/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap_ms.c | 190 unsigned char *secret, int secret_len, 212 ChapMS(challenge, (char *)secret, secret_len, md); 238 unsigned char *secret, int secret_len, 253 (char *)secret, secret_len, md, 315 unsigned char *challenge, char *secret, int secret_len, 320 ChapMS(challenge, secret, secret_len, response); 325 unsigned char *challenge, char *secret, int secret_len, 336 our_name, secret, secret_len, response, private, 510 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 514 int mdlen = secret_len; 189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 533 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument 547 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument 567 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 634 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 683 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument 798 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 814 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
H A D | chap-new.c | 399 int secret_len; local 402 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 407 ok = digest->verify_response(id, name, secret, secret_len, challenge, 422 int secret_len; local 443 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) { 444 secret_len = 0; /* assume null secret if can't find one */ 453 secret, secret_len, cs->priv); 454 memset(secret, 0, secret_len);
|
H A D | eap.c | 1318 int secret_len; local 1443 rhostname, secret, &secret_len, 0)) { 1451 MD5_Update(&mdContext, secret, secret_len); 1728 int secret_len; local 1869 esp->es_server.ea_name, secret, &secret_len, 1)) { 1876 MD5_Update(&mdContext, secret, secret_len);
|
H A D | auth.c | 1941 get_secret(unit, client, server, secret, secret_len, am_server) 1946 int *secret_len; 1996 *secret_len = len;
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/ |
H A D | chap_ms.c | 227 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, response) 231 int secret_len; 237 int mdlen = secret_len * 2; 239 int mdlen = secret_len * 2 * 8; 248 for (i = 0; i < secret_len; i++) 263 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, response) 267 int secret_len; 276 for (i = 0; i < secret_len; i++) 285 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len) 290 int secret_len; [all...] |
H A D | chap.c | 407 int secret_len; local 447 secret, &secret_len, 0)) { 448 secret_len = 0; /* assume null secret if can't find one */ 465 MD5Update(&mdContext, secret, secret_len); 474 ChapMS(cstate, (char *)rchallenge, rchallenge_len, secret, secret_len); 499 int secret_len, old_state; local 556 cstate->chal_name, secret, &secret_len, 1)) { 568 MD5Update(&mdContext, secret, secret_len);
|
H A D | auth.c | 1403 get_secret(unit, client, server, secret, secret_len, am_server) 1408 int *secret_len; 1451 *secret_len = len;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/bfa/include/fcs/ |
H A D | bfa_fcs_auth.h | 48 u8 secret_len; member in struct:bfa_fcs_auth_s
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppoecd/ |
H A D | auth.c | 420 get_secret(unit, client, server, secret, secret_len, am_server) 425 int *secret_len; 428 *secret_len = strlen(passwd); 429 BCOPY(passwd, secret, *secret_len);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_sess.c | 1022 int *secret_len, 1019 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb) (SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
|
H A D | ssl.h | 394 int *secret_len,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_sess.c | 1022 int *secret_len, 1019 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb) (SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
|
H A D | ssl.h | 394 int *secret_len,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | ssl.c | 1438 int secret_len, 1466 tls1_PRF (BPTR(&seed), BLEN(&seed), secret, secret_len, output, output_len); local 1437 openvpn_PRF(const uint8_t *secret, int secret_len, const char *label, const uint8_t *client_seed, int client_seed_len, const uint8_t *server_seed, int server_seed_len, const struct session_id *client_sid, const struct session_id *server_sid, uint8_t *output, int output_len) argument
|