Searched defs:challenge (Results 1 - 12 of 12) sorted by relevance

/osnet-11/usr/src/lib/libldap4/common/
H A Dsaslbind.c296 struct berval *challenge = NULL; local
307 if ((res = ldap_sasl_bind_s(ld, dn, LDAP_SASL_CRAM_MD5, NULL, serverctrls, clientctrls, &challenge))
311 if (challenge == NULL){
315 Debug (LDAP_DEBUG_TRACE, "SASL challenge: %s\n", challenge->bv_val, 0, 0);
317 hmac_md5((unsigned char *)challenge->bv_val, challenge->bv_len,
319 ber_bvfree(challenge);
320 challenge = NULL;
336 res = ldap_sasl_bind_s(ld, dn, LDAP_SASL_CRAM_MD5, &resp, serverctrls, clientctrls, &challenge);
[all...]
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/
H A Dcram_md5.c17 /* text is the challenge, key is the password, digest is an allocated
72 struct berval *challenge = NULL; local
83 if ((res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, NULL, serverctrls, clientctrls, &challenge))
87 if (challenge == NULL){
91 LDAPDebug (LDAP_DEBUG_TRACE, "SASL challenge: %s\n", challenge->bv_val, 0, 0);
93 hmac_md5((unsigned char *)challenge->bv_val, challenge->bv_len,
95 ber_bvfree(challenge);
96 challenge
[all...]
H A Ddigest_md5.c63 * server challenge */
112 /* initialize challenge */
598 const char *challenge,
611 if (challenge == NULL || username == NULL || passwd == NULL) {
615 /* parse the challenge */
617 ret = digest_parse(challenge, 0, &attrs);
635 outlen = strlen(challenge) + DIGEST_CLIENT_EXTRA + 1;
667 struct berval *challenge = NULL; local
683 NULL, serverctrls, clientctrls, &challenge);
686 if (challenge !
597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument
746 struct berval *challenge = NULL; local
[all...]
/osnet-11/usr/src/lib/libsasl/lib/
H A Dcheckpw.c265 const char *challenge,
282 if (!conn || !userstr || !challenge || !response)
311 _sasl_MD5Update(&ctx, challenge, strlen(challenge));
263 _sasl_auxprop_verify_apop(sasl_conn_t *conn, const char *userstr, const char *challenge, const char *response, const char *user_realm __attribute__((unused))) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dpreauth.c386 char *challenge = sc->sam_challenge.data; local
430 krb5int_buf_add_len(&buf, challenge, challenge_len);
440 * preauthentication type. It presents the challenge...
534 /* copy things from the challenge */
/osnet-11/usr/src/lib/sasl_plugins/cram/
H A Dcram.c107 char *challenge; member in struct:server_context
113 const char *challenge __attribute__((unused)),
219 /* allocate some space for the challenge */
220 text->challenge = sparams->utils->malloc(200 + 1);
221 if (text->challenge == NULL) {
226 /* create the challenge */
227 snprintf(text->challenge, 200, "<%s.%s@%s>", randdigits, time,
230 *serverout = text->challenge;
231 *serveroutlen = strlen(text->challenge);
369 (const unsigned char *) text->challenge,
[all...]
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_auth.c113 * Create a LM response from the given LM hash and challenge.
120 unsigned char *challenge, int clen,
134 rc = smb_auth_DES(lm_rsp, SMBAUTH_RESP_SZ, S21, 21, challenge, clen);
172 * challenge.
176 unsigned char *challenge, int clen,
184 S21, 21, challenge, clen) == SMBAUTH_FAILURE)
192 * data = concat(challenge, client_nonce); [ntlm2 session nonce]
374 * with the 8-byte client challenge(a.k.a blip) as the clnt_data.
377 * (server challenge + NTLMv2 data blob or LMv2 client challenge)
119 smb_auth_lm_response(unsigned char *hash, unsigned char *challenge, int clen, unsigned char *lm_rsp) argument
175 smb_auth_ntlm_response(unsigned char *hash, unsigned char *challenge, int clen, unsigned char *ntlm_rsp) argument
552 smb_lm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *lm_hash, unsigned char *passwd) argument
569 smb_ntlm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, unsigned char *session_key) argument
594 smb_ntlmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument
696 smb_ntlm2_session_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, unsigned char *nonce, int nlen, uchar_t *session_key) argument
726 smb_lmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument
793 smb_auth_validate_lm( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username) argument
832 smb_auth_validate_nt( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username, unsigned char *nonce, int nlen, uchar_t *session_key) argument
[all...]
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dnetr_clnt.c28 * NETR challenge/response client functions.
96 * Wrapper for the netlogon challenge-response authentication protocol
414 * Do the challenge response authentication.
645 * input: challenge
714 * Generate a set of credentials from a challenge and a session key.
716 * timestamp is added to the challenge and the result is stored in a
719 * input: challenge (including timestamp)
739 netr_gen_credentials(BYTE *session_key, netr_cred_t *challenge, argument
748 p = (DWORD *)(uintptr_t)challenge;
1214 * challenge, tha
[all...]
/osnet-11/usr/src/lib/libsasl/include/
H A Dsasl.h33 * sasl_chalprompt_t client: Display challenge and prompt for response
68 * sasl_checkapop Check an APOP challenge/response (uses pseudo "APOP"
557 * prompt for input in response to a challenge.
561 * challenge -- server challenge
568 const char *challenge,
571 #define SASL_CB_ECHOPROMPT 0x4005 /* challenge and client enterred result */
572 #define SASL_CB_NOECHOPROMPT 0x4006 /* challenge and client enterred result */
838 const char *challenge; /* presented to user (e.g. OTP challenge) */ member in struct:sasl_interact
[all...]
/osnet-11/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c507 * Retrieve the string given by the challenge prompt id.
510 const char *challenge, const char *promptstr,
540 challenge, promptstr, NULL, result, NULL);
642 (prompts)->challenge = convert_prompt(utils, h,
645 (prompts)->challenge = "Authorization Name";
656 (prompts)->challenge = convert_prompt(utils, h,
659 (prompts)->challenge = "Authentication Name";
670 (prompts)->challenge = convert_prompt(utils, h, gettext("Password"));
672 (prompts)->challenge = "Password";
682 (prompts)->challenge
509 _plug_challenge_prompt(const sasl_utils_t *utils, unsigned int id, const char *challenge, const char *promptstr, const char **result, sasl_interact_t **prompt_need) argument
[all...]
/osnet-11/usr/src/lib/libipmi/common/
H A Dipmi_lan.c564 * Copies the returned session ID and 16-byte challenge string to the supplied
571 uint8_t *challenge)
609 (void) memcpy(challenge, (uint8_t *)resp.ic_data + 4, 16);
739 * about supported challenge/response authentication types
742 * packet will contain challenge string and temporary session ID.
570 ipmi_get_session_challenge_cmd(ipmi_handle_t *ihp, uint32_t *session_id, uint8_t *challenge) argument
/osnet-11/usr/src/lib/libslp/clib/
H A Dslp_ami.h514 char *challenge; member in struct:ami_pubkey_and_challenge

Completed in 47 milliseconds