Home
last modified time | relevance | path

Searched refs:nt_response (Results 1 – 9 of 9) sorted by relevance

/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c41 u8 *nt_response, u8 *auth_response, in mschapv2_derive_response() argument
68 password, nt_response) || in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
80 nt_response) || in mschapv2_derive_response()
85 nt_response, in mschapv2_derive_response()
90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); in mschapv2_derive_response()
103 if (get_master_key(password_hash_hash, nt_response, master_key)) in mschapv2_derive_response()
H A Deap_mschapv2.c43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member
53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member
207 peer_challenge, r->nt_response, in eap_mschapv2_challenge_reply()
599 cp->nt_response); in eap_mschapv2_change_password()
601 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); in eap_mschapv2_change_password()
609 cp->nt_response, data->auth_response); in eap_mschapv2_change_password()
616 get_master_key(password_hash_hash, cp->nt_response, in eap_mschapv2_change_password()
H A Dmschapv2.h23 u8 *nt_response, u8 *auth_response,
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dms_funcs.c231 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() argument
254 addr1[1] = nt_response; in generate_authenticator_response_pwhash()
287 const u8 *nt_response, u8 *response) in generate_authenticator_response() argument
294 username, username_len, nt_response, response); in generate_authenticator_response()
325 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, in get_master_key() argument
338 addr[1] = nt_response; in get_master_key()
H A Dms_funcs.h25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
41 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
H A Dcrypto_module_tests.c2062 u8 nt_response[] = { in test_ms_funcs() local
2096 os_memcmp(nt_response, buf, sizeof(nt_response)) != 0) { in test_ms_funcs()
2113 nt_response, buf) || in test_ms_funcs()
2120 if (get_master_key(password_hash_hash, nt_response, buf) || in test_ms_funcs()
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_mschapv2.c285 const u8 *pos, *end, *peer_challenge, *nt_response, *name; in eap_mschapv2_process_response() local
315 nt_response = pos; in eap_mschapv2_process_response()
328 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); in eap_mschapv2_process_response()
370 challenge, nt_response); in eap_mschapv2_process_response()
408 if (os_memcmp_const(nt_response, expected, 24) == 0) { in eap_mschapv2_process_response()
431 username, username_len, nt_response, in eap_mschapv2_process_response()
434 get_master_key(pw_hash_hash, nt_response, in eap_mschapv2_process_response()
H A Deap_server_ttls.c622 u8 *chal, nt_response[24]; in eap_ttls_process_phase2_mschap() local
672 sm->user->password_len, nt_response))) { in eap_ttls_process_phase2_mschap()
677 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap()
686 nt_response, 24); in eap_ttls_process_phase2_mschap()
698 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, in eap_ttls_process_phase2_mschapv2() local
774 nt_response); in eap_ttls_process_phase2_mschapv2()
780 nt_response); in eap_ttls_process_phase2_mschapv2()
796 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) { in eap_ttls_process_phase2_mschapv2()
805 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2()
811 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2()
[all …]
/dragonfly/usr.sbin/ppp/
H A Dradius.c101 u_char nt_response[24]; member
807 memcpy(msresp.nt_response, key + 25, 24); in radius_Authenticate()