/asus-wl-520gu-7.0.1.45/src/router/rp-l2tp/ |
H A D | auth.c | 37 l2tp_auth_gen_response(uint16_t msg_type, char const *secret, unsigned char const *challenge, size_t chal_len, unsigned char buf[16]) argument
|
H A D | dgram.c | 822 dgram_do_hide(uint16_t type, uint16_t len, unsigned char *value, unsigned char const *secret, size_t secret_len, unsigned char const *random_data, size_t random_len, unsigned char *output) argument 889 dgram_do_unhide(uint16_t type, uint16_t *len, unsigned char *value, unsigned char const *secret, size_t secret_len, unsigned char const *random_data, size_t random_len, unsigned char *output) argument [all...] |
H A D | l2tp.h | 84 char secret[MAX_SECRET_LEN]; /* Secret for this peer */ member in struct:l2tp_peer_t
|
/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/ |
H A D | chap-md5.c | 62 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 93 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.c | 397 char secret[MAXSECRETLEN]; local 425 char secret[MAXSECRETLEN+1]; local [all...] |
H A D | chap_ms.c | 514 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 188 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 238 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 317 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 327 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 531 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument 545 ChapMS2_NT(char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument 566 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 587 GenerateAuthenticatorResponse(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 667 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument 685 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 784 ChapMS(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 821 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | eap.c | 1319 char secret[MAXWORDLEN]; local 1729 char secret[MAXSECRETLEN]; local [all...] |
H A D | auth.c | 1241 char secret[MAXWORDLEN]; local 1581 char secret[MAXWORDLEN]; local 1631 char secret[MAXWORDLEN]; local [all...] |
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/ |
H A D | chap-md5.c | 62 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 93 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.c | 397 char secret[MAXSECRETLEN]; local 425 char secret[MAXSECRETLEN+1]; local [all...] |
H A D | chap_ms.c | 504 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 184 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 234 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 313 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 323 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 521 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument 535 ChapMS2_NT(char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument 555 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 576 GenerateAuthenticatorResponse(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 655 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument 673 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 772 ChapMS(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 809 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | eap.c | 1319 char secret[MAXWORDLEN]; local 1729 char secret[MAXSECRETLEN]; local [all...] |
H A D | auth.c | 1241 char secret[MAXWORDLEN]; local 1581 char secret[MAXWORDLEN]; local 1631 char secret[MAXWORDLEN]; local [all...] |
/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/plugins/radius/radiusclient/lib/ |
H A D | config.c | 460 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument
|
H A D | sendserver.c | 34 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument 210 char secret[MAX_SECRET_LENGTH + 1]; local 397 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument [all...] |
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/plugins/radius/radiusclient/lib/ |
H A D | config.c | 460 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument
|
H A D | sendserver.c | 34 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument 210 char secret[MAX_SECRET_LENGTH + 1]; local 397 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument [all...] |
/asus-wl-520gu-7.0.1.45/src/router/ez-ipupdate/ |
H A D | asus_ddns.c | 519 unsigned long secret; local
|
/asus-wl-520gu-7.0.1.45/src/router/ppp/pppd/ |
H A D | chap.c | 408 char secret[MAXSECRETLEN]; local 503 char secret[MAXSECRETLE local [all...] |
H A D | auth.c | 918 char secret[MAXWORDLEN]; local 1256 char secret[MAXWORDLEN]; local 1297 char secret[MAXWORDLEN]; local [all...] |
/asus-wl-520gu-7.0.1.45/src/linux/linux/drivers/char/ |
H A D | random.c | 2017 static __u32 secret[12]; local 2045 static __u32 secret[12]; local 2069 static __u32 secret[12]; local 2119 static __u32 secret[12]; local [all...] |
/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/plugins/radius/radiusclient/include/ |
H A D | radiusclient.h | 378 char secret[MAX_SECRET_LENGTH + 1]; member in struct:request_info
|
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/plugins/radius/radiusclient/include/ |
H A D | radiusclient.h | 378 char secret[MAX_SECRET_LENGTH + 1]; member in struct:request_info
|
/asus-wl-520gu-7.0.1.45/src/router/samba/source/include/ |
H A D | rpc_netlogon.h | 806 UNISTR2 secret; member in struct:__anon12331
|