/external/wpa_supplicant_8/hostapd/ |
H A D | nt_password_hash.c | 17 unsigned char password_hash[16]; local 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) 42 for (i = 0; i < sizeof(password_hash); i++) 43 printf("%02x", password_hash[i]);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.h | 19 const u8 *password_hash, 27 const u8 *password_hash, 34 void challenge_response(const u8 *challenge, const u8 *password_hash, 37 u8 *password_hash); 38 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash); 46 const u8 *password_hash, u8 *pw_block); 51 void nt_password_hash_encrypted_with_block(const u8 *password_hash,
|
H A D | ms_funcs.c | 106 * @password_hash: 16-octet PasswordHash (OUT) 110 u8 *password_hash) 121 return md4_vector(1, (const u8 **) &pos, &len, password_hash); 127 * @password_hash: 16-octet PasswordHash (IN) 131 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash) argument 134 return md4_vector(1, &password_hash, &len, password_hash_hash); 141 * @password_hash: 16-octet PasswordHash (IN) 144 void challenge_response(const u8 *challenge, const u8 *password_hash, argument 148 des_encrypt(challenge, password_hash, response); 149 des_encrypt(challenge, password_hash 109 nt_password_hash(const u8 *password, size_t password_len, u8 *password_hash) argument 174 u8 password_hash[16]; local 196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 290 u8 password_hash[16]; local 310 u8 password_hash[16]; local 429 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument 475 u8 password_hash[16]; local 493 nt_password_hash_encrypted_with_block(const u8 *password_hash, const u8 *block, u8 *cypher) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.h | 19 const u8 *password_hash, 27 const u8 *password_hash, 34 void challenge_response(const u8 *challenge, const u8 *password_hash, 37 u8 *password_hash); 38 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash); 46 const u8 *password_hash, u8 *pw_block); 51 void nt_password_hash_encrypted_with_block(const u8 *password_hash,
|
H A D | ms_funcs.c | 106 * @password_hash: 16-octet PasswordHash (OUT) 110 u8 *password_hash) 121 return md4_vector(1, (const u8 **) &pos, &len, password_hash); 127 * @password_hash: 16-octet PasswordHash (IN) 131 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash) argument 134 return md4_vector(1, &password_hash, &len, password_hash_hash); 141 * @password_hash: 16-octet PasswordHash (IN) 144 void challenge_response(const u8 *challenge, const u8 *password_hash, argument 148 des_encrypt(challenge, password_hash, response); 149 des_encrypt(challenge, password_hash 109 nt_password_hash(const u8 *password, size_t password_len, u8 *password_hash) argument 174 u8 password_hash[16]; local 196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 290 u8 password_hash[16]; local 310 u8 password_hash[16]; local 429 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument 475 u8 password_hash[16]; local 493 nt_password_hash_encrypted_with_block(const u8 *password_hash, const u8 *block, u8 *cypher) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.h | 19 const u8 *password_hash, 27 const u8 *password_hash, 34 void challenge_response(const u8 *challenge, const u8 *password_hash, 37 u8 *password_hash); 38 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash); 46 const u8 *password_hash, u8 *pw_block); 51 void nt_password_hash_encrypted_with_block(const u8 *password_hash,
|
H A D | ms_funcs.c | 106 * @password_hash: 16-octet PasswordHash (OUT) 110 u8 *password_hash) 121 return md4_vector(1, (const u8 **) &pos, &len, password_hash); 127 * @password_hash: 16-octet PasswordHash (IN) 131 int hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash) argument 134 return md4_vector(1, &password_hash, &len, password_hash_hash); 141 * @password_hash: 16-octet PasswordHash (IN) 144 void challenge_response(const u8 *challenge, const u8 *password_hash, argument 148 des_encrypt(challenge, password_hash, response); 149 des_encrypt(challenge, password_hash 109 nt_password_hash(const u8 *password, size_t password_len, u8 *password_hash) argument 174 u8 password_hash[16]; local 196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 290 u8 password_hash[16]; local 310 u8 password_hash[16]; local 429 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument 475 u8 password_hash[16]; local 493 nt_password_hash_encrypted_with_block(const u8 *password_hash, const u8 *block, u8 *cypher) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | mschapv2.c | 46 u8 password_hash[16], password_hash_hash[16]; local 99 if (nt_password_hash(password, password_len, password_hash) || 100 hash_nt_password_hash(password_hash, password_hash_hash))
|
H A D | eap_mschapv2.c | 508 u8 password_hash[16], password_hash_hash[16]; local 597 nt_password_hash(new_password, new_password_len, password_hash); 598 hash_nt_password_hash(password_hash, password_hash_hash);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | mschapv2.c | 46 u8 password_hash[16], password_hash_hash[16]; local 99 if (nt_password_hash(password, password_len, password_hash) || 100 hash_nt_password_hash(password_hash, password_hash_hash))
|
H A D | eap_mschapv2.c | 508 u8 password_hash[16], password_hash_hash[16]; local 597 nt_password_hash(new_password, new_password_len, password_hash); 598 hash_nt_password_hash(password_hash, password_hash_hash);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 46 u8 password_hash[16], password_hash_hash[16]; local 99 if (nt_password_hash(password, password_len, password_hash) || 100 hash_nt_password_hash(password_hash, password_hash_hash))
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap.h | 31 int password_hash; /* whether password is hashed with member in struct:eap_user
|
H A D | eap_server_md5.c | 107 sm->user->password_hash) {
|
H A D | eap_server_ttls.c | 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 544 if (!sm->user || !sm->user->password || sm->user->password_hash || 628 if (sm->user->password_hash) 725 if (sm->user->password_hash) { 744 if (sm->user->password_hash) {
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap.h | 31 int password_hash; /* whether password is hashed with member in struct:eap_user
|
H A D | eap_server_md5.c | 107 sm->user->password_hash) {
|
H A D | eap_server_ttls.c | 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 544 if (!sm->user || !sm->user->password || sm->user->password_hash || 628 if (sm->user->password_hash) 725 if (sm->user->password_hash) { 744 if (sm->user->password_hash) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap.h | 31 int password_hash; /* whether password is hashed with member in struct:eap_user
|
H A D | eap_server_md5.c | 107 sm->user->password_hash) {
|
H A D | eap_server_ttls.c | 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 544 if (!sm->user || !sm->user->password || sm->user->password_hash || 628 if (sm->user->password_hash) 725 if (sm->user->password_hash) { 744 if (sm->user->password_hash) {
|
/external/chromium/chrome/browser/autofill/ |
H A D | autofill_ie_toolbar_import_win.cc | 36 const wchar_t* const kPasswordHashValue = L"password_hash"; 230 string16 password_hash; local 234 password_hash = ReadAndDecryptValue(&cc_key, kPasswordHashValue); 239 if (password_hash.empty() && IsEmptySalt(salt)) {
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | authsrv.c | 79 user->password_hash = eap_user->password_hash;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | authsrv.c | 79 user->password_hash = eap_user->password_hash;
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | authsrv.c | 79 user->password_hash = eap_user->password_hash;
|