700 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 776 nt_response); 782 nt_response); 798 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) { 807 username, username_len, nt_response, [all...] |
| eap_server_ttls.c | 624 u8 *chal, nt_response[24]; local 671 challenge_response(challenge, sm->user->password, nt_response)) || 674 sm->user->password_len, nt_response))) { 679 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { 688 nt_response, 24); 700 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 776 nt_response); 782 nt_response); 798 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) { 807 username, username_len, nt_response, [all...] |