Searched refs:nt_response (Results 1 - 25 of 30) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c47 u8 *nt_response, u8 *auth_response,
74 password, nt_response);
77 username, username_len, nt_response, auth_response);
83 password, password_len, nt_response);
87 nt_response, auth_response);
90 nt_response, MSCHAPV2_NT_RESPONSE_LEN);
101 get_master_key(password_hash_hash, nt_response, master_key);
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h29 u8 *nt_response, u8 *auth_response,
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dmschapv2.c41 u8 *nt_response, u8 *auth_response,
68 password, nt_response);
71 username, username_len, nt_response, auth_response);
77 password, password_len, nt_response);
81 nt_response, auth_response);
84 nt_response, MSCHAPV2_NT_RESPONSE_LEN);
97 get_master_key(password_hash_hash, nt_response, master_key);
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h23 u8 *nt_response, u8 *auth_response,
/external/wpa_supplicant_8/src/eap_peer/
H A Dmschapv2.c41 u8 *nt_response, u8 *auth_response,
68 password, nt_response);
71 username, username_len, nt_response, auth_response);
77 password, password_len, nt_response);
81 nt_response, auth_response);
84 nt_response, MSCHAPV2_NT_RESPONSE_LEN);
97 get_master_key(password_hash_hash, nt_response, master_key);
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h23 u8 *nt_response, u8 *auth_response,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c41 u8 *nt_response, u8 *auth_response,
68 password, nt_response);
71 username, username_len, nt_response, auth_response);
77 password, password_len, nt_response);
81 nt_response, auth_response);
84 nt_response, MSCHAPV2_NT_RESPONSE_LEN);
97 get_master_key(password_hash_hash, nt_response, master_key);
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
H A Dmschapv2.h23 u8 *nt_response, u8 *auth_response,
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dms_funcs.h31 const u8 *nt_response, u8 *response);
36 const u8 *nt_response, u8 *response);
45 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
H A Dms_funcs.c161 * @nt_response: 24-octet NT-Response (IN)
173 const u8 *nt_response, u8 *response)
196 addr1[1] = nt_response;
216 * @nt_response: 24-octet NT-Response (IN)
228 const u8 *nt_response, u8 *response)
235 nt_response, response);
258 * @nt_response: 24-octet NTResponse (IN)
261 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response, argument
274 addr[1] = nt_response;
169 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
224 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.h25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
39 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
H A Dms_funcs.c215 * @nt_response: 24-octet NT-Response (IN)
228 const u8 *nt_response, u8 *response)
251 addr1[1] = nt_response;
273 * @nt_response: 24-octet NT-Response (IN)
286 const u8 *nt_response, u8 *response)
293 username, username_len, nt_response, response);
319 * @nt_response: 24-octet NTResponse (IN)
323 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, argument
336 addr[1] = nt_response;
224 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
282 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.h25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
39 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
H A Dms_funcs.c215 * @nt_response: 24-octet NT-Response (IN)
228 const u8 *nt_response, u8 *response)
251 addr1[1] = nt_response;
273 * @nt_response: 24-octet NT-Response (IN)
286 const u8 *nt_response, u8 *response)
293 username, username_len, nt_response, response);
319 * @nt_response: 24-octet NTResponse (IN)
323 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, argument
336 addr[1] = nt_response;
224 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
282 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.h25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
39 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
H A Dms_funcs.c215 * @nt_response: 24-octet NT-Response (IN)
228 const u8 *nt_response, u8 *response)
251 addr1[1] = nt_response;
273 * @nt_response: 24-octet NT-Response (IN)
286 const u8 *nt_response, u8 *response)
293 username, username_len, nt_response, response);
319 * @nt_response: 24-octet NTResponse (IN)
323 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, argument
336 addr[1] = nt_response;
224 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
282 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
/external/wpa_supplicant_6/wpa_supplicant/tests/
H A Dtest_ms_funcs.c36 u8 nt_response[] = { local
82 if (memcmp(nt_response, buf, sizeof(nt_response)) != 0) {
96 nt_response, buf);
103 get_master_key(password_hash_hash, nt_response, buf);
/external/ppp/pppd/plugins/
H A Dwinbind.c258 const u_char *nt_response,
381 sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]);
556 u_char *nt_response = NULL; local
568 nt_response = rmd->NTResp;
591 nt_response,
592 nt_response ? nt_response_size: 0,
250 run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_mschapv2.c292 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
320 nt_response = pos;
333 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
388 if (os_memcmp(nt_response, expected, 24) == 0) {
408 username, username_len, nt_response,
412 get_master_key(pw_hash_hash, nt_response, data->master_key);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_mschapv2.c287 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
316 nt_response = pos;
329 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
389 if (os_memcmp(nt_response, expected, 24) == 0) {
412 username, username_len, nt_response,
416 get_master_key(pw_hash_hash, nt_response, data->master_key);
H A Deap_server_ttls.c589 u8 *chal, nt_response[24]; local
629 challenge_response(challenge, sm->user->password, nt_response);
632 sm->user->password_len, nt_response);
634 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) {
642 nt_response, 24);
654 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
722 nt_response);
728 nt_response);
732 if (os_memcmp(nt_response, rx_resp, 24) == 0) {
741 username, username_len, nt_response,
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_mschapv2.c287 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
316 nt_response = pos;
329 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
389 if (os_memcmp(nt_response, expected, 24) == 0) {
412 username, username_len, nt_response,
416 get_master_key(pw_hash_hash, nt_response, data->master_key);
H A Deap_server_ttls.c589 u8 *chal, nt_response[24]; local
629 challenge_response(challenge, sm->user->password, nt_response);
632 sm->user->password_len, nt_response);
634 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) {
642 nt_response, 24);
654 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
722 nt_response);
728 nt_response);
732 if (os_memcmp(nt_response, rx_resp, 24) == 0) {
741 username, username_len, nt_response,
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_mschapv2.c287 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local
316 nt_response = pos;
329 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
389 if (os_memcmp(nt_response, expected, 24) == 0) {
412 username, username_len, nt_response,
416 get_master_key(pw_hash_hash, nt_response, data->master_key);
H A Deap_server_ttls.c589 u8 *chal, nt_response[24]; local
629 challenge_response(challenge, sm->user->password, nt_response);
632 sm->user->password_len, nt_response);
634 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) {
642 nt_response, 24);
654 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
722 nt_response);
728 nt_response);
732 if (os_memcmp(nt_response, rx_resp, 24) == 0) {
741 username, username_len, nt_response,
[all...]

Completed in 209 milliseconds

12