Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 27) sorted by relevance

12

/components/net/lwip/lwip-2.1.2/src/netif/ppp/
A Dchap_ms.c250 const unsigned char *secret, int secret_len, in chapms_verify_response() argument
298 const unsigned char *secret, int secret_len, in chapms2_verify_response() argument
313 (const char *)secret, secret_len, md, in chapms2_verify_response()
382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response()
397 our_name, secret, secret_len, response, private_, in chapms2_make_response()
577 lwip_md4_update(&md4Context, secret, secret_len); in NTPasswordHash()
588 ascii2unicode(secret, secret_len, unicodePassword); in ChapMS_NT()
623 UcasePassword[i] = (u_char)toupper(secret[i]); in ChapMS_LANMan()
691 const char *secret, int secret_len, in GenerateAuthenticatorResponsePlain() argument
848 ChapMS_LANMan(rchallenge, secret, secret_len, in ChapMS()
[all …]
A Dchap-md5.c62 const unsigned char *secret, int secret_len, in chap_md5_verify_response() argument
79 lwip_md5_update(&ctx, secret, secret_len); in chap_md5_verify_response()
96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response() argument
108 lwip_md5_update(&ctx, (const u_char *)secret, secret_len); in chap_md5_make_response()
A Dauth.c1572 char secret[MAXWORDLEN];
1639 && strcmp(crypt(ppp_settings.passwd, secret), secret) != 0)
1674 BZERO(secret, sizeof(secret));
1692 char secret[MAXWORDLEN];
1714 BZERO(secret, sizeof(secret));
1765 BZERO(secret, sizeof(secret));
1991 char *secret;
2012 secret[0] = '\0';
2324 char *secret;
2404 if (secret != NULL) {
[all …]
A Dchap-new.c416 unsigned char secret[MAXSECRETLEN]; local
420 if (!get_secret(pcb, name, ourname, (char *)secret, &secret_len, 1)) {
424 ok = digest->verify_response(pcb, id, name, secret, secret_len, challenge,
426 memset(secret, 0, sizeof(secret));
442 char secret[MAXSECRETLEN+1]; local
469 if (!get_secret(pcb, pcb->chap_client.name, rname, secret, &secret_len, 0)) {
479 secret, secret_len, pcb->chap_client.priv);
480 memset(secret, 0, secret_len);
A Dpppapi.c221 msg->msg.msg.l2tpcreate.secret, in pppapi_do_pppol2tp_create()
237 const u8_t *secret, u8_t secret_len, in pppapi_pppol2tp_create() argument
244 LWIP_UNUSED_ARG(secret); in pppapi_pppol2tp_create()
254 PPPAPI_VAR_REF(msg).msg.msg.l2tpcreate.secret = secret; in pppapi_pppol2tp_create()
A Dpppol2tp.c111 const u8_t *secret, u8_t secret_len, in pppol2tp_create() argument
117 LWIP_UNUSED_ARG(secret); in pppol2tp_create()
149 l2tp->secret = secret; in pppol2tp_create()
314 if (l2tp->secret != NULL) { in pppol2tp_connect()
614 if (l2tp->secret == NULL) { in pppol2tp_dispatch_control_packet()
624 lwip_md5_update(&md5_ctx, l2tp->secret, l2tp->secret_len); in pppol2tp_dispatch_control_packet()
640 lwip_md5_update(&md5_ctx, l2tp->secret, l2tp->secret_len); in pppol2tp_dispatch_control_packet()
819 if (l2tp->secret != NULL) { in pppol2tp_send_sccrq()
893 if (l2tp->secret != NULL) { in pppol2tp_send_sccrq()
A Deap.c1315 char secret[MAXSECRETLEN]; in eap_request() local
1441 rhostname, secret, &secret_len, 0)) { in eap_request()
1450 lwip_md5_update(&mdContext, (u_char *)secret, secret_len); in eap_request()
1451 BZERO(secret, sizeof (secret)); in eap_request()
1604 pcb->eap.es_client.ea_peer, secret, 0) == 0) { in eap_request()
1615 t_clientpasswd(tc, secret); in eap_request()
1616 BZERO(secret, sizeof (secret)); in eap_request()
1729 char secret[MAXSECRETLEN]; in eap_response() local
1869 pcb->eap.es_server.ea_name, secret, &secret_len, 1)) { in eap_response()
1877 lwip_md5_update(&mdContext, (u_char *)secret, secret_len); in eap_response()
[all …]
/components/net/lwip/lwip-2.0.3/src/netif/ppp/
A Dchap_ms.c250 const unsigned char *secret, int secret_len, in chapms_verify_response() argument
298 const unsigned char *secret, int secret_len, in chapms2_verify_response() argument
313 (const char *)secret, secret_len, md, in chapms2_verify_response()
382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response()
397 our_name, secret, secret_len, response, private_, in chapms2_make_response()
577 lwip_md4_update(&md4Context, secret, secret_len); in NTPasswordHash()
588 ascii2unicode(secret, secret_len, unicodePassword); in ChapMS_NT()
623 UcasePassword[i] = (u_char)toupper(secret[i]); in ChapMS_LANMan()
691 const char *secret, int secret_len, in GenerateAuthenticatorResponsePlain() argument
848 ChapMS_LANMan(rchallenge, secret, secret_len, in ChapMS()
[all …]
A Dchap-md5.c62 const unsigned char *secret, int secret_len, in chap_md5_verify_response() argument
79 lwip_md5_update(&ctx, secret, secret_len); in chap_md5_verify_response()
96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response() argument
108 lwip_md5_update(&ctx, (const u_char *)secret, secret_len); in chap_md5_make_response()
A Dauth.c1572 char secret[MAXWORDLEN];
1639 && strcmp(crypt(ppp_settings.passwd, secret), secret) != 0)
1674 BZERO(secret, sizeof(secret));
1692 char secret[MAXWORDLEN];
1714 BZERO(secret, sizeof(secret));
1765 BZERO(secret, sizeof(secret));
1991 char *secret;
2012 secret[0] = '\0';
2324 char *secret;
2404 if (secret != NULL) {
[all …]
A Dchap-new.c416 unsigned char secret[MAXSECRETLEN]; local
420 if (!get_secret(pcb, name, ourname, (char *)secret, &secret_len, 1)) {
424 ok = digest->verify_response(pcb, id, name, secret, secret_len, challenge,
426 memset(secret, 0, sizeof(secret));
442 char secret[MAXSECRETLEN+1]; local
469 if (!get_secret(pcb, pcb->chap_client.name, rname, secret, &secret_len, 0)) {
479 secret, secret_len, pcb->chap_client.priv);
480 memset(secret, 0, secret_len);
A Dpppapi.c221 msg->msg.msg.l2tpcreate.secret, in pppapi_do_pppol2tp_create()
237 const u8_t *secret, u8_t secret_len, in pppapi_pppol2tp_create() argument
244 LWIP_UNUSED_ARG(secret); in pppapi_pppol2tp_create()
254 PPPAPI_VAR_REF(msg).msg.msg.l2tpcreate.secret = secret; in pppapi_pppol2tp_create()
A Dpppol2tp.c111 const u8_t *secret, u8_t secret_len, in pppol2tp_create() argument
117 LWIP_UNUSED_ARG(secret); in pppol2tp_create()
149 l2tp->secret = secret; in pppol2tp_create()
314 if (l2tp->secret != NULL) { in pppol2tp_connect()
592 if (l2tp->secret == NULL) { in pppol2tp_dispatch_control_packet()
602 lwip_md5_update(&md5_ctx, l2tp->secret, l2tp->secret_len); in pppol2tp_dispatch_control_packet()
618 lwip_md5_update(&md5_ctx, l2tp->secret, l2tp->secret_len); in pppol2tp_dispatch_control_packet()
791 if (l2tp->secret != NULL) { in pppol2tp_send_sccrq()
865 if (l2tp->secret != NULL) { in pppol2tp_send_sccrq()
A Deap.c1315 char secret[MAXSECRETLEN]; in eap_request() local
1441 rhostname, secret, &secret_len, 0)) { in eap_request()
1450 lwip_md5_update(&mdContext, (u_char *)secret, secret_len); in eap_request()
1451 BZERO(secret, sizeof (secret)); in eap_request()
1604 pcb->eap.es_client.ea_peer, secret, 0) == 0) { in eap_request()
1615 t_clientpasswd(tc, secret); in eap_request()
1616 BZERO(secret, sizeof (secret)); in eap_request()
1729 char secret[MAXSECRETLEN]; in eap_response() local
1869 pcb->eap.es_server.ea_name, secret, &secret_len, 1)) { in eap_response()
1877 lwip_md5_update(&mdContext, (u_char *)secret, secret_len); in eap_response()
[all …]
/components/net/lwip/lwip-1.4.1/src/netif/ppp/
A Dchpms.c133 char *secret,
307 char *secret, in ChapMS_NT() argument
322 unicodePassword[i * 2] = (u_char)secret[i]; in ChapMS_NT()
346 char *secret, in ChapMS_LANMan() argument
357 UcasePassword[i] = (u_char)toupper(secret[i]); in ChapMS_LANMan()
366 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len) in ChapMS() argument
374 CHAPDEBUG(LOG_INFO, ("ChapMS: secret is '%.*s'\n", secret_len, secret)); in ChapMS()
379 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, &response); in ChapMS()
382 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, &response); in ChapMS()
A Dchap.c428 char secret[MAXSECRETLEN]; in ChapReceiveChallenge() local
474 secret, &secret_len, 0)) { in ChapReceiveChallenge()
494 MD5Update(&mdContext, (u_char*)secret, secret_len); in ChapReceiveChallenge()
503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); in ChapReceiveChallenge()
512 BZERO(secret, sizeof(secret)); in ChapReceiveChallenge()
528 char secret[MAXSECRETLEN]; in ChapReceiveResponse() local
589 secret, &secret_len, 1)) { in ChapReceiveResponse()
602 MD5Update(&mdContext, (u_char*)secret, secret_len); in ChapReceiveResponse()
617 BZERO(secret, sizeof(secret)); in ChapReceiveResponse()
A Dauth.c877 char secret[MAXWORDLEN]; in check_passwd()
925 BZERO(secret, sizeof(secret)); in check_passwd()
1074 get_secret(int unit, char *client, char *server, char *secret, int *secret_len, int save_addrs) in get_secret() argument
1096 BCOPY(ppp_settings.passwd, secret, len); in get_secret()
1123 BCOPY(secbuf, secret, len); in get_secret()
1258 scan_authfile(FILE *f, char *client, char *server, char *secret, struct wordlist **addrs, struct wo…
/components/net/lwip/lwip-2.0.3/src/include/netif/ppp/
A Dpppol2tp.h172 const u8_t *secret; /* Secret string */ member
197 const u8_t *secret, u8_t secret_len,
A Dpppapi.h80 const u8_t *secret; member
120 const u8_t *secret, u8_t secret_len,
A Dchap-new.h137 const unsigned char *secret, int secret_len,
142 const unsigned char *challenge, const char *secret, int secret_len,
/components/net/lwip/lwip-2.1.2/src/include/netif/ppp/
A Dpppol2tp.h176 const u8_t *secret; /* Secret string */ member
201 const u8_t *secret, u8_t secret_len,
A Dpppapi.h80 const u8_t *secret; member
120 const u8_t *secret, u8_t secret_len,
A Dchap-new.h141 const unsigned char *secret, int secret_len,
146 const unsigned char *challenge, const char *secret, int secret_len,
/components/net/lwip/lwip-2.0.3/doc/
A Dppp.txt253 * secret, L2TP secret to use
254 * secret_len, size in bytes of the L2TP secret
260 u8_t *secret, u8_t secret_len,
/components/net/lwip/lwip-2.1.2/doc/
A Dppp.txt253 * secret, L2TP secret to use
254 * secret_len, size in bytes of the L2TP secret
260 u8_t *secret, u8_t secret_len,

Completed in 67 milliseconds

12