/osnet-11/usr/src/lib/libldap4/common/ |
H A D | saslbind.c | 296 struct berval *challenge = NULL; local 307 if ((res = ldap_sasl_bind_s(ld, dn, LDAP_SASL_CRAM_MD5, NULL, serverctrls, clientctrls, &challenge)) 311 if (challenge == NULL){ 315 Debug (LDAP_DEBUG_TRACE, "SASL challenge: %s\n", challenge->bv_val, 0, 0); 317 hmac_md5((unsigned char *)challenge->bv_val, challenge->bv_len, 319 ber_bvfree(challenge); 320 challenge = NULL; 336 res = ldap_sasl_bind_s(ld, dn, LDAP_SASL_CRAM_MD5, &resp, serverctrls, clientctrls, &challenge); [all...] |
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 17 /* text is the challenge, key is the password, digest is an allocated 72 struct berval *challenge = NULL; local 83 if ((res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, NULL, serverctrls, clientctrls, &challenge)) 87 if (challenge == NULL){ 91 LDAPDebug (LDAP_DEBUG_TRACE, "SASL challenge: %s\n", challenge->bv_val, 0, 0); 93 hmac_md5((unsigned char *)challenge->bv_val, challenge->bv_len, 95 ber_bvfree(challenge); 96 challenge [all...] |
H A D | digest_md5.c | 63 * server challenge */ 112 /* initialize challenge */ 598 const char *challenge, 611 if (challenge == NULL || username == NULL || passwd == NULL) { 615 /* parse the challenge */ 617 ret = digest_parse(challenge, 0, &attrs); 635 outlen = strlen(challenge) + DIGEST_CLIENT_EXTRA + 1; 667 struct berval *challenge = NULL; local 683 NULL, serverctrls, clientctrls, &challenge); 686 if (challenge ! 597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument 746 struct berval *challenge = NULL; local [all...] |
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 265 const char *challenge, 282 if (!conn || !userstr || !challenge || !response) 311 _sasl_MD5Update(&ctx, challenge, strlen(challenge)); 263 _sasl_auxprop_verify_apop(sasl_conn_t *conn, const char *userstr, const char *challenge, const char *response, const char *user_realm __attribute__((unused))) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | preauth.c | 386 char *challenge = sc->sam_challenge.data; local 430 krb5int_buf_add_len(&buf, challenge, challenge_len); 440 * preauthentication type. It presents the challenge... 534 /* copy things from the challenge */
|
/osnet-11/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 107 char *challenge; member in struct:server_context 113 const char *challenge __attribute__((unused)), 219 /* allocate some space for the challenge */ 220 text->challenge = sparams->utils->malloc(200 + 1); 221 if (text->challenge == NULL) { 226 /* create the challenge */ 227 snprintf(text->challenge, 200, "<%s.%s@%s>", randdigits, time, 230 *serverout = text->challenge; 231 *serveroutlen = strlen(text->challenge); 369 (const unsigned char *) text->challenge, [all...] |
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_auth.c | 113 * Create a LM response from the given LM hash and challenge. 120 unsigned char *challenge, int clen, 134 rc = smb_auth_DES(lm_rsp, SMBAUTH_RESP_SZ, S21, 21, challenge, clen); 172 * challenge. 176 unsigned char *challenge, int clen, 184 S21, 21, challenge, clen) == SMBAUTH_FAILURE) 192 * data = concat(challenge, client_nonce); [ntlm2 session nonce] 374 * with the 8-byte client challenge(a.k.a blip) as the clnt_data. 377 * (server challenge + NTLMv2 data blob or LMv2 client challenge) 119 smb_auth_lm_response(unsigned char *hash, unsigned char *challenge, int clen, unsigned char *lm_rsp) argument 175 smb_auth_ntlm_response(unsigned char *hash, unsigned char *challenge, int clen, unsigned char *ntlm_rsp) argument 552 smb_lm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *lm_hash, unsigned char *passwd) argument 569 smb_ntlm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, unsigned char *session_key) argument 594 smb_ntlmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument 696 smb_ntlm2_session_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, unsigned char *nonce, int nlen, uchar_t *session_key) argument 726 smb_lmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument 793 smb_auth_validate_lm( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username) argument 832 smb_auth_validate_nt( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username, unsigned char *nonce, int nlen, uchar_t *session_key) argument [all...] |
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | netr_clnt.c | 28 * NETR challenge/response client functions. 96 * Wrapper for the netlogon challenge-response authentication protocol 414 * Do the challenge response authentication. 645 * input: challenge 714 * Generate a set of credentials from a challenge and a session key. 716 * timestamp is added to the challenge and the result is stored in a 719 * input: challenge (including timestamp) 739 netr_gen_credentials(BYTE *session_key, netr_cred_t *challenge, argument 748 p = (DWORD *)(uintptr_t)challenge; 1214 * challenge, tha [all...] |
/osnet-11/usr/src/lib/libsasl/include/ |
H A D | sasl.h | 33 * sasl_chalprompt_t client: Display challenge and prompt for response 68 * sasl_checkapop Check an APOP challenge/response (uses pseudo "APOP" 557 * prompt for input in response to a challenge. 561 * challenge -- server challenge 568 const char *challenge, 571 #define SASL_CB_ECHOPROMPT 0x4005 /* challenge and client enterred result */ 572 #define SASL_CB_NOECHOPROMPT 0x4006 /* challenge and client enterred result */ 838 const char *challenge; /* presented to user (e.g. OTP challenge) */ member in struct:sasl_interact [all...] |
/osnet-11/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 507 * Retrieve the string given by the challenge prompt id. 510 const char *challenge, const char *promptstr, 540 challenge, promptstr, NULL, result, NULL); 642 (prompts)->challenge = convert_prompt(utils, h, 645 (prompts)->challenge = "Authorization Name"; 656 (prompts)->challenge = convert_prompt(utils, h, 659 (prompts)->challenge = "Authentication Name"; 670 (prompts)->challenge = convert_prompt(utils, h, gettext("Password")); 672 (prompts)->challenge = "Password"; 682 (prompts)->challenge 509 _plug_challenge_prompt(const sasl_utils_t *utils, unsigned int id, const char *challenge, const char *promptstr, const char **result, sasl_interact_t **prompt_need) argument [all...] |
/osnet-11/usr/src/lib/libipmi/common/ |
H A D | ipmi_lan.c | 564 * Copies the returned session ID and 16-byte challenge string to the supplied 571 uint8_t *challenge) 609 (void) memcpy(challenge, (uint8_t *)resp.ic_data + 4, 16); 739 * about supported challenge/response authentication types 742 * packet will contain challenge string and temporary session ID. 570 ipmi_get_session_challenge_cmd(ipmi_handle_t *ihp, uint32_t *session_id, uint8_t *challenge) argument
|
/osnet-11/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 514 char *challenge; member in struct:ami_pubkey_and_challenge
|