/external/wpa_supplicant_8/hostapd/ |
nt_password_hash.c | 17 unsigned char password_hash[16]; local 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) 42 for (i = 0; i < sizeof(password_hash); i++) 43 printf("%02x", password_hash[i]);
|
config_file.c | 467 user->password_hash = 1; [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 19 const u8 *password_hash, 27 const u8 *password_hash, 34 int challenge_response(const u8 *challenge, const u8 *password_hash, 39 u8 *password_hash); 40 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash); 48 const u8 *password_hash, u8 *pw_block); 53 int nt_password_hash_encrypted_with_block(const u8 *password_hash,
|
ms_funcs.c | 106 * @password_hash: 16-octet PasswordHash (OUT) 110 u8 *password_hash) 121 return md4_vector(1, (const u8 **) &pos, &len, password_hash); 127 * @password_hash: 16-octet PasswordHash (IN) 131 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash) 134 return md4_vector(1, &password_hash, &len, password_hash_hash); 141 * @password_hash: 16-octet PasswordHash (IN) 145 int challenge_response(const u8 *challenge, const u8 *password_hash, 150 if (des_encrypt(challenge, password_hash, response) < 0 || 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0 177 u8 password_hash[16]; local 289 u8 password_hash[16]; local 309 u8 password_hash[16]; local 475 u8 password_hash[16]; local [all...] |
crypto_module_tests.c | 2058 u8 password_hash[] = { local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 46 u8 password_hash[16], password_hash_hash[16]; local 99 if (nt_password_hash(password, password_len, password_hash) || 100 hash_nt_password_hash(password_hash, password_hash_hash))
|
eap_mschapv2.c | 523 u8 password_hash[16], password_hash_hash[16]; 614 if (nt_password_hash(new_password, new_password_len, password_hash) || 615 hash_nt_password_hash(password_hash, password_hash_hash) ||
|
eap_pwd.c | 29 int password_hash; member in struct:eap_pwd_data 135 data->password_hash = pwhash; 259 if (id->prep == EAP_PWD_PREP_NONE && data->password_hash) { 295 if (data->password_hash) {
|
/external/boringssl/src/third_party/fiat/ |
internal.h | 139 uint8_t password_hash[64]; member in struct:spake2_ctx_st
|
/external/wpa_supplicant_8/src/eap_server/ |
eap.h | 32 int password_hash; /* whether password is hashed with member in struct:eap_user
|
eap_server_md5.c | 107 sm->user->password_hash) {
|
eap_server_pwd.c | 28 int password_hash; member in struct:eap_pwd_data 117 data->password_hash = sm->user->password_hash; 192 wpabuf_put_u8(data->outbuf, data->password_hash ? EAP_PWD_PREP_MS : 607 data->password_hash ? EAP_PWD_PREP_MS : EAP_PWD_PREP_NONE) { 629 if (data->password_hash) {
|
eap_server_ttls.c | 532 if (!sm->user || !sm->user->password || sm->user->password_hash || 574 if (!sm->user || !sm->user->password || sm->user->password_hash || 668 if ((sm->user->password_hash && 670 (!sm->user->password_hash && 770 if (sm->user->password_hash) { 801 if (sm->user->password_hash) { [all...] |
eap_server_gtc.c | 169 sm->user->password_hash) {
|
eap_server_mschapv2.c | 389 if (sm->user->password_hash) { 418 if (sm->user->password_hash) {
|
/external/wpa_supplicant_8/src/ap/ |
authsrv.c | 79 user->password_hash = eap_user->password_hash;
|
ap_config.h | 166 unsigned int password_hash:1; /* whether password is hashed with member in struct:hostapd_eap_user
|
ieee802_1x.c | [all...] |
/external/boringssl/src/crypto/curve25519/ |
spake25519.c | 384 OPENSSL_memcpy(ctx->password_hash, password_tmp, sizeof(ctx->password_hash)); 524 update_with_length_prefix(&sha, ctx->password_hash, 525 sizeof(ctx->password_hash));
|