| /lib/liblwip/src/netif/ppp/ |
| D | chpms.c | 100 u_char LANManResp[24]; 101 u_char NTResp[24]; 102 u_char UseNT; /* If 1, ignore the LANMan response field */ 117 static void DesEncrypt (u_char *, u_char *, u_char *); 118 static void MakeKey (u_char *, u_char *); 121 static void Expand (u_char *, u_char *); 122 static void Collapse (u_char *, u_char *); 126 u_char *challenge, /* IN 8 octets */ 127 u_char *pwHash, /* IN 16 octets */ 128 u_char *response /* OUT 24 octets */ [all …]
|
| D | fsm.h | 60 #define HEADERLEN (sizeof (u_char) + sizeof (u_char) + sizeof (u_short)) 83 u_char id; /* Current id */ 84 u_char reqid; /* Current request id */ 85 u_char seen_ack; /* Have received valid Ack/Nak/Rej to Req */ 101 void (*addci)(fsm*, u_char*, int*); /* Add our Configuration Information */ 102 int (*ackci)(fsm*, u_char*, int); /* ACK our Configuration Information */ 103 int (*nakci)(fsm*, u_char*, int); /* NAK our Configuration Information */ 104 int (*rejci)(fsm*, u_char*, int); /* Reject our Configuration Information */ 105 int (*reqci)(fsm*, u_char*, int*, int); /* Request peer's Configuration Information */ 112 int (*extcode)(fsm*, int, u_char, u_char*, int); /* Called when unknown code received */ [all …]
|
| D | chap.h | 103 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ 104 u_char chal_len; /* challenge length */ 105 u_char chal_id; /* ID of last challenge */ 106 u_char chal_type; /* hash algorithm for challenges */ 107 u_char id; /* Current id */ 114 u_char response[MAX_RESPONSE_LENGTH]; /* Response to send */ 115 u_char resp_length; /* length of response */ 116 u_char resp_id; /* ID for response messages */ 117 u_char resp_type; /* hash algorithm for responses */ 145 void ChapAuthWithPeer (int, char *, u_char); [all …]
|
| D | pap.c | 93 static void upap_input (int, u_char *, int); 96 static int upap_printpkt (u_char *, int, void (*)(void *, char *, ...), void *); 125 static void upap_rauthreq (upap_state *, u_char *, u_char, int); 126 static void upap_rauthack (upap_state *, u_char *, int, int); 127 static void upap_rauthnak (upap_state *, u_char *, int, int); 129 static void upap_sresp (upap_state *, u_char, u_char, char *, int); 334 upap_input(int unit, u_char *inpacket, int l) in upap_input() 337 u_char *inp; in upap_input() 338 u_char code, id; in upap_input() 390 upap_rauthreq(upap_state *u, u_char *inp, u_char id, int len) in upap_rauthreq() [all …]
|
| D | ppp_impl.h | 160 typedef u_char ext_accm[32]; 182 *(cp)++ = (u_char) (c); \ 191 *(cp)++ = (u_char) ((s) >> 8); \ 192 *(cp)++ = (u_char) (s & 0xff); \ 202 *(cp)++ = (u_char) ((l) >> 24); \ 203 *(cp)++ = (u_char) ((l) >> 16); \ 204 *(cp)++ = (u_char) ((l) >> 8); \ 205 *(cp)++ = (u_char) (l); \ 212 #define BCMP(s0, s1, l) memcmp((u_char *)(s0), (u_char *)(s1), (l)) 243 void (*input) (int unit, u_char *pkt, int len); [all …]
|
| D | chap.c | 112 static void ChapInput (int, u_char *, int); 115 static int ChapPrintPkt (u_char *, int, void (*) (void *, char *, ...), void *); 144 static void ChapReceiveChallenge (chap_state *, u_char *, u_char, int); 146 static void ChapReceiveResponse (chap_state *, u_char *, int, int); 147 static void ChapReceiveSuccess(chap_state *cstate, u_char *inp, u_char id, int len); 148 static void ChapReceiveFailure(chap_state *cstate, u_char *inp, u_char id, int len); 177 ChapAuthWithPeer(int unit, char *our_name, u_char digest) in ChapAuthWithPeer() 204 ChapAuthPeer(int unit, char *our_name, u_char digest) in ChapAuthPeer() 363 ChapInput(int unit, u_char *inpacket, int packet_len) in ChapInput() 366 u_char *inp; in ChapInput() [all …]
|
| D | randm.c | 90 MD5Update(&md5, (u_char *)randPool, sizeof(randPool)); in avChurnRand() 92 MD5Update(&md5, (u_char *)randData, randLen); in avChurnRand() 100 MD5Update(&md5, (u_char *)&sysData, sizeof(sysData)); in avChurnRand() 102 MD5Final((u_char *)randPool, &md5); in avChurnRand() 126 u_char tmp[16]; in avGenRand() 132 MD5Update(&md5, (u_char *)randPool, sizeof(randPool)); in avGenRand() 133 MD5Update(&md5, (u_char *)&randCount, sizeof(randCount)); in avGenRand()
|
| D | vj.h | 108 u_char cs_id; /* connection # associated with this state */ 109 u_char cs_filler; 135 u_char last_recv; /* last rcvd conn. id */ 136 u_char last_xmit; /* last sent conn. id */ 138 u_char maxSlotIndex; 139 u_char compressSlot; /* Flag indicating OK to compress slot ID. */
|
| D | fsm.c | 85 static void fsm_rconfreq (fsm *, u_char, u_char *, int); 86 static void fsm_rconfack (fsm *, int, u_char *, int); 87 static void fsm_rconfnakrej (fsm *, int, int, u_char *, int); 88 static void fsm_rtermreq (fsm *, int, u_char *, int); 90 static void fsm_rcoderej (fsm *, u_char *, int); 302 (u_char *) f->term_reason, f->term_reason_len); in fsm_close() 341 (u_char *) f->term_reason, f->term_reason_len); in fsm_timeout() 382 fsm_input(fsm *f, u_char *inpacket, int l) in fsm_input() 384 u_char *inp = inpacket; in fsm_input() 385 u_char code, id; in fsm_input() [all …]
|
| D | vj.c | 53 register u_char i; in vj_compress_init() 81 cp[1] = (u_char)(n); \ 82 cp[0] = (u_char)((n) >> 8); \ 85 *cp++ = (u_char)(n); \ 91 cp[1] = (u_char)(n); \ 92 cp[0] = (u_char)((n) >> 8); \ 95 *cp++ = (u_char)(n); \ 148 u_char new_seq[16]; in vj_compress_tcp() 149 register u_char *cp = new_seq; in vj_compress_tcp() 382 cp = (u_char *)pb->payload; in vj_compress_tcp() [all …]
|
| D | pap.h | 60 #define UPAP_HEADERLEN (sizeof (u_char) + sizeof (u_char) + sizeof (u_short)) 81 u_char us_id; /* Current id */
|
| D | lcp.c | 110 static u_char nak_buffer[PPP_MRU]; /* where we construct a nak packet */ 117 static void lcp_addci (fsm*, u_char*, int*); /* Add our CI to pkt */ 118 static int lcp_ackci (fsm*, u_char*, int); /* Peer ack'd our CI */ 119 static int lcp_nakci (fsm*, u_char*, int); /* Peer nak'd our CI */ 120 static int lcp_rejci (fsm*, u_char*, int); /* Peer rej'd our CI */ 121 static int lcp_reqci (fsm*, u_char*, int*, int); /* Rcv peer CI */ 126 static int lcp_extcode (fsm*, int, u_char, u_char*, int); 127 static void lcp_rprotrej (fsm*, u_char*, int); 136 static void lcp_received_echo_reply (fsm*, int, u_char*, int); 164 static void lcp_input (int, u_char *, int); [all …]
|
| D | ipcp.c | 88 static void ipcp_addci (fsm *, u_char *, int *); /* Add our CI */ 89 static int ipcp_ackci (fsm *, u_char *, int); /* Peer ack'd our CI */ 90 static int ipcp_nakci (fsm *, u_char *, int); /* Peer nak'd our CI */ 91 static int ipcp_rejci (fsm *, u_char *, int); /* Peer rej'd our CI */ 92 static int ipcp_reqci (fsm *, u_char *, int *, int); /* Rcv CI */ 130 static void ipcp_input (int, u_char *, int); 258 ipcp_input(int unit, u_char *p, int len) in ipcp_input() 348 ipcp_addci(fsm *f, u_char *ucp, int *lenp) in ipcp_addci() 425 ipcp_ackci(fsm *f, u_char *p, int len) in ipcp_ackci() 430 u_char cimaxslotindex, cicflag; in ipcp_ackci() [all …]
|
| D | ppp.c | 142 #define PPP_ADDRESS(p) (((u_char *)(p))[0]) 143 #define PPP_CONTROL(p) (((u_char *)(p))[1]) 144 #define PPP_PROTOCOL(p) ((((u_char *)(p))[2] << 8) + ((u_char *)(p))[3]) 176 u_char rxbuf[PPPOS_RX_BUFSIZE]; 245 static void pppInProc(PPPControlRx *pcrx, u_char *s, int l); 285 u_char outpacket_buf[NUM_PPP][PPP_MRU+PPP_HDRLEN]; 334 static u_char pppACCMMask[] = { 733 pppAppend(u_char c, struct pbuf *nb, ext_accm *outACCM) in pppAppend() 753 *((u_char*)nb->payload + nb->len++) = PPP_ESCAPE; in pppAppend() 754 *((u_char*)nb->payload + nb->len++) = c ^ PPP_TRANS; in pppAppend() [all …]
|
| D | ipcp.h | 91 u_char maxslotindex; /* VJ slots - 1. */ 92 u_char cflag; /* VJ slot compression flag. */
|
| D | ppp.h | 56 typedef unsigned char u_char; typedef 186 void pppos_input(int pd, u_char* data, int len);
|
| D | lcp.h | 105 u_char chap_mdtype; /* which MD type (hashing algorithm) */ 143 void lcp_sprotrej (int, u_char *, int); /* send protocol reject */
|
| D | auth.h | 100 u_char check_passwd (int, char *, int, char *, int, char **, int *);
|
| D | auth.c | 861 u_char 874 u_char ret = 0; in check_passwd()
|