Lines Matching refs:u_char
104 static void ascii2unicode __P((char[], int, u_char[]));
105 static void NTPasswordHash __P((char *, int, u_char[MD4_SIGNATURE_SIZE]));
106 static void ChallengeResponse __P((u_char *, u_char *, u_char[24]));
107 static void ChapMS_NT __P((u_char *, char *, int, u_char[24]));
108 static void ChapMS2_NT __P((char *, u_char[16], char *, char *, int,
109 u_char[24]));
111 __P((char*, int, u_char[24], u_char[16], u_char *,
112 char *, u_char[41]));
114 static void ChapMS_LANMan __P((u_char *, char *, int, MS_ChapResponse *));
118 static void Set_Start_Key __P((u_char *, char *, int));
119 static void SetMasterKeys __P((char *, int, u_char[24], int));
128 u_char mppe_send_key[MPPE_MAX_KEY_LEN];
129 u_char mppe_recv_key[MPPE_MAX_KEY_LEN];
451 ChallengeResponse(u_char *challenge, in ChallengeResponse()
452 u_char PasswordHash[MD4_SIGNATURE_SIZE], in ChallengeResponse()
453 u_char response[24]) in ChallengeResponse()
455 u_char ZPasswordHash[21]; in ChallengeResponse()
478 ChallengeHash(u_char PeerChallenge[16], u_char *rchallenge, in ChallengeHash()
479 char *username, u_char Challenge[8]) in ChallengeHash()
483 u_char sha1Hash[SHA1_SIGNATURE_SIZE]; in ChallengeHash()
509 ascii2unicode(char ascii[], int ascii_len, u_char unicode[]) in ascii2unicode()
515 unicode[i * 2] = (u_char) ascii[i]; in ascii2unicode()
519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash()
541 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, in ChapMS_NT()
542 u_char NTResponse[24]) in ChapMS_NT()
544 u_char unicodePassword[MAX_NT_PASSWORD * 2]; in ChapMS_NT()
545 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in ChapMS_NT()
555 ChapMS2_NT(char *rchallenge, u_char PeerChallenge[16], char *username, in ChapMS2_NT()
556 char *secret, int secret_len, u_char NTResponse[24]) in ChapMS2_NT()
558 u_char unicodePassword[MAX_NT_PASSWORD * 2]; in ChapMS2_NT()
559 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in ChapMS2_NT()
560 u_char Challenge[8]; in ChapMS2_NT()
573 static u_char *StdText = (u_char *)"KGS!@#$%"; /* key from rasapi32.dll */
576 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, in ChapMS_LANMan()
580 u_char UcasePassword[MAX_NT_PASSWORD]; /* max is actually 14 */ in ChapMS_LANMan()
581 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in ChapMS_LANMan()
586 UcasePassword[i] = (u_char)toupper(secret[i]); in ChapMS_LANMan()
597 GenerateAuthenticatorResponse(u_char PasswordHashHash[MD4_SIGNATURE_SIZE], in GenerateAuthenticatorResponse()
598 u_char NTResponse[24], u_char PeerChallenge[16], in GenerateAuthenticatorResponse()
599 u_char *rchallenge, char *username, in GenerateAuthenticatorResponse()
600 u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) in GenerateAuthenticatorResponse()
605 u_char Magic1[39] = /* "Magic server to client signing constant" */ in GenerateAuthenticatorResponse()
610 u_char Magic2[41] = /* "Pad to make it do more than one iteration" */ in GenerateAuthenticatorResponse()
619 u_char Digest[SHA1_SIGNATURE_SIZE]; in GenerateAuthenticatorResponse()
620 u_char Challenge[8]; in GenerateAuthenticatorResponse()
645 u_char NTResponse[24], u_char PeerChallenge[16], in GenerateAuthenticatorResponsePlain()
646 u_char *rchallenge, char *username, in GenerateAuthenticatorResponsePlain()
647 u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) in GenerateAuthenticatorResponsePlain()
649 u_char unicodePassword[MAX_NT_PASSWORD * 2]; in GenerateAuthenticatorResponsePlain()
650 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in GenerateAuthenticatorResponsePlain()
651 u_char PasswordHashHash[MD4_SIGNATURE_SIZE]; in GenerateAuthenticatorResponsePlain()
670 mppe_set_keys(u_char *rchallenge, u_char PasswordHashHash[MD4_SIGNATURE_SIZE]) in mppe_set_keys()
673 u_char Digest[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */ in mppe_set_keys()
692 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) in Set_Start_Key()
694 u_char unicodePassword[MAX_NT_PASSWORD * 2]; in Set_Start_Key()
695 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in Set_Start_Key()
696 u_char PasswordHashHash[MD4_SIGNATURE_SIZE]; in Set_Start_Key()
713 mppe_set_keys2(u_char PasswordHashHash[MD4_SIGNATURE_SIZE], in mppe_set_keys2()
714 u_char NTResponse[24], int IsServer) in mppe_set_keys2()
717 u_char MasterKey[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */ in mppe_set_keys2()
718 u_char Digest[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */ in mppe_set_keys2()
720 u_char SHApad1[40] = in mppe_set_keys2()
725 u_char SHApad2[40] = in mppe_set_keys2()
732 u_char Magic1[27] = in mppe_set_keys2()
738 u_char Magic2[84] = in mppe_set_keys2()
750 u_char Magic3[84] = in mppe_set_keys2()
760 u_char *s; in mppe_set_keys2()
807 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) in SetMasterKeys()
809 u_char unicodePassword[MAX_NT_PASSWORD * 2]; in SetMasterKeys()
810 u_char PasswordHash[MD4_SIGNATURE_SIZE]; in SetMasterKeys()
811 u_char PasswordHashHash[MD4_SIGNATURE_SIZE]; in SetMasterKeys()
823 ChapMS(u_char *rchallenge, char *secret, int secret_len, in ChapMS()
856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, in ChapMS2()
858 u_char authResponse[], int authenticator) in ChapMS2()
861 u_char *p = response->PeerChallenge; in ChapMS2()
869 *p++ = (u_char) (drand48() * 0xff); in ChapMS2()