Searched refs:secret_len (Results 1 - 10 of 10) sorted by relevance

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/
H A Dchap-md5.c58 unsigned char *secret, int secret_len,
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap_ms.c190 unsigned char *secret, int secret_len,
212 ChapMS(challenge, (char *)secret, secret_len, md);
238 unsigned char *secret, int secret_len,
253 (char *)secret, secret_len, md,
315 unsigned char *challenge, char *secret, int secret_len,
320 ChapMS(challenge, secret, secret_len, response);
325 unsigned char *challenge, char *secret, int secret_len,
336 our_name, secret, secret_len, response, private,
510 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument
514 int mdlen = secret_len;
189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
533 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument
547 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument
567 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
634 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
683 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument
798 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
814 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument
[all...]
H A Dchap-new.h102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
H A Dchap-new.c399 int secret_len; local
402 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
407 ok = digest->verify_response(id, name, secret, secret_len, challenge,
422 int secret_len; local
443 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) {
444 secret_len = 0; /* assume null secret if can't find one */
454 secret, secret_len, cs->priv);
455 memset(secret, 0, secret_len);
H A Deap.c1318 int secret_len; local
1443 rhostname, secret, &secret_len, 0)) {
1451 MD5_Update(&mdContext, secret, secret_len);
1728 int secret_len; local
1869 esp->es_server.ea_name, secret, &secret_len, 1)) {
1876 MD5_Update(&mdContext, secret, secret_len);
H A Dauth.c1941 get_secret(unit, client, server, secret, secret_len, am_server)
1946 int *secret_len;
1996 *secret_len = len;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppd/
H A Dchap_ms.c227 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, response)
231 int secret_len;
237 int mdlen = secret_len * 2;
239 int mdlen = secret_len * 2 * 8;
248 for (i = 0; i < secret_len; i++)
263 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, response)
267 int secret_len;
276 for (i = 0; i < secret_len; i++)
285 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len)
290 int secret_len;
[all...]
H A Dchap.c407 int secret_len; local
447 secret, &secret_len, 0)) {
448 secret_len = 0; /* assume null secret if can't find one */
465 MD5Update(&mdContext, secret, secret_len);
474 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
499 int secret_len, old_state; local
556 cstate->chal_name, secret, &secret_len, 1)) {
568 MD5Update(&mdContext, secret, secret_len);
H A Dauth.c1416 get_secret(unit, client, server, secret, secret_len, am_server)
1421 int *secret_len;
1464 *secret_len = len;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppoecd/
H A Dauth.c434 get_secret(unit, client, server, secret, secret_len, am_server)
439 int *secret_len;
442 *secret_len = strlen(passwd);
443 BCOPY(passwd, secret, *secret_len);

Completed in 114 milliseconds