/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | mschapv2.c | 41 u8 *nt_response, u8 *auth_response, 68 password, nt_response) || 71 username, username_len, nt_response, 80 nt_response) || 85 nt_response, 90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_mschapv2.c | 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response 53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password 209 peer_challenge, r->nt_response, 582 cp->nt_response); 584 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); 592 cp->nt_response, data->auth_response); 599 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | mschapv2.c | 41 u8 *nt_response, u8 *auth_response, 68 password, nt_response) || 71 username, username_len, nt_response, 80 nt_response) || 85 nt_response, 90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_mschapv2.c | 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response 53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password 209 peer_challenge, r->nt_response, 582 cp->nt_response); 584 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); 592 cp->nt_response, data->auth_response); 599 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 41 u8 *nt_response, u8 *auth_response, 68 password, nt_response) || 71 username, username_len, nt_response, 80 nt_response) || 85 nt_response, 90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); 103 if (get_master_key(password_hash_hash, nt_response, master_key)) 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
|
H A D | eap_mschapv2.c | 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_response 53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member in struct:ms_change_password 209 peer_challenge, r->nt_response, 582 cp->nt_response); 584 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); 592 cp->nt_response, data->auth_response); 599 get_master_key(password_hash_hash, cp->nt_response, data->master_key);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 216 * @nt_response: 24-octet NT-Response (IN) 229 const u8 *nt_response, u8 *response) 252 addr1[1] = nt_response; 275 * @nt_response: 24-octet NT-Response (IN) 288 const u8 *nt_response, u8 *response) 295 username, username_len, nt_response, response); 321 * @nt_response: 24-octet NTResponse (IN) 325 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, argument 338 addr[1] = nt_response; 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_mschapv2.c | 287 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 316 nt_response = pos; 329 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 389 if (os_memcmp(nt_response, expected, 24) == 0) { 412 username, username_len, nt_response, 416 get_master_key(pw_hash_hash, nt_response, data->master_key);
|
H A D | eap_server_ttls.c | 589 u8 *chal, nt_response[24]; local 629 challenge_response(challenge, sm->user->password, nt_response); 632 sm->user->password_len, nt_response); 634 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) { 642 nt_response, 24); 654 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 729 nt_response); 735 nt_response); 739 if (os_memcmp(nt_response, rx_resp, 24) == 0) { 748 username, username_len, nt_response, [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 216 * @nt_response: 24-octet NT-Response (IN) 229 const u8 *nt_response, u8 *response) 252 addr1[1] = nt_response; 275 * @nt_response: 24-octet NT-Response (IN) 288 const u8 *nt_response, u8 *response) 295 username, username_len, nt_response, response); 321 * @nt_response: 24-octet NTResponse (IN) 325 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, argument 338 addr[1] = nt_response; 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_mschapv2.c | 287 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 316 nt_response = pos; 329 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 389 if (os_memcmp(nt_response, expected, 24) == 0) { 412 username, username_len, nt_response, 416 get_master_key(pw_hash_hash, nt_response, data->master_key);
|
H A D | eap_server_ttls.c | 589 u8 *chal, nt_response[24]; local 629 challenge_response(challenge, sm->user->password, nt_response); 632 sm->user->password_len, nt_response); 634 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) { 642 nt_response, 24); 654 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 729 nt_response); 735 nt_response); 739 if (os_memcmp(nt_response, rx_resp, 24) == 0) { 748 username, username_len, nt_response, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 216 * @nt_response: 24-octet NT-Response (IN) 229 const u8 *nt_response, u8 *response) 252 addr1[1] = nt_response; 275 * @nt_response: 24-octet NT-Response (IN) 288 const u8 *nt_response, u8 *response) 295 username, username_len, nt_response, response); 321 * @nt_response: 24-octet NTResponse (IN) 325 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, argument 338 addr[1] = nt_response; 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_mschapv2.c | 287 const u8 *pos, *end, *peer_challenge, *nt_response, *name; local 316 nt_response = pos; 329 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 389 if (os_memcmp(nt_response, expected, 24) == 0) { 412 username, username_len, nt_response, 416 get_master_key(pw_hash_hash, nt_response, data->master_key);
|
H A D | eap_server_ttls.c | 589 u8 *chal, nt_response[24]; local 629 challenge_response(challenge, sm->user->password, nt_response); 632 sm->user->password_len, nt_response); 634 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) { 642 nt_response, 24); 654 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 729 nt_response); 735 nt_response); 739 if (os_memcmp(nt_response, rx_resp, 24) == 0) { 748 username, username_len, nt_response, [all...] |
/external/libppp/src/ |
H A D | radius.c | 105 u_char nt_response[24]; member in struct:mschap_response 985 memcpy(msresp.nt_response, key + 25, 24);
|
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 258 const u_char *nt_response, 381 sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]); 556 u_char *nt_response = NULL; local 568 nt_response = rmd->NTResp; 591 nt_response, 592 nt_response ? nt_response_size: 0, 250 run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) argument
|