/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | mschapv2.c | 41 u8 *nt_response, u8 *auth_response, in mschapv2_derive_response() 68 password, nt_response) || in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 80 nt_response) || in mschapv2_derive_response() 85 nt_response, in mschapv2_derive_response() 90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); in mschapv2_derive_response() 103 if (get_master_key(password_hash_hash, nt_response, master_key)) in mschapv2_derive_response() 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) mschapv2_derive_response() argument
|
H A D | eap_mschapv2.c | 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member 53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member 207 peer_challenge, r->nt_response, in eap_mschapv2_challenge_reply() 599 cp->nt_response); in eap_mschapv2_change_password() 601 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); in eap_mschapv2_change_password() 609 cp->nt_response, data->auth_response); in eap_mschapv2_change_password() 616 get_master_key(password_hash_hash, cp->nt_response, in eap_mschapv2_change_password()
|
H A D | mschapv2.h | 23 u8 *nt_response, u8 *auth_response,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | mschapv2.c | 41 u8 *nt_response, u8 *auth_response, in mschapv2_derive_response() 68 password, nt_response) || in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 80 nt_response) || in mschapv2_derive_response() 85 nt_response, in mschapv2_derive_response() 90 nt_response, MSCHAPV2_NT_RESPONSE_LEN); in mschapv2_derive_response() 103 if (get_master_key(password_hash_hash, nt_response, master_key)) in mschapv2_derive_response() 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) mschapv2_derive_response() argument
|
H A D | eap_mschapv2.c | 43 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member 53 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN]; member 207 peer_challenge, r->nt_response, in eap_mschapv2_challenge_reply() 599 cp->nt_response); in eap_mschapv2_change_password() 601 cp->nt_response, MSCHAPV2_NT_RESPONSE_LEN); in eap_mschapv2_change_password() 609 cp->nt_response, data->auth_response); in eap_mschapv2_change_password() 616 get_master_key(password_hash_hash, cp->nt_response, in eap_mschapv2_change_password()
|
H A D | mschapv2.h | 23 u8 *nt_response, u8 *auth_response,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.h | 25 const u8 *nt_response, u8 *response); 30 const u8 *nt_response, u8 *response); 41 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
|
H A D | ms_funcs.c | 218 * @nt_response: 24-octet NT-Response (IN) 231 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() 254 addr1[1] = nt_response; in generate_authenticator_response_pwhash() 274 * @nt_response: 24-octet NT-Response (IN) 287 const u8 *nt_response, u8 *response) in generate_authenticator_response() 294 username, username_len, nt_response, response); in generate_authenticator_response() 321 * @nt_response: 24-octet NTResponse (IN) 325 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, in get_master_key() argument 338 addr[1] = nt_response; in get_master_key() 227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument 283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument
|
H A D | crypto_module_tests.c | 2062 u8 nt_response[] = { in test_ms_funcs() local 2096 os_memcmp(nt_response, buf, sizeof(nt_response)) != 0) { in test_ms_funcs() 2113 nt_response, buf) || in test_ms_funcs() 2120 if (get_master_key(password_hash_hash, nt_response, buf) || in test_ms_funcs()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | ms_funcs.h | 25 const u8 *nt_response, u8 *response); 30 const u8 *nt_response, u8 *response); 41 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response,
|
H A D | ms_funcs.c | 218 * @nt_response: 24-octet NT-Response (IN) 231 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() 254 addr1[1] = nt_response; in generate_authenticator_response_pwhash() 274 * @nt_response: 24-octet NT-Response (IN) 287 const u8 *nt_response, u8 *response) in generate_authenticator_response() 294 username, username_len, nt_response, response); in generate_authenticator_response() 321 * @nt_response: 24-octet NTResponse (IN) 325 int get_master_key(const u8 *password_hash_hash, const u8 *nt_response, in get_master_key() argument 338 addr[1] = nt_response; in get_master_key() 227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument 283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument
|
H A D | crypto_module_tests.c | 2211 u8 nt_response[] = { in test_ms_funcs() local 2245 os_memcmp(nt_response, buf, sizeof(nt_response)) != 0) { in test_ms_funcs() 2262 nt_response, buf) || in test_ms_funcs() 2269 if (get_master_key(password_hash_hash, nt_response, buf) || in test_ms_funcs()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_mschapv2.c | 285 const u8 *pos, *end, *peer_challenge, *nt_response, *name; in eap_mschapv2_process_response() local 315 nt_response = pos; in eap_mschapv2_process_response() 328 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); in eap_mschapv2_process_response() 370 challenge, nt_response); in eap_mschapv2_process_response() 408 if (os_memcmp_const(nt_response, expected, 24) == 0) { in eap_mschapv2_process_response() 431 username, username_len, nt_response, in eap_mschapv2_process_response() 434 get_master_key(pw_hash_hash, nt_response, in eap_mschapv2_process_response()
|
H A D | eap_server_ttls.c | 622 u8 *chal, nt_response[24]; in eap_ttls_process_phase2_mschap() local 669 challenge_response(challenge, sm->user->password, nt_response)) || in eap_ttls_process_phase2_mschap() 672 sm->user->password_len, nt_response))) { in eap_ttls_process_phase2_mschap() 677 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap() 686 nt_response, 24); in eap_ttls_process_phase2_mschap() 698 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, in eap_ttls_process_phase2_mschapv2() local 774 nt_response); in eap_ttls_process_phase2_mschapv2() 780 nt_response); in eap_ttls_process_phase2_mschapv2() 796 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) { in eap_ttls_process_phase2_mschapv2() 805 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_mschapv2.c | 285 const u8 *pos, *end, *peer_challenge, *nt_response, *name; in eap_mschapv2_process_response() local 315 nt_response = pos; in eap_mschapv2_process_response() 328 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); in eap_mschapv2_process_response() 370 challenge, nt_response); in eap_mschapv2_process_response() 408 if (os_memcmp_const(nt_response, expected, 24) == 0) { in eap_mschapv2_process_response() 431 username, username_len, nt_response, in eap_mschapv2_process_response() 434 get_master_key(pw_hash_hash, nt_response, in eap_mschapv2_process_response()
|
H A D | eap_server_ttls.c | 623 u8 *chal, nt_response[24]; in eap_ttls_process_phase2_mschap() local 670 challenge_response(challenge, sm->user->password, nt_response)) || in eap_ttls_process_phase2_mschap() 673 sm->user->password_len, nt_response))) { in eap_ttls_process_phase2_mschap() 678 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap() 687 nt_response, 24); in eap_ttls_process_phase2_mschap() 699 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, in eap_ttls_process_phase2_mschapv2() local 775 nt_response); in eap_ttls_process_phase2_mschapv2() 781 nt_response); in eap_ttls_process_phase2_mschapv2() 797 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) { in eap_ttls_process_phase2_mschapv2() 806 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2() [all...] |