| /components/net/lwip/lwip-2.1.2/src/netif/ppp/ |
| A D | chap_ms.c | 250 const unsigned char *secret, int secret_len, in chapms_verify_response() argument 298 const unsigned char *secret, int secret_len, in chapms2_verify_response() argument 313 (const char *)secret, secret_len, md, in chapms2_verify_response() 382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response() 397 our_name, secret, secret_len, response, private_, in chapms2_make_response() 577 lwip_md4_update(&md4Context, secret, secret_len); in NTPasswordHash() 588 ascii2unicode(secret, secret_len, unicodePassword); in ChapMS_NT() 623 UcasePassword[i] = (u_char)toupper(secret[i]); in ChapMS_LANMan() 691 const char *secret, int secret_len, in GenerateAuthenticatorResponsePlain() argument 848 ChapMS_LANMan(rchallenge, secret, secret_len, in ChapMS() [all …]
|
| A D | chap-md5.c | 62 const unsigned char *secret, int secret_len, in chap_md5_verify_response() argument 79 lwip_md5_update(&ctx, secret, secret_len); in chap_md5_verify_response() 96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response() argument 108 lwip_md5_update(&ctx, (const u_char *)secret, secret_len); in chap_md5_make_response()
|
| A D | auth.c | 1572 char secret[MAXWORDLEN]; 1639 && strcmp(crypt(ppp_settings.passwd, secret), secret) != 0) 1674 BZERO(secret, sizeof(secret)); 1692 char secret[MAXWORDLEN]; 1714 BZERO(secret, sizeof(secret)); 1765 BZERO(secret, sizeof(secret)); 1991 char *secret; 2012 secret[0] = '\0'; 2324 char *secret; 2404 if (secret != NULL) { [all …]
|
| A D | chap-new.c | 416 unsigned char secret[MAXSECRETLEN]; local 420 if (!get_secret(pcb, name, ourname, (char *)secret, &secret_len, 1)) { 424 ok = digest->verify_response(pcb, id, name, secret, secret_len, challenge, 426 memset(secret, 0, sizeof(secret)); 442 char secret[MAXSECRETLEN+1]; local 469 if (!get_secret(pcb, pcb->chap_client.name, rname, secret, &secret_len, 0)) { 479 secret, secret_len, pcb->chap_client.priv); 480 memset(secret, 0, secret_len);
|
| A D | pppapi.c | 221 msg->msg.msg.l2tpcreate.secret, in pppapi_do_pppol2tp_create() 237 const u8_t *secret, u8_t secret_len, in pppapi_pppol2tp_create() argument 244 LWIP_UNUSED_ARG(secret); in pppapi_pppol2tp_create() 254 PPPAPI_VAR_REF(msg).msg.msg.l2tpcreate.secret = secret; in pppapi_pppol2tp_create()
|
| A D | pppol2tp.c | 111 const u8_t *secret, u8_t secret_len, in pppol2tp_create() argument 117 LWIP_UNUSED_ARG(secret); in pppol2tp_create() 149 l2tp->secret = secret; in pppol2tp_create() 314 if (l2tp->secret != NULL) { in pppol2tp_connect() 614 if (l2tp->secret == NULL) { in pppol2tp_dispatch_control_packet() 624 lwip_md5_update(&md5_ctx, l2tp->secret, l2tp->secret_len); in pppol2tp_dispatch_control_packet() 640 lwip_md5_update(&md5_ctx, l2tp->secret, l2tp->secret_len); in pppol2tp_dispatch_control_packet() 819 if (l2tp->secret != NULL) { in pppol2tp_send_sccrq() 893 if (l2tp->secret != NULL) { in pppol2tp_send_sccrq()
|
| A D | eap.c | 1315 char secret[MAXSECRETLEN]; in eap_request() local 1441 rhostname, secret, &secret_len, 0)) { in eap_request() 1450 lwip_md5_update(&mdContext, (u_char *)secret, secret_len); in eap_request() 1451 BZERO(secret, sizeof (secret)); in eap_request() 1604 pcb->eap.es_client.ea_peer, secret, 0) == 0) { in eap_request() 1615 t_clientpasswd(tc, secret); in eap_request() 1616 BZERO(secret, sizeof (secret)); in eap_request() 1729 char secret[MAXSECRETLEN]; in eap_response() local 1869 pcb->eap.es_server.ea_name, secret, &secret_len, 1)) { in eap_response() 1877 lwip_md5_update(&mdContext, (u_char *)secret, secret_len); in eap_response() [all …]
|
| /components/net/lwip/lwip-2.0.3/src/netif/ppp/ |
| A D | chap_ms.c | 250 const unsigned char *secret, int secret_len, in chapms_verify_response() argument 298 const unsigned char *secret, int secret_len, in chapms2_verify_response() argument 313 (const char *)secret, secret_len, md, in chapms2_verify_response() 382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response() 397 our_name, secret, secret_len, response, private_, in chapms2_make_response() 577 lwip_md4_update(&md4Context, secret, secret_len); in NTPasswordHash() 588 ascii2unicode(secret, secret_len, unicodePassword); in ChapMS_NT() 623 UcasePassword[i] = (u_char)toupper(secret[i]); in ChapMS_LANMan() 691 const char *secret, int secret_len, in GenerateAuthenticatorResponsePlain() argument 848 ChapMS_LANMan(rchallenge, secret, secret_len, in ChapMS() [all …]
|
| A D | chap-md5.c | 62 const unsigned char *secret, int secret_len, in chap_md5_verify_response() argument 79 lwip_md5_update(&ctx, secret, secret_len); in chap_md5_verify_response() 96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response() argument 108 lwip_md5_update(&ctx, (const u_char *)secret, secret_len); in chap_md5_make_response()
|
| A D | auth.c | 1572 char secret[MAXWORDLEN]; 1639 && strcmp(crypt(ppp_settings.passwd, secret), secret) != 0) 1674 BZERO(secret, sizeof(secret)); 1692 char secret[MAXWORDLEN]; 1714 BZERO(secret, sizeof(secret)); 1765 BZERO(secret, sizeof(secret)); 1991 char *secret; 2012 secret[0] = '\0'; 2324 char *secret; 2404 if (secret != NULL) { [all …]
|
| A D | chap-new.c | 416 unsigned char secret[MAXSECRETLEN]; local 420 if (!get_secret(pcb, name, ourname, (char *)secret, &secret_len, 1)) { 424 ok = digest->verify_response(pcb, id, name, secret, secret_len, challenge, 426 memset(secret, 0, sizeof(secret)); 442 char secret[MAXSECRETLEN+1]; local 469 if (!get_secret(pcb, pcb->chap_client.name, rname, secret, &secret_len, 0)) { 479 secret, secret_len, pcb->chap_client.priv); 480 memset(secret, 0, secret_len);
|
| A D | pppapi.c | 221 msg->msg.msg.l2tpcreate.secret, in pppapi_do_pppol2tp_create() 237 const u8_t *secret, u8_t secret_len, in pppapi_pppol2tp_create() argument 244 LWIP_UNUSED_ARG(secret); in pppapi_pppol2tp_create() 254 PPPAPI_VAR_REF(msg).msg.msg.l2tpcreate.secret = secret; in pppapi_pppol2tp_create()
|
| A D | pppol2tp.c | 111 const u8_t *secret, u8_t secret_len, in pppol2tp_create() argument 117 LWIP_UNUSED_ARG(secret); in pppol2tp_create() 149 l2tp->secret = secret; in pppol2tp_create() 314 if (l2tp->secret != NULL) { in pppol2tp_connect() 592 if (l2tp->secret == NULL) { in pppol2tp_dispatch_control_packet() 602 lwip_md5_update(&md5_ctx, l2tp->secret, l2tp->secret_len); in pppol2tp_dispatch_control_packet() 618 lwip_md5_update(&md5_ctx, l2tp->secret, l2tp->secret_len); in pppol2tp_dispatch_control_packet() 791 if (l2tp->secret != NULL) { in pppol2tp_send_sccrq() 865 if (l2tp->secret != NULL) { in pppol2tp_send_sccrq()
|
| A D | eap.c | 1315 char secret[MAXSECRETLEN]; in eap_request() local 1441 rhostname, secret, &secret_len, 0)) { in eap_request() 1450 lwip_md5_update(&mdContext, (u_char *)secret, secret_len); in eap_request() 1451 BZERO(secret, sizeof (secret)); in eap_request() 1604 pcb->eap.es_client.ea_peer, secret, 0) == 0) { in eap_request() 1615 t_clientpasswd(tc, secret); in eap_request() 1616 BZERO(secret, sizeof (secret)); in eap_request() 1729 char secret[MAXSECRETLEN]; in eap_response() local 1869 pcb->eap.es_server.ea_name, secret, &secret_len, 1)) { in eap_response() 1877 lwip_md5_update(&mdContext, (u_char *)secret, secret_len); in eap_response() [all …]
|
| /components/net/lwip/lwip-1.4.1/src/netif/ppp/ |
| A D | chpms.c | 133 char *secret, 307 char *secret, in ChapMS_NT() argument 322 unicodePassword[i * 2] = (u_char)secret[i]; in ChapMS_NT() 346 char *secret, in ChapMS_LANMan() argument 357 UcasePassword[i] = (u_char)toupper(secret[i]); in ChapMS_LANMan() 366 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len) in ChapMS() argument 374 CHAPDEBUG(LOG_INFO, ("ChapMS: secret is '%.*s'\n", secret_len, secret)); in ChapMS() 379 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, &response); in ChapMS() 382 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, &response); in ChapMS()
|
| A D | chap.c | 428 char secret[MAXSECRETLEN]; in ChapReceiveChallenge() local 474 secret, &secret_len, 0)) { in ChapReceiveChallenge() 494 MD5Update(&mdContext, (u_char*)secret, secret_len); in ChapReceiveChallenge() 503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); in ChapReceiveChallenge() 512 BZERO(secret, sizeof(secret)); in ChapReceiveChallenge() 528 char secret[MAXSECRETLEN]; in ChapReceiveResponse() local 589 secret, &secret_len, 1)) { in ChapReceiveResponse() 602 MD5Update(&mdContext, (u_char*)secret, secret_len); in ChapReceiveResponse() 617 BZERO(secret, sizeof(secret)); in ChapReceiveResponse()
|
| A D | auth.c | 877 char secret[MAXWORDLEN]; in check_passwd() 925 BZERO(secret, sizeof(secret)); in check_passwd() 1074 get_secret(int unit, char *client, char *server, char *secret, int *secret_len, int save_addrs) in get_secret() argument 1096 BCOPY(ppp_settings.passwd, secret, len); in get_secret() 1123 BCOPY(secbuf, secret, len); in get_secret() 1258 scan_authfile(FILE *f, char *client, char *server, char *secret, struct wordlist **addrs, struct wo…
|
| /components/net/lwip/lwip-2.0.3/src/include/netif/ppp/ |
| A D | pppol2tp.h | 172 const u8_t *secret; /* Secret string */ member 197 const u8_t *secret, u8_t secret_len,
|
| A D | pppapi.h | 80 const u8_t *secret; member 120 const u8_t *secret, u8_t secret_len,
|
| A D | chap-new.h | 137 const unsigned char *secret, int secret_len, 142 const unsigned char *challenge, const char *secret, int secret_len,
|
| /components/net/lwip/lwip-2.1.2/src/include/netif/ppp/ |
| A D | pppol2tp.h | 176 const u8_t *secret; /* Secret string */ member 201 const u8_t *secret, u8_t secret_len,
|
| A D | pppapi.h | 80 const u8_t *secret; member 120 const u8_t *secret, u8_t secret_len,
|
| A D | chap-new.h | 141 const unsigned char *secret, int secret_len, 146 const unsigned char *challenge, const char *secret, int secret_len,
|
| /components/net/lwip/lwip-2.0.3/doc/ |
| A D | ppp.txt | 253 * secret, L2TP secret to use 254 * secret_len, size in bytes of the L2TP secret 260 u8_t *secret, u8_t secret_len,
|
| /components/net/lwip/lwip-2.1.2/doc/ |
| A D | ppp.txt | 253 * secret, L2TP secret to use 254 * secret_len, size in bytes of the L2TP secret 260 u8_t *secret, u8_t secret_len,
|