/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap_ms.c | 190 unsigned char *secret, int secret_len, 212 ChapMS(challenge, (char *)secret, secret_len, md); 238 unsigned char *secret, int secret_len, 253 (char *)secret, secret_len, md, 315 unsigned char *challenge, char *secret, int secret_len, 320 ChapMS(challenge, secret, secret_len, response); 325 unsigned char *challenge, char *secret, int secret_len, 336 our_name, secret, secret_len, response, private, 510 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 514 int mdlen = secret_len; 189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 533 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument 547 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument 567 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 634 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 683 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument 798 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 814 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
H A D | chap-new.c | 399 int secret_len; local 402 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 407 ok = digest->verify_response(id, name, secret, secret_len, challenge, 422 int secret_len; local 443 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) { 444 secret_len = 0; /* assume null secret if can't find one */ 454 secret, secret_len, cs->priv); 455 memset(secret, 0, secret_len);
|
H A D | eap.c | 1318 int secret_len; local 1443 rhostname, secret, &secret_len, 0)) { 1451 MD5_Update(&mdContext, secret, secret_len); 1728 int secret_len; local 1869 esp->es_server.ea_name, secret, &secret_len, 1)) { 1876 MD5_Update(&mdContext, secret, secret_len);
|
H A D | auth.c | 1941 get_secret(unit, client, server, secret, secret_len, am_server) 1946 int *secret_len; 1996 *secret_len = len;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppd/ |
H A D | chap_ms.c | 227 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, response)
231 int secret_len;
237 int mdlen = secret_len * 2;
239 int mdlen = secret_len * 2 * 8;
248 for (i = 0; i < secret_len; i++)
263 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, response)
267 int secret_len;
276 for (i = 0; i < secret_len; i++)
285 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len)
290 int secret_len;
[all...] |
H A D | chap.c | 407 int secret_len;
local 447 secret, &secret_len, 0)) {
448 secret_len = 0; /* assume null secret if can't find one */
465 MD5Update(&mdContext, secret, secret_len);
474 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
499 int secret_len, old_state;
local 556 cstate->chal_name, secret, &secret_len, 1)) {
568 MD5Update(&mdContext, secret, secret_len);
|
H A D | auth.c | 1416 get_secret(unit, client, server, secret, secret_len, am_server)
1421 int *secret_len;
1464 *secret_len = len;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppoecd/ |
H A D | auth.c | 434 get_secret(unit, client, server, secret, secret_len, am_server)
439 int *secret_len;
442 *secret_len = strlen(passwd);
443 BCOPY(passwd, secret, *secret_len);
|