• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/

Lines Matching refs:u_char

100 static void	ascii2unicode __P((char[], int, u_char[]));
101 static void NTPasswordHash __P((u_char *, int, u_char[MD4_SIGNATURE_SIZE]));
102 static void ChallengeResponse __P((u_char *, u_char *, u_char[24]));
103 static void ChapMS_NT __P((u_char *, char *, int, u_char[24]));
104 static void ChapMS2_NT __P((u_char *, u_char[16], char *, char *, int,
105 u_char[24]));
107 __P((char*, int, u_char[24], u_char[16], u_char *,
108 char *, u_char[41]));
110 static void ChapMS_LANMan __P((u_char *, char *, int, u_char *));
114 static void Set_Start_Key __P((u_char *, char *, int));
115 static void SetMasterKeys __P((char *, int, u_char[24], int));
124 u_char mppe_send_key[MPPE_MAX_KEY_LEN];
125 u_char mppe_recv_key[MPPE_MAX_KEY_LEN];
442 ChallengeResponse(u_char *challenge,
443 u_char PasswordHash[MD4_SIGNATURE_SIZE],
444 u_char response[24])
446 u_char ZPasswordHash[21];
469 ChallengeHash(u_char PeerChallenge[16], u_char *rchallenge,
470 char *username, u_char Challenge[8])
474 u_char sha1Hash[SHA1_SIGNATURE_SIZE];
500 ascii2unicode(char ascii[], int ascii_len, u_char unicode[])
506 unicode[i * 2] = (u_char) ascii[i];
510 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE])
533 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len,
534 u_char NTResponse[24])
536 u_char unicodePassword[MAX_NT_PASSWORD * 2];
537 u_char PasswordHash[MD4_SIGNATURE_SIZE];
547 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username,
548 char *secret, int secret_len, u_char NTResponse[24])
550 u_char unicodePassword[MAX_NT_PASSWORD * 2];
551 u_char PasswordHash[MD4_SIGNATURE_SIZE];
552 u_char Challenge[8];
564 static u_char *StdText = (u_char *)"KGS!@#$%"; /* key from rasapi32.dll */
567 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len,
571 u_char UcasePassword[MAX_NT_PASSWORD]; /* max is actually 14 */
572 u_char PasswordHash[MD4_SIGNATURE_SIZE];
577 UcasePassword[i] = (u_char)toupper(secret[i]);
588 GenerateAuthenticatorResponse(u_char PasswordHashHash[MD4_SIGNATURE_SIZE],
589 u_char NTResponse[24], u_char PeerChallenge[16],
590 u_char *rchallenge, char *username,
591 u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1])
596 u_char Magic1[39] = /* "Magic server to client signing constant" */
601 u_char Magic2[41] = /* "Pad to make it do more than one iteration" */
610 u_char Digest[SHA1_SIGNATURE_SIZE];
611 u_char Challenge[8];
636 u_char NTResponse[24], u_char PeerChallenge[16],
637 u_char *rchallenge, char *username,
638 u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1])
640 u_char unicodePassword[MAX_NT_PASSWORD * 2];
641 u_char PasswordHash[MD4_SIGNATURE_SIZE];
642 u_char PasswordHashHash[MD4_SIGNATURE_SIZE];
661 mppe_set_keys(u_char *rchallenge, u_char PasswordHashHash[MD4_SIGNATURE_SIZE])
664 u_char Digest[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */
683 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len)
685 u_char unicodePassword[MAX_NT_PASSWORD * 2];
686 u_char PasswordHash[MD4_SIGNATURE_SIZE];
687 u_char PasswordHashHash[MD4_SIGNATURE_SIZE];
704 mppe_set_keys2(u_char PasswordHashHash[MD4_SIGNATURE_SIZE],
705 u_char NTResponse[24], int IsServer)
708 u_char MasterKey[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */
709 u_char Digest[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */
711 u_char SHApad1[40] =
716 u_char SHApad2[40] =
723 u_char Magic1[27] =
729 u_char Magic2[84] =
741 u_char Magic3[84] =
751 u_char *s;
798 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer)
800 u_char unicodePassword[MAX_NT_PASSWORD * 2];
801 u_char PasswordHash[MD4_SIGNATURE_SIZE];
802 u_char PasswordHashHash[MD4_SIGNATURE_SIZE];
814 ChapMS(u_char *rchallenge, char *secret, int secret_len,
847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge,
849 u_char authResponse[], int authenticator)
852 u_char *p = &response[MS_CHAP2_PEER_CHALLENGE];
860 *p++ = (u_char) (drand48() * 0xff);