* AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
* OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*
- * $Id: chap_ms.h,v 1.10 2003/06/11 23:56:26 paulus Exp $
+ * $Id: chap_ms.h,v 1.12 2004/11/09 22:49:05 paulus Exp $
*/
#ifndef __CHAPMS_INCLUDE__
#define MS_CHAP_ERROR_AUTHENTICATION_FAILURE 691
#define MS_CHAP_ERROR_CHANGING_PASSWORD 709
+/*
+ * Apparently gcc on ARM gives all structures 4-byte alignment
+ * by default. This tells gcc that these structures may be
+ * unaligned and may not have extra padding inside them.
+ */
+#ifdef __GNUC__
+#define PACKED __attribute__((__packed__))
+#else
+#define PACKED
+#endif
+
/*
* Use MS_CHAP_RESPONSE_LEN, rather than sizeof(MS_ChapResponse),
* in case this struct gets padded.
u_char LANManResp[24];
u_char NTResp[24];
u_char UseNT[1]; /* If 1, ignore the LANMan response field */
-} MS_ChapResponse;
+} MS_ChapResponse PACKED;
/*
* Use MS_CHAP2_RESPONSE_LEN, rather than sizeof(MS_Chap2Response),
u_char Reserved[8]; /* Must be zero */
u_char NTResp[24];
u_char Flags[1]; /* Must be zero */
-} MS_Chap2Response;
+} MS_Chap2Response PACKED;
#ifdef MPPE
#include <net/ppp-comp.h> /* MPPE_MAX_KEY_LEN */
MS_Chap2Response *, u_char[MS_AUTH_RESPONSE_LENGTH+1], int));
#ifdef MPPE
void mppe_set_keys __P((u_char *, u_char[MD4_SIGNATURE_SIZE]));
+void mppe_set_keys2(u_char PasswordHashHash[MD4_SIGNATURE_SIZE],
+ u_char NTResponse[24], int IsServer);
#endif
+void ChallengeHash __P((u_char[16], u_char *, char *, u_char[8]));
+
+void GenerateAuthenticatorResponse(u_char PasswordHashHash[MD4_SIGNATURE_SIZE],
+ u_char NTResponse[24], u_char PeerChallenge[16],
+ u_char *rchallenge, char *username,
+ u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]);
+
void chapms_init(void);
#define __CHAPMS_INCLUDE__