Searched defs:challenge (Results 1 - 19 of 19) sorted by relevance

/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dmschap_test.c42 u_char challenge[8]; local
43 int challengeInt[sizeof(challenge)];
48 fprintf(stderr, "Usage: %s <16-hexchar challenge> <password>\n",
57 for (i = 0; i < sizeof(challenge); i++)
58 challenge[i] = (u_char)challengeInt[i];
61 ChapMS(&cstate, challenge, sizeof(challenge), argv[2], strlen(argv[2]));
68 cstate.chal_len = sizeof(challenge);
69 BCOPY(challenge, cstate.challenge, cstat
[all...]
H A Dchap.h50 #define CHECK_CHALLENGE_LENGTH 8 /* Minimum acceptable challenge */
78 char peercname[MAXNAMELEN]; /* unauthenticated peer name in challenge */
79 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state
80 u_char chal_len; /* challenge length */
81 u_char chal_id; /* ID of last challenge */
84 char *chal_name; /* Our name to use with challenge */
85 int chal_interval; /* Time until we challenge peer again */
87 int max_transmits; /* Maximum # of challenge transmissions */
88 int chal_transmits; /* Number of transmissions of challenge */
[all...]
H A Dchap_ms.c124 ChallengeResponse(challenge, pwHash, response)
125 u_char *challenge; /* IN 8 octets */
139 DesEncrypt(challenge, ZPasswordHash + 0, response + 0);
140 DesEncrypt(challenge, ZPasswordHash + 7, response + 8);
141 DesEncrypt(challenge, ZPasswordHash + 14, response + 16);
409 ChapMS_NT(cstate->challenge, secret, secret_len, &ckresp);
415 ChapMS_LANMan(cstate->challenge, secret, secret_len, &ckresp);
426 ChallengeHash(peerchallenge, authenticatorchallenge, username, challenge)
427 u_char *peerchallenge, *authenticatorchallenge, *challenge;
448 BCOPY(digest, challenge,
468 u_char challenge[8]; local
540 u_char challenge[8]; local
[all...]
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/
H A Dchap.c35 uint8_t *challenge,
54 challenge,
33 chap_validate_tgt(char *target_chap_name, char *initiator_chap_name, uint8_t *challenge, uint32_t challenge_length, uint8_t *target_response, uint32_t response_length, uint8_t identifier, authentication_method_type auth_method, void *auth_config_data) argument
H A Dradius_auth.c51 uint8_t *challenge,
61 uint8_t *challenge,
95 challenge,
160 uint8_t *challenge,
177 bcopy(challenge,
59 radius_chap_validate(char *target_chap_name, char *initiator_chap_name, uint8_t *challenge, uint32_t challenge_length, uint8_t *target_response, uint32_t response_length, uint8_t identifier, iscsi_ipaddr_t rad_svr_ip_addr, uint32_t rad_svr_port, uint8_t *rad_svr_shared_secret, uint32_t rad_svr_shared_secret_len) argument
156 set_radius_attrs(radius_packet_data_t *req, char *target_chap_name, unsigned char *target_response, uint32_t response_length, uint8_t *challenge, uint32_t challenge_length) argument
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Dcram_md5.c17 /* text is the challenge, key is the password, digest is an allocated
72 struct berval *challenge = NULL; local
83 if ((res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, NULL, serverctrls, clientctrls, &challenge))
87 if (challenge == NULL){
91 LDAPDebug (LDAP_DEBUG_TRACE, "SASL challenge: %s\n", challenge->bv_val, 0, 0);
93 hmac_md5((unsigned char *)challenge->bv_val, challenge->bv_len,
95 ber_bvfree(challenge);
96 challenge
[all...]
H A Ddigest_md5.c63 * server challenge */
112 /* initialize challenge */
598 const char *challenge,
611 if (challenge == NULL || username == NULL || passwd == NULL) {
615 /* parse the challenge */
617 ret = digest_parse(challenge, 0, &attrs);
635 outlen = strlen(challenge) + DIGEST_CLIENT_EXTRA + 1;
667 struct berval *challenge = NULL; local
683 NULL, serverctrls, clientctrls, &challenge);
686 if (challenge !
597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument
746 struct berval *challenge = NULL; local
[all...]
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/
H A Discsit_radiusauth.c47 uint8_t *challenge,
57 uint8_t *challenge,
91 challenge,
159 uint8_t *challenge,
176 bcopy(challenge,
55 iscsit_radius_chap_validate(char *target_chap_name, char *initiator_chap_name, uint8_t *challenge, uint32_t challenge_length, uint8_t *target_response, uint32_t response_length, uint8_t identifier, iscsi_ipaddr_t rad_svr_ip_addr, uint32_t rad_svr_port, uint8_t *rad_svr_shared_secret, uint32_t rad_svr_shared_secret_len) argument
155 set_radius_attrs(radius_packet_data_t *req, char *target_chap_name, unsigned char *target_response, uint32_t response_length, uint8_t *challenge, uint32_t challenge_length) argument
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dcheckpw.c265 const char *challenge,
282 if (!conn || !userstr || !challenge || !response)
311 _sasl_MD5Update(&ctx, challenge, strlen(challenge));
263 _sasl_auxprop_verify_apop(sasl_conn_t *conn, const char *userstr, const char *challenge, const char *response, const char *user_realm __attribute__((unused))) argument
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetr_auth.c28 * NETR challenge/response client functions.
71 * Do the challenge response authentication.
351 * input: challenge
424 * Generate a set of credentials from a challenge and a session key.
426 * timestamp is added to the challenge and the result is stored in a
429 * input: challenge (including timestamp)
449 netr_gen_credentials(BYTE *session_key, netr_cred_t *challenge, argument
458 p = (DWORD *)(uintptr_t)challenge;
541 * the timestamp and add it to the client challenge. Then we
542 * need to copy the challenge t
[all...]
/illumos-gate/usr/src/lib/sasl_plugins/cram/
H A Dcram.c109 char *challenge; member in struct:server_context
115 const char *challenge __attribute__((unused)),
221 /* allocate some space for the challenge */
222 text->challenge = sparams->utils->malloc(200 + 1);
223 if (text->challenge == NULL) {
228 /* create the challenge */
229 snprintf(text->challenge, 200, "<%s.%s@%s>", randdigits, time,
232 *serverout = text->challenge;
233 *serveroutlen = strlen(text->challenge);
371 (const unsigned char *) text->challenge,
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dpreauth.c398 char *challenge = sc->sam_challenge.data; local
449 strncpy(p, challenge, challenge_len); p += challenge_len;
459 * preauthentication type. It presents the challenge...
550 /* copy things from the challenge */
/illumos-gate/usr/src/cmd/ndmpd/ndmp/
H A Dndmpd_connect.c67 unsigned char *challenge);
593 * null padding, the 64 byte fixed length challenge and a repeat of the
597 * server challenge from the NDMP_CONFIG_GET_AUTH_ATTR reply.
602 * challenge (input) - 64 bytes server challenge
608 create_md5_digest(unsigned char *digest, char *passwd, unsigned char *challenge) argument
626 (void) memcpy(p, challenge, MD5_CHALLENGE_SIZE);
1206 * message (password + padding + server challenge + password). Server
1207 * challenge is a 64 bytes random string per NDMP session sent out to the
/illumos-gate/usr/src/uts/common/io/net80211/
H A Dnet80211_input.c360 * Only shared key auth frames with a challenge
588 * Allocate challenge text for use by shared-key authentication
600 "[%s] shared key challenge alloc failed\n",
615 uint8_t *challenge; local
630 challenge = NULL;
636 * frm[2]... - challenge text
645 challenge = frm;
651 if (challenge == NULL) {
653 "ieee80211_auth_shared: no challenge\n");
656 if (challenge[
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_auth.c37 #define NTLM_CHAL_SZ SMBAUTH_CHAL_SZ /* challenge size */
40 * Compute the combined (server+client) challenge per. [MS-NLMP 3.3.1]
168 * Create a LM response from the given LM hash and challenge.
175 unsigned char *challenge, /* NTLM_CHAL_SZ */
189 challenge, NTLM_CHAL_SZ));
228 * challenge.
232 unsigned char *challenge, /* NTLM_CHAL_SZ */
240 S21, 21, challenge, NTLM_CHAL_SZ) == SMBAUTH_FAILURE)
299 * with the 8-byte client challenge(a.k.a blip) as the clnt_data.
302 * (server challenge
174 smb_auth_lm_response(unsigned char *hash, unsigned char *challenge, unsigned char *lm_rsp) argument
231 smb_auth_ntlm_response(unsigned char *hash, unsigned char *challenge, unsigned char *ntlm_rsp) argument
336 smb_lm_password_ok( unsigned char *challenge, unsigned char *lm_hash, unsigned char *lm_resp) argument
352 smb_ntlm_password_ok( unsigned char *challenge, unsigned char *ntlm_hash, unsigned char *nt_resp, unsigned char *session_key) argument
376 smb_ntlmv2_password_ok( unsigned char *challenge, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument
518 smb_auth_validate( smb_passwd_t *smbpw, char *domain, char *username, unsigned char *challenge, uint_t clen, unsigned char *nt_resp, uint_t nt_len, unsigned char *lm_resp, uint_t lm_len, uchar_t *session_key) argument
[all...]
/illumos-gate/usr/src/lib/libsasl/include/
H A Dsasl.h34 * sasl_chalprompt_t client: Display challenge and prompt for response
69 * sasl_checkapop Check an APOP challenge/response (uses pseudo "APOP"
560 * prompt for input in response to a challenge.
564 * challenge -- server challenge
571 const char *challenge,
574 #define SASL_CB_ECHOPROMPT 0x4005 /* challenge and client enterred result */
575 #define SASL_CB_NOECHOPROMPT 0x4006 /* challenge and client enterred result */
841 const char *challenge; /* presented to user (e.g. OTP challenge) */ member in struct:sasl_interact
[all...]
/illumos-gate/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c508 * Retrieve the string given by the challenge prompt id.
511 const char *challenge, const char *promptstr,
541 challenge, promptstr, NULL, result, NULL);
643 (prompts)->challenge = convert_prompt(utils, h,
646 (prompts)->challenge = "Authorization Name";
657 (prompts)->challenge = convert_prompt(utils, h,
660 (prompts)->challenge = "Authentication Name";
671 (prompts)->challenge = convert_prompt(utils, h, gettext("Password"));
673 (prompts)->challenge = "Password";
683 (prompts)->challenge
510 _plug_challenge_prompt(const sasl_utils_t *utils, unsigned int id, const char *challenge, const char *promptstr, const char **result, sasl_interact_t **prompt_need) argument
[all...]
/illumos-gate/usr/src/lib/libipmi/common/
H A Dipmi_lan.c564 * Copies the returned session ID and 16-byte challenge string to the supplied
571 uint8_t *challenge)
609 (void) memcpy(challenge, (uint8_t *)resp.ic_data + 4, 16);
739 * about supported challenge/response authentication types
742 * packet will contain challenge string and temporary session ID.
570 ipmi_get_session_challenge_cmd(ipmi_handle_t *ihp, uint32_t *session_id, uint8_t *challenge) argument
/illumos-gate/usr/src/lib/libslp/clib/
H A Dslp_ami.h514 char *challenge; member in struct:ami_pubkey_and_challenge

Completed in 178 milliseconds