PPP_CHAP
spa.proto = PPP_CHAP;
case PPP_CHAP:
if (authproto == PPP_CHAP && p[1] != 5) {
if (authproto == PPP_CHAP && p[4] != CHAP_MD5) {
opt[i++] = authproto == PPP_CHAP? 5: 4;
if (authproto == PPP_CHAP)
sppp_auth_type_name(PPP_CHAP, h->type),
sppp_auth_type_name(PPP_CHAP, h->type), h->ident,
if (sp->myauth.proto == PPP_CHAP &&
sppp_auth_type_name(PPP_CHAP, h->type),
sppp_auth_type_name(PPP_CHAP, h->type),
if (sp->myauth.proto == PPP_CHAP &&
PPP_CHAP, IDX_CHAP, CP_AUTH, "chap",
spa->proto != PPP_CHAP) {
case PPP_CHAP:
case PPP_CHAP: return "chap";
case PPP_CHAP:
case PPP_CHAP:
case PPP_CHAP:
auth_peer_fail(cstate->unit, PPP_CHAP);
auth_peer_fail(unit, PPP_CHAP);
auth_withpeer_fail(unit, PPP_CHAP);
auth_peer_success(cstate->unit, PPP_CHAP, rhostname, len);
auth_peer_fail(cstate->unit, PPP_CHAP);
auth_withpeer_success(cstate->unit, PPP_CHAP);
auth_withpeer_fail(cstate->unit, PPP_CHAP);
MAKEHEADER(outp, PPP_CHAP); /* paste in a CHAP header */
MAKEHEADER(outp, PPP_CHAP); /* paste in a header */
MAKEHEADER(outp, PPP_CHAP);
PPP_CHAP,
REJCICHAP(CI_AUTHTYPE, neg_chap, PPP_CHAP, go->chap_mdtype);
PUTSHORT(PPP_CHAP, nakp);
if (cishort == PPP_CHAP) {
PUTSHORT(PPP_CHAP, nakp);
PUTSHORT(PPP_CHAP, nakp);
case PPP_CHAP:
ADDCICHAP(CI_AUTHTYPE, go->neg_chap, PPP_CHAP, go->chap_mdtype);
ACKCICHAP(CI_AUTHTYPE, go->neg_chap, PPP_CHAP, go->chap_mdtype);
} else if (cishort == PPP_CHAP && cilen == CILEN_CHAP) {
|| protocol == PPP_PAP || protocol == PPP_CHAP)) {
case PPP_CHAP:
case PPP_CHAP:
{ PPP_CHAP, "CHAP" }, /* Cryptographic Handshake Auth. Proto */