Lines Matching refs:u_char
104 static void ascii2unicode __P((char[], int, u_char[]));
105 static void NTPasswordHash __P((u_char *, int, u_char[MD4_SIGNATURE_SIZE]));
106 static void ChallengeResponse __P((u_char *, u_char *, u_char[24]));
107 static void ChapMS_NT __P((u_char *, char *, int, u_char[24]));
108 static void ChapMS2_NT __P((u_char *, u_char[16], char *, char *, int,
109 u_char[24]));
111 __P((char*, int, u_char[24], u_char[16], u_char *,
112 char *, u_char[41]));
114 static void ChapMS_LANMan __P((u_char *, char *, int, u_char *));
118 static void Set_Start_Key __P((u_char *, char *, int));
119 static void SetMasterKeys __P((char *, int, u_char[24], int));
128 u_char mppe_send_key[MPPE_MAX_KEY_LEN];
129 u_char mppe_recv_key[MPPE_MAX_KEY_LEN];
511 ChallengeResponse(u_char *challenge, in ChallengeResponse()
512 u_char PasswordHash[MD4_SIGNATURE_SIZE], in ChallengeResponse()
513 u_char response[24]) in ChallengeResponse()
515 u_char ZPasswordHash[21]; in ChallengeResponse()
538 ChallengeHash(u_char PeerChallenge[16], u_char *rchallenge, in ChallengeHash()
539 char *username, u_char Challenge[8]) in ChallengeHash()
543 u_char sha1Hash[SHA1_SIGNATURE_SIZE]; in ChallengeHash()
569 ascii2unicode(char ascii[], int ascii_len, u_char unicode[]) in ascii2unicode()
575 unicode[i * 2] = (u_char) ascii[i]; in ascii2unicode()
579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash()
607 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, in ChapMS_NT()
608 u_char NTResponse[24]) in ChapMS_NT()
610 u_char unicodePassword[MAX_NT_PASSWORD * 2]; in ChapMS_NT()
611 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in ChapMS_NT()
621 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, in ChapMS2_NT()
622 char *secret, int secret_len, u_char NTResponse[24]) in ChapMS2_NT()
624 u_char unicodePassword[MAX_NT_PASSWORD * 2]; in ChapMS2_NT()
625 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in ChapMS2_NT()
626 u_char Challenge[8]; in ChapMS2_NT()
638 static u_char *StdText = (u_char *)"KGS!@#$%"; /* key from rasapi32.dll */
641 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, in ChapMS_LANMan()
645 u_char UcasePassword[MAX_NT_PASSWORD]; /* max is actually 14 */ in ChapMS_LANMan()
646 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in ChapMS_LANMan()
651 UcasePassword[i] = (u_char)toupper(secret[i]); in ChapMS_LANMan()
662 GenerateAuthenticatorResponse(u_char PasswordHashHash[MD4_SIGNATURE_SIZE], in GenerateAuthenticatorResponse()
663 u_char NTResponse[24], u_char PeerChallenge[16], in GenerateAuthenticatorResponse()
664 u_char *rchallenge, char *username, in GenerateAuthenticatorResponse()
665 u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) in GenerateAuthenticatorResponse()
670 u_char Magic1[39] = /* "Magic server to client signing constant" */ in GenerateAuthenticatorResponse()
675 u_char Magic2[41] = /* "Pad to make it do more than one iteration" */ in GenerateAuthenticatorResponse()
684 u_char Digest[SHA1_SIGNATURE_SIZE]; in GenerateAuthenticatorResponse()
685 u_char Challenge[8]; in GenerateAuthenticatorResponse()
710 u_char NTResponse[24], u_char PeerChallenge[16], in GenerateAuthenticatorResponsePlain()
711 u_char *rchallenge, char *username, in GenerateAuthenticatorResponsePlain()
712 u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) in GenerateAuthenticatorResponsePlain()
714 u_char unicodePassword[MAX_NT_PASSWORD * 2]; in GenerateAuthenticatorResponsePlain()
715 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in GenerateAuthenticatorResponsePlain()
716 u_char PasswordHashHash[MD4_SIGNATURE_SIZE]; in GenerateAuthenticatorResponsePlain()
735 mppe_set_keys(u_char *rchallenge, u_char PasswordHashHash[MD4_SIGNATURE_SIZE]) in mppe_set_keys()
738 u_char Digest[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */ in mppe_set_keys()
757 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) in Set_Start_Key()
759 u_char unicodePassword[MAX_NT_PASSWORD * 2]; in Set_Start_Key()
760 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in Set_Start_Key()
761 u_char PasswordHashHash[MD4_SIGNATURE_SIZE]; in Set_Start_Key()
778 mppe_set_keys2(u_char PasswordHashHash[MD4_SIGNATURE_SIZE], in mppe_set_keys2()
779 u_char NTResponse[24], int IsServer) in mppe_set_keys2()
782 u_char MasterKey[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */ in mppe_set_keys2()
783 u_char Digest[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */ in mppe_set_keys2()
785 u_char SHApad1[40] = in mppe_set_keys2()
790 u_char SHApad2[40] = in mppe_set_keys2()
797 u_char Magic1[27] = in mppe_set_keys2()
803 u_char Magic2[84] = in mppe_set_keys2()
815 u_char Magic3[84] = in mppe_set_keys2()
825 u_char *s; in mppe_set_keys2()
872 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) in SetMasterKeys()
874 u_char unicodePassword[MAX_NT_PASSWORD * 2]; in SetMasterKeys()
875 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in SetMasterKeys()
876 u_char PasswordHashHash[MD4_SIGNATURE_SIZE]; in SetMasterKeys()
888 ChapMS(u_char *rchallenge, char *secret, int secret_len, in ChapMS()
922 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, in ChapMS2()
924 u_char authResponse[], int authenticator) in ChapMS2()
927 u_char *p = &response[MS_CHAP2_PEER_CHALLENGE]; in ChapMS2()
935 *p++ = (u_char) (drand48() * 0xff); in ChapMS2()