Home
last modified time | relevance | path

Searched refs:password_hash (Results 1 – 25 of 25) sorted by relevance

/external/wpa_supplicant_8/src/crypto/
Dms_funcs.c110 u8 *password_hash) in nt_password_hash() argument
121 return md4_vector(1, (const u8 **) &pos, &len, password_hash); in nt_password_hash()
131 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash) in hash_nt_password_hash() argument
134 return md4_vector(1, &password_hash, &len, password_hash_hash); in hash_nt_password_hash()
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
153 zpwd[0] = password_hash[14]; in challenge_response()
154 zpwd[1] = password_hash[15]; in challenge_response()
177 u8 password_hash[16]; in generate_nt_response() local
[all …]
Dms_funcs.h19 const u8 *password_hash,
27 const u8 *password_hash,
34 int challenge_response(const u8 *challenge, const u8 *password_hash,
39 u8 *password_hash);
40 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash);
48 const u8 *password_hash, u8 *pw_block);
53 int nt_password_hash_encrypted_with_block(const u8 *password_hash,
Dcrypto_module_tests.c2486 u8 password_hash[] = { in test_ms_funcs() local
2516 os_memcmp(password_hash, buf, sizeof(password_hash)) != 0) { in test_ms_funcs()
2529 if (hash_nt_password_hash(password_hash, buf) || in test_ms_funcs()
/external/wpa_supplicant_8/hostapd/
Dnt_password_hash.c17 unsigned char password_hash[16]; in main() local
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
42 for (i = 0; i < sizeof(password_hash); i++) in main()
43 printf("%02x", password_hash[i]); in main()
Dconfig_file.c500 user->password_hash = 1; in hostapd_config_read_eap_user()
/external/wpa_supplicant_8/src/eap_peer/
Dmschapv2.c46 u8 password_hash[16], password_hash_hash[16]; in mschapv2_derive_response() local
99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
100 hash_nt_password_hash(password_hash, password_hash_hash)) in mschapv2_derive_response()
Deap_pwd.c32 int password_hash; member
135 data->password_hash = pwhash; in eap_pwd_init()
297 if (id->prep == EAP_PWD_PREP_NONE && data->password_hash) { in eap_pwd_perform_id_exchange()
403 if (data->password_hash) { in eap_pwd_perform_commit_exchange()
534 if (data->password_hash) { in eap_pwd_perform_commit_exchange()
Deap_mschapv2.c529 u8 password_hash[16], password_hash_hash[16]; in eap_mschapv2_change_password()
620 if (nt_password_hash(new_password, new_password_len, password_hash) || in eap_mschapv2_change_password()
621 hash_nt_password_hash(password_hash, password_hash_hash) || in eap_mschapv2_change_password()
/external/rust/crates/serde_cbor/tests/
Dde.rs583 password_hash: [u8; 4], in test_packed_deserialization() field
601 password_hash: [1, 2, 3, 4], in test_packed_deserialization()
610 password_hash: [1, 2, 3, 4], in test_packed_deserialization()
636 password_hash: [1, 2, 3, 4], in test_packed_deserialization()
645 password_hash: [1, 2, 3, 4], in test_packed_deserialization()
669 password_hash: [1, 2, 3, 4], in test_packed_deserialization()
678 password_hash: [1, 2, 3, 4], in test_packed_deserialization()
703 password_hash: [1, 2, 3, 4], in test_packed_deserialization()
712 password_hash: [1, 2, 3, 4], in test_packed_deserialization()
/external/cronet/third_party/boringssl/src/crypto/curve25519/
Dspake25519.c369 OPENSSL_memcpy(ctx->password_hash, password_tmp, sizeof(ctx->password_hash)); in SPAKE2_generate_msg()
509 update_with_length_prefix(&sha, ctx->password_hash, in SPAKE2_process_msg()
510 sizeof(ctx->password_hash)); in SPAKE2_process_msg()
Dinternal.h127 uint8_t password_hash[64]; member
/external/rust/crates/quiche/deps/boringssl/src/crypto/curve25519/
Dspake25519.c384 OPENSSL_memcpy(ctx->password_hash, password_tmp, sizeof(ctx->password_hash)); in SPAKE2_generate_msg()
524 update_with_length_prefix(&sha, ctx->password_hash, in SPAKE2_process_msg()
525 sizeof(ctx->password_hash)); in SPAKE2_process_msg()
Dinternal.h131 uint8_t password_hash[64]; member
/external/boringssl/src/crypto/curve25519/
Dspake25519.c369 OPENSSL_memcpy(ctx->password_hash, password_tmp, sizeof(ctx->password_hash)); in SPAKE2_generate_msg()
509 update_with_length_prefix(&sha, ctx->password_hash, in SPAKE2_process_msg()
510 sizeof(ctx->password_hash)); in SPAKE2_process_msg()
Dinternal.h127 uint8_t password_hash[64]; member
/external/wpa_supplicant_8/src/eap_server/
Deap_server_ttls.c534 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_pap()
576 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_chap()
670 if ((sm->user->password_hash && in eap_ttls_process_phase2_mschap()
672 (!sm->user->password_hash && in eap_ttls_process_phase2_mschap()
772 if (sm->user->password_hash) { in eap_ttls_process_phase2_mschapv2()
803 if (sm->user->password_hash) { in eap_ttls_process_phase2_mschapv2()
Deap_server_pwd.c29 int password_hash; member
119 data->password_hash = sm->user->password_hash; in eap_pwd_init()
222 data->password_prep = data->password_hash ? EAP_PWD_PREP_MS : in eap_pwd_build_id_req()
Deap.h32 int password_hash; /* whether password is hashed with member
Deap_server_md5.c107 sm->user->password_hash) { in eap_md5_process()
Deap_server_gtc.c169 sm->user->password_hash) { in eap_gtc_process()
Deap_server_mschapv2.c395 if (sm->user->password_hash) { in eap_mschapv2_process_response()
424 if (sm->user->password_hash) { in eap_mschapv2_process_response()
Deap_server_teap.c1331 if (!sm->user || !sm->user->password || sm->user->password_hash) { in eap_teap_process_basic_auth_resp()
/external/wpa_supplicant_8/src/ap/
Dauthsrv.c80 user->password_hash = eap_user->password_hash; in hostapd_radius_get_eap_user()
Dap_config.h190 unsigned int password_hash:1; /* whether password is hashed with member
Dieee802_1x.c2331 user->password_hash = eap_user->password_hash; in ieee802_1x_get_eap_user()