/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | mschapv2.c | 47 u8 *nt_response, u8 *auth_response, in mschapv2_derive_response() argument 74 password, nt_response); in mschapv2_derive_response() 77 username, username_len, nt_response, auth_response); in mschapv2_derive_response() 83 password, password_len, nt_response); in mschapv2_derive_response() 87 nt_response, auth_response); in mschapv2_derive_response() 90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); in mschapv2_derive_response() 101 get_master_key(password_hash_hash, nt_response, master_key); in mschapv2_derive_response()
|
D | eap_mschapv2.c | 48 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member 58 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member 214 peer_challenge, r->nt_response, in eap_mschapv2_challenge_reply() 580 cp->nt_response); in eap_mschapv2_change_password() 582 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); in eap_mschapv2_change_password() 590 cp->nt_response, data->auth_response); in eap_mschapv2_change_password() 597 get_master_key(password_hash_hash, cp->nt_response, data->master_key); in eap_mschapv2_change_password()
|
D | mschapv2.h | 29 u8 *nt_response, u8 *auth_response,
|
/external/wpa_supplicant/tests/ |
D | test_ms_funcs.c | 36 u8 nt_response[] = { in main() local 82 if (memcmp(nt_response, buf, sizeof(nt_response)) != 0) { in main() 96 nt_response, buf); in main() 103 get_master_key(password_hash_hash, nt_response, buf); in main()
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
D | test_ms_funcs.c | 36 u8 nt_response[] = { in main() local 82 if (memcmp(nt_response, buf, sizeof(nt_response)) != 0) { in main() 96 nt_response, buf); in main() 103 get_master_key(password_hash_hash, nt_response, buf); in main()
|
/external/wpa_supplicant/ |
D | ms_funcs.c | 173 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() argument 196 addr1[1] = nt_response; in generate_authenticator_response_pwhash() 228 const u8 *nt_response, u8 *response) in generate_authenticator_response() argument 235 nt_response, response); in generate_authenticator_response() 261 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response, in get_master_key() argument 274 addr[1] = nt_response; in get_master_key()
|
D | ms_funcs.h | 31 const u8 *nt_response, u8 *response); 36 const u8 *nt_response, u8 *response); 45 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
|
D | eap_mschapv2.c | 50 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member 60 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member 185 u8 *nt_response) in eap_mschapv2_derive_response() argument 199 password, password_len, nt_response); in eap_mschapv2_derive_response() 200 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: response", nt_response, in eap_mschapv2_derive_response() 206 username, username_len, nt_response, in eap_mschapv2_derive_response() 214 get_master_key(password_hash_hash, nt_response, data->master_key); in eap_mschapv2_derive_response() 286 r->nt_response); in eap_mschapv2_challenge_reply() 633 cp->nt_response); in eap_mschapv2_change_password() 635 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); in eap_mschapv2_change_password() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | ms_funcs.c | 173 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() argument 196 addr1[1] = nt_response; in generate_authenticator_response_pwhash() 228 const u8 *nt_response, u8 *response) in generate_authenticator_response() argument 235 nt_response, response); in generate_authenticator_response() 261 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response, in get_master_key() argument 274 addr[1] = nt_response; in get_master_key()
|
D | ms_funcs.h | 31 const u8 *nt_response, u8 *response); 36 const u8 *nt_response, u8 *response); 45 void get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
|
/external/ppp/pppd/plugins/ |
D | winbind.c | 258 const u_char *nt_response, in run_ntlm_auth() argument 381 sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]); in run_ntlm_auth() 556 u_char *nt_response = NULL; in winbind_chap_verify() local 568 nt_response = rmd->NTResp; in winbind_chap_verify() 591 nt_response, in winbind_chap_verify() 592 nt_response ? nt_response_size: 0, in winbind_chap_verify()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_mschapv2.c | 292 const u8 *pos, *end, *peer_challenge, *nt_response, *name; in eap_mschapv2_process_response() local 320 nt_response = pos; in eap_mschapv2_process_response() 333 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); in eap_mschapv2_process_response() 388 if (os_memcmp(nt_response, expected, 24) == 0) { in eap_mschapv2_process_response() 408 username, username_len, nt_response, in eap_mschapv2_process_response() 412 get_master_key(pw_hash_hash, nt_response, data->master_key); in eap_mschapv2_process_response()
|
D | eap_ttls.c | 740 u8 *chal, nt_response[24]; in eap_ttls_process_phase2_mschap() local 780 challenge_response(challenge, sm->user->password, nt_response); in eap_ttls_process_phase2_mschap() 783 sm->user->password_len, nt_response); in eap_ttls_process_phase2_mschap() 785 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap() 794 nt_response, 24); in eap_ttls_process_phase2_mschap() 806 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, in eap_ttls_process_phase2_mschapv2() local 874 nt_response); in eap_ttls_process_phase2_mschapv2() 880 nt_response); in eap_ttls_process_phase2_mschapv2() 884 if (os_memcmp(nt_response, rx_resp, 24) == 0) { in eap_ttls_process_phase2_mschapv2() 902 get_master_key(pw_hash_hash, nt_response, master_key); in eap_ttls_process_phase2_mschapv2() [all …]
|