/external/wpa_supplicant_8/src/crypto/ |
D | ms_funcs.c | 110 u8 *password_hash) in nt_password_hash() argument 121 return md4_vector(1, (const u8 **) &pos, &len, password_hash); in nt_password_hash() 131 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash) in hash_nt_password_hash() argument 134 return md4_vector(1, &password_hash, &len, password_hash_hash); in hash_nt_password_hash() 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 153 zpwd[0] = password_hash[14]; in challenge_response() 154 zpwd[1] = password_hash[15]; in challenge_response() 177 u8 password_hash[16]; in generate_nt_response() local [all …]
|
D | ms_funcs.h | 19 const u8 *password_hash, 27 const u8 *password_hash, 34 int challenge_response(const u8 *challenge, const u8 *password_hash, 39 u8 *password_hash); 40 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash); 48 const u8 *password_hash, u8 *pw_block); 53 int nt_password_hash_encrypted_with_block(const u8 *password_hash,
|
D | crypto_module_tests.c | 2486 u8 password_hash[] = { in test_ms_funcs() local 2516 os_memcmp(password_hash, buf, sizeof(password_hash)) != 0) { in test_ms_funcs() 2529 if (hash_nt_password_hash(password_hash, buf) || in test_ms_funcs()
|
/external/wpa_supplicant_8/hostapd/ |
D | nt_password_hash.c | 17 unsigned char password_hash[16]; in main() local 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main() 42 for (i = 0; i < sizeof(password_hash); i++) in main() 43 printf("%02x", password_hash[i]); in main()
|
D | config_file.c | 500 user->password_hash = 1; in hostapd_config_read_eap_user()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | mschapv2.c | 46 u8 password_hash[16], password_hash_hash[16]; in mschapv2_derive_response() local 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response() 100 hash_nt_password_hash(password_hash, password_hash_hash)) in mschapv2_derive_response()
|
D | eap_pwd.c | 32 int password_hash; member 135 data->password_hash = pwhash; in eap_pwd_init() 297 if (id->prep == EAP_PWD_PREP_NONE && data->password_hash) { in eap_pwd_perform_id_exchange() 403 if (data->password_hash) { in eap_pwd_perform_commit_exchange() 534 if (data->password_hash) { in eap_pwd_perform_commit_exchange()
|
D | eap_mschapv2.c | 529 u8 password_hash[16], password_hash_hash[16]; in eap_mschapv2_change_password() 620 if (nt_password_hash(new_password, new_password_len, password_hash) || in eap_mschapv2_change_password() 621 hash_nt_password_hash(password_hash, password_hash_hash) || in eap_mschapv2_change_password()
|
/external/rust/crates/serde_cbor/tests/ |
D | de.rs | 583 password_hash: [u8; 4], in test_packed_deserialization() field 601 password_hash: [1, 2, 3, 4], in test_packed_deserialization() 610 password_hash: [1, 2, 3, 4], in test_packed_deserialization() 636 password_hash: [1, 2, 3, 4], in test_packed_deserialization() 645 password_hash: [1, 2, 3, 4], in test_packed_deserialization() 669 password_hash: [1, 2, 3, 4], in test_packed_deserialization() 678 password_hash: [1, 2, 3, 4], in test_packed_deserialization() 703 password_hash: [1, 2, 3, 4], in test_packed_deserialization() 712 password_hash: [1, 2, 3, 4], in test_packed_deserialization()
|
/external/cronet/third_party/boringssl/src/crypto/curve25519/ |
D | spake25519.c | 369 OPENSSL_memcpy(ctx->password_hash, password_tmp, sizeof(ctx->password_hash)); in SPAKE2_generate_msg() 509 update_with_length_prefix(&sha, ctx->password_hash, in SPAKE2_process_msg() 510 sizeof(ctx->password_hash)); in SPAKE2_process_msg()
|
D | internal.h | 127 uint8_t password_hash[64]; member
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/curve25519/ |
D | spake25519.c | 384 OPENSSL_memcpy(ctx->password_hash, password_tmp, sizeof(ctx->password_hash)); in SPAKE2_generate_msg() 524 update_with_length_prefix(&sha, ctx->password_hash, in SPAKE2_process_msg() 525 sizeof(ctx->password_hash)); in SPAKE2_process_msg()
|
D | internal.h | 131 uint8_t password_hash[64]; member
|
/external/boringssl/src/crypto/curve25519/ |
D | spake25519.c | 369 OPENSSL_memcpy(ctx->password_hash, password_tmp, sizeof(ctx->password_hash)); in SPAKE2_generate_msg() 509 update_with_length_prefix(&sha, ctx->password_hash, in SPAKE2_process_msg() 510 sizeof(ctx->password_hash)); in SPAKE2_process_msg()
|
D | internal.h | 127 uint8_t password_hash[64]; member
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_ttls.c | 534 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_pap() 576 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_chap() 670 if ((sm->user->password_hash && in eap_ttls_process_phase2_mschap() 672 (!sm->user->password_hash && in eap_ttls_process_phase2_mschap() 772 if (sm->user->password_hash) { in eap_ttls_process_phase2_mschapv2() 803 if (sm->user->password_hash) { in eap_ttls_process_phase2_mschapv2()
|
D | eap_server_pwd.c | 29 int password_hash; member 119 data->password_hash = sm->user->password_hash; in eap_pwd_init() 222 data->password_prep = data->password_hash ? EAP_PWD_PREP_MS : in eap_pwd_build_id_req()
|
D | eap.h | 32 int password_hash; /* whether password is hashed with member
|
D | eap_server_md5.c | 107 sm->user->password_hash) { in eap_md5_process()
|
D | eap_server_gtc.c | 169 sm->user->password_hash) { in eap_gtc_process()
|
D | eap_server_mschapv2.c | 395 if (sm->user->password_hash) { in eap_mschapv2_process_response() 424 if (sm->user->password_hash) { in eap_mschapv2_process_response()
|
D | eap_server_teap.c | 1331 if (!sm->user || !sm->user->password || sm->user->password_hash) { in eap_teap_process_basic_auth_resp()
|
/external/wpa_supplicant_8/src/ap/ |
D | authsrv.c | 80 user->password_hash = eap_user->password_hash; in hostapd_radius_get_eap_user()
|
D | ap_config.h | 190 unsigned int password_hash:1; /* whether password is hashed with member
|
D | ieee802_1x.c | 2331 user->password_hash = eap_user->password_hash; in ieee802_1x_get_eap_user()
|