Lines Matching defs:sam_challenge

781     krb5_sam_challenge		*sam_challenge = 0;
797 if ((ret = decode_krb5_sam_challenge(&tmpsam, &sam_challenge)))
800 if (sam_challenge->sam_flags & KRB5_SAM_MUST_PK_ENCRYPT_SAD) {
801 krb5_xfree(sam_challenge);
809 if (!(sam_challenge->sam_flags & KRB5_SAM_USE_SAD_AS_KEY) ||
810 (sam_challenge->sam_type == PA_SAM_TYPE_CRYPTOCARD)) {
824 SAMDATA(sam_challenge->sam_type_name, "SAM Authentication",
828 SAMDATA(sam_challenge->sam_challenge_label,
829 sam_challenge_banner(sam_challenge->sam_type),
834 sam_challenge->sam_challenge.length?"Challenge is [":"",
835 SAMDATA(sam_challenge->sam_challenge, "", 20),
836 sam_challenge->sam_challenge.length?"], ":"",
837 SAMDATA(sam_challenge->sam_response_prompt, "passcode", 55));
851 krb5_xfree(sam_challenge);
857 enc_sam_response_enc.sam_nonce = sam_challenge->sam_nonce;
858 if (sam_challenge->sam_nonce == 0) {
862 krb5_xfree(sam_challenge);
870 if (sam_challenge->sam_flags & KRB5_SAM_SEND_ENCRYPTED_SAD) {
887 krb5_xfree(sam_challenge);
905 krb5_xfree(sam_challenge);
912 } else if (sam_challenge->sam_flags & KRB5_SAM_USE_SAD_AS_KEY) {
925 krb5_xfree(sam_challenge);
949 krb5_xfree(sam_challenge);
961 sam_response.sam_nonce = sam_challenge->sam_nonce;
962 sam_response.sam_flags = sam_challenge->sam_flags;
963 sam_response.sam_track_id = sam_challenge->sam_track_id;
964 sam_response.sam_type = sam_challenge->sam_type;
967 krb5_xfree(sam_challenge);
1125 sc2b->sam_challenge.length?"Challenge is [":"",
1126 SAMDATA(sc2b->sam_challenge, "", 20),
1127 sc2b->sam_challenge.length?"], ":"",
1234 /* Now we have a key, verify the checksum on the sam_challenge */