/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | mschap_test.c | 42 u_char challenge[8]; local 43 int challengeInt[sizeof(challenge)]; 48 fprintf(stderr, "Usage: %s <16-hexchar challenge> <password>\n", 57 for (i = 0; i < sizeof(challenge); i++) 58 challenge[i] = (u_char)challengeInt[i]; 61 ChapMS(&cstate, challenge, sizeof(challenge), argv[2], strlen(argv[2])); 68 cstate.chal_len = sizeof(challenge); 69 BCOPY(challenge, cstate.challenge, cstat [all...] |
H A D | chap.h | 50 #define CHECK_CHALLENGE_LENGTH 8 /* Minimum acceptable challenge */ 78 char peercname[MAXNAMELEN]; /* unauthenticated peer name in challenge */ 79 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state 80 u_char chal_len; /* challenge length */ 81 u_char chal_id; /* ID of last challenge */ 84 char *chal_name; /* Our name to use with challenge */ 85 int chal_interval; /* Time until we challenge peer again */ 87 int max_transmits; /* Maximum # of challenge transmissions */ 88 int chal_transmits; /* Number of transmissions of challenge */ [all...] |
H A D | chap_ms.c | 124 ChallengeResponse(challenge, pwHash, response) 125 u_char *challenge; /* IN 8 octets */ 139 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); 140 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); 141 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); 409 ChapMS_NT(cstate->challenge, secret, secret_len, &ckresp); 415 ChapMS_LANMan(cstate->challenge, secret, secret_len, &ckresp); 426 ChallengeHash(peerchallenge, authenticatorchallenge, username, challenge) 427 u_char *peerchallenge, *authenticatorchallenge, *challenge; 448 BCOPY(digest, challenge, 468 u_char challenge[8]; local 540 u_char challenge[8]; local [all...] |
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | chap.c | 35 uint8_t *challenge, 54 challenge, 33 chap_validate_tgt(char *target_chap_name, char *initiator_chap_name, uint8_t *challenge, uint32_t challenge_length, uint8_t *target_response, uint32_t response_length, uint8_t identifier, authentication_method_type auth_method, void *auth_config_data) argument
|
H A D | radius_auth.c | 51 uint8_t *challenge, 61 uint8_t *challenge, 95 challenge, 160 uint8_t *challenge, 177 bcopy(challenge, 59 radius_chap_validate(char *target_chap_name, char *initiator_chap_name, uint8_t *challenge, uint32_t challenge_length, uint8_t *target_response, uint32_t response_length, uint8_t identifier, iscsi_ipaddr_t rad_svr_ip_addr, uint32_t rad_svr_port, uint8_t *rad_svr_shared_secret, uint32_t rad_svr_shared_secret_len) argument 156 set_radius_attrs(radius_packet_data_t *req, char *target_chap_name, unsigned char *target_response, uint32_t response_length, uint8_t *challenge, uint32_t challenge_length) argument
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 17 /* text is the challenge, key is the password, digest is an allocated 72 struct berval *challenge = NULL; local 83 if ((res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, NULL, serverctrls, clientctrls, &challenge)) 87 if (challenge == NULL){ 91 LDAPDebug (LDAP_DEBUG_TRACE, "SASL challenge: %s\n", challenge->bv_val, 0, 0); 93 hmac_md5((unsigned char *)challenge->bv_val, challenge->bv_len, 95 ber_bvfree(challenge); 96 challenge [all...] |
H A D | digest_md5.c | 63 * server challenge */ 112 /* initialize challenge */ 598 const char *challenge, 611 if (challenge == NULL || username == NULL || passwd == NULL) { 615 /* parse the challenge */ 617 ret = digest_parse(challenge, 0, &attrs); 635 outlen = strlen(challenge) + DIGEST_CLIENT_EXTRA + 1; 667 struct berval *challenge = NULL; local 683 NULL, serverctrls, clientctrls, &challenge); 686 if (challenge ! 597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument 746 struct berval *challenge = NULL; local [all...] |
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/ |
H A D | iscsit_radiusauth.c | 47 uint8_t *challenge, 57 uint8_t *challenge, 91 challenge, 159 uint8_t *challenge, 176 bcopy(challenge, 55 iscsit_radius_chap_validate(char *target_chap_name, char *initiator_chap_name, uint8_t *challenge, uint32_t challenge_length, uint8_t *target_response, uint32_t response_length, uint8_t identifier, iscsi_ipaddr_t rad_svr_ip_addr, uint32_t rad_svr_port, uint8_t *rad_svr_shared_secret, uint32_t rad_svr_shared_secret_len) argument 155 set_radius_attrs(radius_packet_data_t *req, char *target_chap_name, unsigned char *target_response, uint32_t response_length, uint8_t *challenge, uint32_t challenge_length) argument
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 265 const char *challenge, 282 if (!conn || !userstr || !challenge || !response) 311 _sasl_MD5Update(&ctx, challenge, strlen(challenge)); 263 _sasl_auxprop_verify_apop(sasl_conn_t *conn, const char *userstr, const char *challenge, const char *response, const char *user_realm __attribute__((unused))) argument
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | netr_auth.c | 28 * NETR challenge/response client functions. 71 * Do the challenge response authentication. 351 * input: challenge 424 * Generate a set of credentials from a challenge and a session key. 426 * timestamp is added to the challenge and the result is stored in a 429 * input: challenge (including timestamp) 449 netr_gen_credentials(BYTE *session_key, netr_cred_t *challenge, argument 458 p = (DWORD *)(uintptr_t)challenge; 541 * the timestamp and add it to the client challenge. Then we 542 * need to copy the challenge t [all...] |
/illumos-gate/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 109 char *challenge; member in struct:server_context 115 const char *challenge __attribute__((unused)), 221 /* allocate some space for the challenge */ 222 text->challenge = sparams->utils->malloc(200 + 1); 223 if (text->challenge == NULL) { 228 /* create the challenge */ 229 snprintf(text->challenge, 200, "<%s.%s@%s>", randdigits, time, 232 *serverout = text->challenge; 233 *serveroutlen = strlen(text->challenge); 371 (const unsigned char *) text->challenge, [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | preauth.c | 398 char *challenge = sc->sam_challenge.data; local 449 strncpy(p, challenge, challenge_len); p += challenge_len; 459 * preauthentication type. It presents the challenge... 550 /* copy things from the challenge */
|
/illumos-gate/usr/src/cmd/ndmpd/ndmp/ |
H A D | ndmpd_connect.c | 67 unsigned char *challenge); 593 * null padding, the 64 byte fixed length challenge and a repeat of the 597 * server challenge from the NDMP_CONFIG_GET_AUTH_ATTR reply. 602 * challenge (input) - 64 bytes server challenge 608 create_md5_digest(unsigned char *digest, char *passwd, unsigned char *challenge) argument 626 (void) memcpy(p, challenge, MD5_CHALLENGE_SIZE); 1206 * message (password + padding + server challenge + password). Server 1207 * challenge is a 64 bytes random string per NDMP session sent out to the
|
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_input.c | 360 * Only shared key auth frames with a challenge 588 * Allocate challenge text for use by shared-key authentication 600 "[%s] shared key challenge alloc failed\n", 615 uint8_t *challenge; local 630 challenge = NULL; 636 * frm[2]... - challenge text 645 challenge = frm; 651 if (challenge == NULL) { 653 "ieee80211_auth_shared: no challenge\n"); 656 if (challenge[ [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_auth.c | 37 #define NTLM_CHAL_SZ SMBAUTH_CHAL_SZ /* challenge size */ 40 * Compute the combined (server+client) challenge per. [MS-NLMP 3.3.1] 168 * Create a LM response from the given LM hash and challenge. 175 unsigned char *challenge, /* NTLM_CHAL_SZ */ 189 challenge, NTLM_CHAL_SZ)); 228 * challenge. 232 unsigned char *challenge, /* NTLM_CHAL_SZ */ 240 S21, 21, challenge, NTLM_CHAL_SZ) == SMBAUTH_FAILURE) 299 * with the 8-byte client challenge(a.k.a blip) as the clnt_data. 302 * (server challenge 174 smb_auth_lm_response(unsigned char *hash, unsigned char *challenge, unsigned char *lm_rsp) argument 231 smb_auth_ntlm_response(unsigned char *hash, unsigned char *challenge, unsigned char *ntlm_rsp) argument 336 smb_lm_password_ok( unsigned char *challenge, unsigned char *lm_hash, unsigned char *lm_resp) argument 352 smb_ntlm_password_ok( unsigned char *challenge, unsigned char *ntlm_hash, unsigned char *nt_resp, unsigned char *session_key) argument 376 smb_ntlmv2_password_ok( unsigned char *challenge, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument 518 smb_auth_validate( smb_passwd_t *smbpw, char *domain, char *username, unsigned char *challenge, uint_t clen, unsigned char *nt_resp, uint_t nt_len, unsigned char *lm_resp, uint_t lm_len, uchar_t *session_key) argument [all...] |
/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | sasl.h | 34 * sasl_chalprompt_t client: Display challenge and prompt for response 69 * sasl_checkapop Check an APOP challenge/response (uses pseudo "APOP" 560 * prompt for input in response to a challenge. 564 * challenge -- server challenge 571 const char *challenge, 574 #define SASL_CB_ECHOPROMPT 0x4005 /* challenge and client enterred result */ 575 #define SASL_CB_NOECHOPROMPT 0x4006 /* challenge and client enterred result */ 841 const char *challenge; /* presented to user (e.g. OTP challenge) */ member in struct:sasl_interact [all...] |
/illumos-gate/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 508 * Retrieve the string given by the challenge prompt id. 511 const char *challenge, const char *promptstr, 541 challenge, promptstr, NULL, result, NULL); 643 (prompts)->challenge = convert_prompt(utils, h, 646 (prompts)->challenge = "Authorization Name"; 657 (prompts)->challenge = convert_prompt(utils, h, 660 (prompts)->challenge = "Authentication Name"; 671 (prompts)->challenge = convert_prompt(utils, h, gettext("Password")); 673 (prompts)->challenge = "Password"; 683 (prompts)->challenge 510 _plug_challenge_prompt(const sasl_utils_t *utils, unsigned int id, const char *challenge, const char *promptstr, const char **result, sasl_interact_t **prompt_need) argument [all...] |
/illumos-gate/usr/src/lib/libipmi/common/ |
H A D | ipmi_lan.c | 564 * Copies the returned session ID and 16-byte challenge string to the supplied 571 uint8_t *challenge) 609 (void) memcpy(challenge, (uint8_t *)resp.ic_data + 4, 16); 739 * about supported challenge/response authentication types 742 * packet will contain challenge string and temporary session ID. 570 ipmi_get_session_challenge_cmd(ipmi_handle_t *ihp, uint32_t *session_id, uint8_t *challenge) argument
|
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 514 char *challenge; member in struct:ami_pubkey_and_challenge
|