/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/plugins/radius/ |
H A D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); 395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument [all...] |
H A D | config.c | 450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument 492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */ 495 memset (secret, '\0', MAX_SECRET_LENGTH); 501 strncpy (secret, s, (size_t) len); 502 secret[MAX_SECRET_LENGTH] = '\0'; 538 memset (secret, '\0', sizeof (secret));
|
H A D | radius.c | 200 * 1 -- we are ALWAYS willing to supply a secret. :-) 344 /* Need the RADIUS secret and Request Authenticator to decode MPPE */ 739 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); 747 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); 803 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); 818 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); [all...] |
H A D | radiusclient.h | 358 char secret[MAX_SECRET_LENGTH + 1]; member in struct:request_info
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 70 /* Generate hash of ID, secret, challenge */ 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
H A D | chap_ms.c | 190 unsigned char *secret, int secret_len, 212 ChapMS(challenge, (char *)secret, secret_len, md); 238 unsigned char *secret, int secret_len, 253 (char *)secret, secret_len, md, 315 unsigned char *challenge, char *secret, int secret_len, 320 ChapMS(challenge, secret, secret_len, response); 325 unsigned char *challenge, char *secret, int secret_len, 336 our_name, secret, secret_len, response, private, 510 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 523 MD4Update(&md4Context, secret, 51 189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 533 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument 547 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument 567 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 634 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 683 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument 798 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 814 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | auth.c | 793 error("No secret found for PAP login"); 1295 "but I couldn't find any suitable secret (password) for it to use to do so."); 1379 char secret[MAXWORDLEN]; local 1411 * Open the file of pap secrets and scan for a suitable secret 1424 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) { 1425 warn("no PAP secret found for %s", user); 1428 * If the secret is "@login", it means to check 1431 int login_secret = strcmp(secret, "@login") == 0; 1434 /* login option or secret is @login */ 1438 if (secret[ 1720 char secret[MAXWORDLEN]; local 1771 char secret[MAXWORDLEN]; local [all...] |
H A D | chap-new.c | 398 unsigned char secret[MAXSECRETLEN]; local 401 /* Get the secret that the peer is supposed to know */ 402 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 403 error("No CHAP secret found for authenticating %q", name); 407 ok = digest->verify_response(id, name, secret, secret_len, challenge, 409 memset(secret, 0, sizeof(secret)); 426 char secret[MAXSECRETLEN+1]; local 442 /* get secret for authenticating ourselves with the specified host */ 443 if (!get_secret(0, cs->name, rname, secret, [all...] |
H A D | eap.c | 83 static char *pn_secret = NULL; /* Pseudonym generating secret */ 103 { "srp-pn-secret", o_string, &pn_secret, 104 "Long term pseudonym generation secret" }, 312 * Set DES key according to pseudonym-generating secret and current 1319 char secret[MAXWORDLEN]; local 1439 * Get the secret for authenticating ourselves with 1443 rhostname, secret, &secret_len, 0)) { 1444 dbglog("EAP: no MD5 secret for auth to %q", rhostname); 1451 MD5_Update(&mdContext, secret, secret_len); 1452 BZERO(secret, sizeo 1729 char secret[MAXSECRETLEN]; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/l2tpd-0.69/ |
H A D | aaa.h | 39 unsigned char secret[MAXSTRLEN]; /* The shared secret */ member in struct:challenge
|
H A D | aaa.c | 136 int get_secret (char *us, char *them, char *secret, int size) argument 197 "%s: Invalid authentication info (no secret), line %d\n", 206 "%s: we are '%s', they are '%s', secret is '%s'\n", 209 strncpy (secret, s, size); 252 if (!get_secret (us, them, chal->secret, sizeof (chal->secret))) 254 log (LOG_DEBUG, "%s: no secret found for us='%s' and them='%s'\n", 263 log (LOG_DEBUG, "%s: Here comes the secret\n", __FUNCTION__); 264 bufferDump (chal->secret, strlen (chal->secret)); [all...] |
H A D | l2tp.h | 150 char secret[MAXSTRLEN]; /* Secret to use */ member in struct:tunnel
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppd/ |
H A D | chap_ms.c | 227 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, response)
230 char *secret;
245 /* Initialize the Unicode version of the secret (== password). */
249 unicodePassword[i * 2] = (u_char)secret[i];
263 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, response)
266 char *secret;
277 UcasePassword[i] = (u_char)toupper(secret[i]);
285 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len)
289 char *secret;
297 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_le [all...] |
H A D | auth.c | 491 error("No secret found for PAP login");
855 "but I couldn't find any suitable secret (password) for it to use to do so.");
916 char secret[MAXWORDLEN];
local 944 * Open the file of pap secrets and scan for a suitable secret
956 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) {
957 warn("no PAP secret found for %s", user);
960 /* Check PAP-secret file only, don't check login database! */
964 * If the secret is "@login", it means to check
967 int login_secret = strcmp(secret, "@login") == 0;
970 /* login option or secret i 1258 char secret[MAXWORDLEN]; local 1299 char secret[MAXWORDLEN]; local [all...] |
H A D | chap.c | 408 char secret[MAXSECRETLEN];
local 445 /* get secret for authenticating ourselves with the specified host */
447 secret, &secret_len, 0)) {
448 secret_len = 0; /* assume null secret if can't find one */
449 warn("No CHAP secret found for authenticating us to %q", rhostname);
465 MD5Update(&mdContext, secret, secret_len);
474 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
483 BZERO(secret, sizeof(secret));
503 char secret[MAXSECRETLE local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/lib/ |
H A D | smbrun.c | 186 sends the provided secret to the child stdin. 189 int smbrunsecret(char *cmd, char *secret) argument 230 /* send the secret */ 231 write(ifd[1], secret, strlen(secret));
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/shared/ |
H A D | wlif_utils.h | 57 char *secret; /* user-supplied radius secret */ member in struct:wsec_info_s
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/drivers/char/ |
H A D | random.c | 1269 * generator to pick an initial secret value. This value is hashed 1277 * compensated for by changing the secret periodically. 1386 __u32 secret[12]; member in struct:keydata 1411 get_random_bytes(keyptr->secret, sizeof(keyptr->secret)); 1448 memcpy(&hash[5],keyptr->secret,sizeof(__u32) * 7); 1476 hash[1] = keyptr->secret[9]; 1477 hash[2] = keyptr->secret[10]; 1478 hash[3] = keyptr->secret[11]; 1480 return half_md4_transform(hash, keyptr->secret); [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/tests/certs/scripts/ |
H A D | genroot.sh | 44 openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout pass:secret 47 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret
|
H A D | genserv.sh | 71 $OPENSSL req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout pass:secret 75 $OPENSSL rsa -in $PREFIX-sv.key -out $PREFIX-sv.key -passin pass:secret
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppoecd/ |
H A D | auth.c | 154 error("No secret found for PAP login");
429 * get_secret - open the CHAP secret file and return the secret
434 get_secret(unit, client, server, secret, secret_len, am_server)
438 char *secret;
443 BCOPY(passwd, secret, *secret_len);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | pubkey.c | 232 static const char *secret; local 237 case 0: secret = sample_private_key_1; break; 238 case 1: secret = sample_private_key_1_1; break; 239 case 2: secret = sample_private_key_1_2; break; 246 rc = gcry_sexp_sscan (&sec_key, NULL, secret, strlen (secret)); 327 ? "(genkey (elg (nbits 4:1024)(xvalue my.not-so-secret.key)))" 843 die ("parameter d not found in RSA secret key [%d]\n", what);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | rsa.c | 91 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey); 119 /* Decrypt using the secret key. */ 120 secret (decr_plaintext, ciphertext, sk); 129 /* Use the RSA secret function to create a signature of the plaintext. */ 130 secret (signature, plaintext, sk); 237 /* select two (very secret) primes */ 282 /* calculate the secret key d = e^1 mod phi */ 541 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */ 586 * Test whether the secret key is valid. 678 log_info ( "RSA secret ke 703 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function [all...] |
H A D | primegen.c | 34 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel, 291 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret. 755 gen_prime (unsigned int nbits, int secret, int randomlevel, 774 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits ); 787 generating a secret prime we are most probably doing that 791 if (secret) 825 if (!mpi_test_bit( ptest, nbits-1-secret )) 753 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
|