/seL4-camkes-master/projects/lwip/src/netif/ppp/ |
H A D | chap-md5.c | 63 const unsigned char *challenge, const unsigned char *response, 72 challenge_len = *challenge++; 75 /* Generate hash of ID, secret, challenge */ 80 lwip_md5_update(&ctx, challenge, challenge_len); 96 const unsigned char *challenge, const char *secret, int secret_len, 100 int challenge_len = *challenge++; 109 lwip_md5_update(&ctx, challenge, challenge_len); 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
|
H A D | chap_ms.c | 209 { "mschap-challenge", o_string, &mschap_challenge, 210 "specify CHAP challenge" }, 211 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 212 "specify CHAP peer challenge" }, 220 * chapms_generate_challenge - generate a challenge for MS-CHAP. 221 * For MS-CHAP the challenge length is fixed at 8 bytes. 222 * The length goes in challenge[0] and the actual challenge starts 223 * at challenge[1]. 225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { argument 237 chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) argument 249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument 385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument 496 ChallengeResponse(const u_char *challenge, const u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument [all...] |
H A D | chap-new.c | 53 /* Hook for a plugin to validate CHAP challenge */ 56 const unsigned char *challenge, const unsigned char *response, 67 { "chap-max-challenge", o_int, &pcb->settings.chap_max_transmits, 68 "Set max #xmits for challenge", OPT_PRIO }, 97 const unsigned char *challenge, const unsigned char *response, 191 * There isn't much to do until we receive a challenge. 219 * chap_timeout - It's time to send another challenge to the peer. 220 * This could be either a retransmission of a previous challenge, 221 * or a new challenge to start re-authentication. 246 MEMCPY(p->payload, pcb->chap_server.challenge, pc 411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument [all...] |
/seL4-camkes-master/projects/lwip/src/include/netif/ppp/ |
H A D | chap-new.h | 66 * Semi-arbitrary limits on challenge and response fields. 72 * These limits apply to challenge and response packets we send. 136 * Note: challenge and response arguments below are formatted as 137 * a length byte followed by the actual challenge/response data. 139 void (*generate_challenge)(ppp_pcb *pcb, unsigned char *challenge); 142 const unsigned char *challenge, const unsigned char *response, 146 const unsigned char *challenge, const char *secret, int secret_len, 171 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state 177 /* Hook for a plugin to validate CHAP challenge */ 180 unsigned char *challenge, unsigne [all...] |
/seL4-camkes-master/projects/projects_libs/libtx2bpmp/include/tx2bpmp/ |
H A D | bpmp.h | 275 * #challenge. 279 uint32_t challenge; member in struct:mrq_ping_request 287 * mrq_ping_request challenge left shifted by 1 with the carry-bit 502 uint32_t challenge; member in struct:mrq_threaded_ping_request
|
/seL4-camkes-master/projects/picotcp/modules/ |
H A D | pico_dev_ppp.c | 1812 uint8_t *challenge; local 1818 challenge = PICO_ZALLOC(challenge_size); 1820 if (!challenge) 1825 challenge[i++] = ch->id; 1826 memcpy(challenge + i, ppp->password, pwdlen); 1828 memcpy(challenge + i, recvd_challenge, *recvd_challenge_len); 1830 pico_md5sum(md5resp, challenge, i); 1831 PICO_FREE(challenge);
|