/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.c | 103 * nt_password_hash - NtPasswordHash() - RFC 2759, Sect. 8.3 109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() function 181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response() 290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response() 311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response() 477 if (nt_password_hash(old_password, old_password_len, password_hash)) in new_password_encrypted_with_old_nt_password_hash() 522 if (nt_password_hash(old_password, old_password_len, in old_nt_password_hash_encrypted_with_new_nt_password_hash() 524 nt_password_hash(new_password, new_password_len, in old_nt_password_hash_encrypted_with_new_nt_password_hash()
|
H A D | ms_funcs.h | 38 int nt_password_hash(const u8 *password, size_t password_len,
|
H A D | crypto_module_tests.c | 2087 if (nt_password_hash((u8 *) password, os_strlen(password), buf) || in test_ms_funcs() 2089 wpa_printf(MSG_ERROR, "nt_password_hash failed"); in test_ms_funcs()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | ms_funcs.c | 103 * nt_password_hash - NtPasswordHash() - RFC 2759, Sect. 8.3 109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() function 181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response() 290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response() 311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response() 477 if (nt_password_hash(old_password, old_password_len, password_hash)) in new_password_encrypted_with_old_nt_password_hash() 522 if (nt_password_hash(old_password, old_password_len, in old_nt_password_hash_encrypted_with_new_nt_password_hash() 524 nt_password_hash(new_password, new_password_len, in old_nt_password_hash_encrypted_with_new_nt_password_hash()
|
H A D | ms_funcs.h | 38 int nt_password_hash(const u8 *password, size_t password_len,
|
H A D | crypto_module_tests.c | 2236 if (nt_password_hash((u8 *) password, os_strlen(password), buf) || in test_ms_funcs() 2238 wpa_printf(MSG_ERROR, "nt_password_hash failed"); in test_ms_funcs()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | nt_password_hash.c | 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
H A D | nt_password_hash.c | 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | mschapv2.c | 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
H A D | eap_mschapv2.c | 311 nt_password_hash(config->new_password, in eap_mschapv2_password_changed() 567 if (nt_password_hash(new_password, new_password_len, in eap_mschapv2_change_password() 614 if (nt_password_hash(new_password, new_password_len, password_hash) || in eap_mschapv2_change_password()
|
H A D | eap_leap.c | 240 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response() 362 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_getKey()
|
H A D | eap_pwd.c | 408 res = nt_password_hash(data->password, in eap_pwd_perform_commit_exchange()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | mschapv2.c | 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
H A D | eap_mschapv2.c | 311 nt_password_hash(config->new_password, in eap_mschapv2_password_changed() 567 if (nt_password_hash(new_password, new_password_len, in eap_mschapv2_change_password() 614 if (nt_password_hash(new_password, new_password_len, password_hash) || in eap_mschapv2_change_password()
|
H A D | eap_leap.c | 240 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response() 362 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_getKey()
|
H A D | eap_pwd.c | 408 res = nt_password_hash(data->password, in eap_pwd_perform_commit_exchange()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_mschapv2.c | 421 if (nt_password_hash(sm->user->password, in eap_mschapv2_process_response()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_mschapv2.c | 421 if (nt_password_hash(sm->user->password, in eap_mschapv2_process_response()
|