Searched refs:challenge (Results 1 - 6 of 6) sorted by relevance

/seL4-camkes-master/projects/lwip/src/netif/ppp/
H A Dchap-md5.c63 const unsigned char *challenge, const unsigned char *response,
72 challenge_len = *challenge++;
75 /* Generate hash of ID, secret, challenge */
80 lwip_md5_update(&ctx, challenge, challenge_len);
96 const unsigned char *challenge, const char *secret, int secret_len,
100 int challenge_len = *challenge++;
109 lwip_md5_update(&ctx, challenge, challenge_len);
61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
H A Dchap_ms.c209 { "mschap-challenge", o_string, &mschap_challenge,
210 "specify CHAP challenge" },
211 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
212 "specify CHAP peer challenge" },
220 * chapms_generate_challenge - generate a challenge for MS-CHAP.
221 * For MS-CHAP the challenge length is fixed at 8 bytes.
222 * The length goes in challenge[0] and the actual challenge starts
223 * at challenge[1].
225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { argument
237 chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) argument
249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
496 ChallengeResponse(const u_char *challenge, const u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument
[all...]
H A Dchap-new.c53 /* Hook for a plugin to validate CHAP challenge */
56 const unsigned char *challenge, const unsigned char *response,
67 { "chap-max-challenge", o_int, &pcb->settings.chap_max_transmits,
68 "Set max #xmits for challenge", OPT_PRIO },
97 const unsigned char *challenge, const unsigned char *response,
191 * There isn't much to do until we receive a challenge.
219 * chap_timeout - It's time to send another challenge to the peer.
220 * This could be either a retransmission of a previous challenge,
221 * or a new challenge to start re-authentication.
246 MEMCPY(p->payload, pcb->chap_server.challenge, pc
411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
[all...]
/seL4-camkes-master/projects/lwip/src/include/netif/ppp/
H A Dchap-new.h66 * Semi-arbitrary limits on challenge and response fields.
72 * These limits apply to challenge and response packets we send.
136 * Note: challenge and response arguments below are formatted as
137 * a length byte followed by the actual challenge/response data.
139 void (*generate_challenge)(ppp_pcb *pcb, unsigned char *challenge);
142 const unsigned char *challenge, const unsigned char *response,
146 const unsigned char *challenge, const char *secret, int secret_len,
171 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state
177 /* Hook for a plugin to validate CHAP challenge */
180 unsigned char *challenge, unsigne
[all...]
/seL4-camkes-master/projects/projects_libs/libtx2bpmp/include/tx2bpmp/
H A Dbpmp.h275 * #challenge.
279 uint32_t challenge; member in struct:mrq_ping_request
287 * mrq_ping_request challenge left shifted by 1 with the carry-bit
502 uint32_t challenge; member in struct:mrq_threaded_ping_request
/seL4-camkes-master/projects/picotcp/modules/
H A Dpico_dev_ppp.c1812 uint8_t *challenge; local
1818 challenge = PICO_ZALLOC(challenge_size);
1820 if (!challenge)
1825 challenge[i++] = ch->id;
1826 memcpy(challenge + i, ppp->password, pwdlen);
1828 memcpy(challenge + i, recvd_challenge, *recvd_challenge_len);
1830 pico_md5sum(md5resp, challenge, i);
1831 PICO_FREE(challenge);

Completed in 98 milliseconds