Searched refs:challenge (Results 1 - 25 of 36) sorted by relevance

12

/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dmschap_test.c42 u_char challenge[8]; local
43 int challengeInt[sizeof(challenge)];
48 fprintf(stderr, "Usage: %s <16-hexchar challenge> <password>\n",
57 for (i = 0; i < sizeof(challenge); i++)
58 challenge[i] = (u_char)challengeInt[i];
61 ChapMS(&cstate, challenge, sizeof(challenge), argv[2], strlen(argv[2]));
68 cstate.chal_len = sizeof(challenge);
69 BCOPY(challenge, cstate.challenge, cstat
[all...]
H A Dchap_ms.c124 ChallengeResponse(challenge, pwHash, response)
125 u_char *challenge; /* IN 8 octets */
139 DesEncrypt(challenge, ZPasswordHash + 0, response + 0);
140 DesEncrypt(challenge, ZPasswordHash + 7, response + 8);
141 DesEncrypt(challenge, ZPasswordHash + 14, response + 16);
409 ChapMS_NT(cstate->challenge, secret, secret_len, &ckresp);
415 ChapMS_LANMan(cstate->challenge, secret, secret_len, &ckresp);
426 ChallengeHash(peerchallenge, authenticatorchallenge, username, challenge)
427 u_char *peerchallenge, *authenticatorchallenge, *challenge;
448 BCOPY(digest, challenge,
468 u_char challenge[8]; local
540 u_char challenge[8]; local
[all...]
H A Dchap.h50 #define CHECK_CHALLENGE_LENGTH 8 /* Minimum acceptable challenge */
78 char peercname[MAXNAMELEN]; /* unauthenticated peer name in challenge */
79 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state
80 u_char chal_len; /* challenge length */
81 u_char chal_id; /* ID of last challenge */
84 char *chal_name; /* Our name to use with challenge */
85 int chal_interval; /* Time until we challenge peer again */
87 int max_transmits; /* Maximum # of challenge transmissions */
88 int chal_transmits; /* Number of transmissions of challenge */
[all...]
H A Dchap.c68 { "chap-max-challenge", o_int, &chap[0].max_transmits,
231 * ChapChallengeTimeout - Timeout expired on sending challenge.
247 error("Peer failed to respond to CHAP challenge");
253 ChapSendChallenge(cstate); /* Re-send challenge */
275 * ChapRechallenge - Time to challenge the peer again.
498 info("CHAP: peer challenge name changed from '%q' to '%q'",
505 warn("CHAP: peer challenge name changed again to '%q'",
595 return; /* doesn't match ID of last challenge */
662 MD5Update(&mdContext, cstate->challenge, cstate->chal_len);
789 * ChapSendChallenge - Send an Authenticate challenge
[all...]
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Dcram_md5.c17 /* text is the challenge, key is the password, digest is an allocated
72 struct berval *challenge = NULL; local
83 if ((res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, NULL, serverctrls, clientctrls, &challenge))
87 if (challenge == NULL){
91 LDAPDebug (LDAP_DEBUG_TRACE, "SASL challenge: %s\n", challenge->bv_val, 0, 0);
93 hmac_md5((unsigned char *)challenge->bv_val, challenge->bv_len,
95 ber_bvfree(challenge);
96 challenge
[all...]
H A Ddigest_md5.c63 * server challenge */
112 /* initialize challenge */
598 const char *challenge,
611 if (challenge == NULL || username == NULL || passwd == NULL) {
615 /* parse the challenge */
617 ret = digest_parse(challenge, 0, &attrs);
635 outlen = strlen(challenge) + DIGEST_CLIENT_EXTRA + 1;
667 struct berval *challenge = NULL; local
683 NULL, serverctrls, clientctrls, &challenge);
686 if (challenge !
597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument
746 struct berval *challenge = NULL; local
[all...]
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/
H A Dchap.c35 uint8_t *challenge,
54 challenge,
33 chap_validate_tgt(char *target_chap_name, char *initiator_chap_name, uint8_t *challenge, uint32_t challenge_length, uint8_t *target_response, uint32_t response_length, uint8_t identifier, authentication_method_type auth_method, void *auth_config_data) argument
H A Dradius_auth.h40 * associated challenge via the specified
46 * challenge - The CHAP challenge to which the target responded.
47 * challenge_length - The length of CHAP challenge.
50 * identifier - The identifier associated with the CHAP challenge.
61 uint8_t *challenge,
H A Dradius_auth.c51 uint8_t *challenge,
61 uint8_t *challenge,
95 challenge,
160 uint8_t *challenge,
177 bcopy(challenge,
59 radius_chap_validate(char *target_chap_name, char *initiator_chap_name, uint8_t *challenge, uint32_t challenge_length, uint8_t *target_response, uint32_t response_length, uint8_t identifier, iscsi_ipaddr_t rad_svr_ip_addr, uint32_t rad_svr_port, uint8_t *rad_svr_shared_secret, uint32_t rad_svr_shared_secret_len) argument
156 set_radius_attrs(radius_packet_data_t *req, char *target_chap_name, unsigned char *target_response, uint32_t response_length, uint8_t *challenge, uint32_t challenge_length) argument
H A Dchap.h69 * To validate a target CHAP response given the associated challenge.
73 * challenge - The CHAP challenge to which the target responded.
74 * challeng_length - The length of CHAP challenge.
77 * identifier - The identifier associated with the CHAP challenge.
86 uint8_t *challenge,
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/
H A Dradius_auth.h39 * associated challenge via the specified
45 * challenge - The CHAP challenge to which the target responded.
47 * identifier - The identifier associated with the CHAP challenge.
58 uint8_t *challenge,
H A Discsit_radiusauth.c47 uint8_t *challenge,
57 uint8_t *challenge,
91 challenge,
159 uint8_t *challenge,
176 bcopy(challenge,
55 iscsit_radius_chap_validate(char *target_chap_name, char *initiator_chap_name, uint8_t *challenge, uint32_t challenge_length, uint8_t *target_response, uint32_t response_length, uint8_t identifier, iscsi_ipaddr_t rad_svr_ip_addr, uint32_t rad_svr_port, uint8_t *rad_svr_shared_secret, uint32_t rad_svr_shared_secret_len) argument
155 set_radius_attrs(radius_packet_data_t *req, char *target_chap_name, unsigned char *target_response, uint32_t response_length, uint8_t *challenge, uint32_t challenge_length) argument
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_auth.c37 #define NTLM_CHAL_SZ SMBAUTH_CHAL_SZ /* challenge size */
40 * Compute the combined (server+client) challenge per. [MS-NLMP 3.3.1]
168 * Create a LM response from the given LM hash and challenge.
175 unsigned char *challenge, /* NTLM_CHAL_SZ */
189 challenge, NTLM_CHAL_SZ));
228 * challenge.
232 unsigned char *challenge, /* NTLM_CHAL_SZ */
240 S21, 21, challenge, NTLM_CHAL_SZ) == SMBAUTH_FAILURE)
299 * with the 8-byte client challenge(a.k.a blip) as the clnt_data.
302 * (server challenge
174 smb_auth_lm_response(unsigned char *hash, unsigned char *challenge, unsigned char *lm_rsp) argument
231 smb_auth_ntlm_response(unsigned char *hash, unsigned char *challenge, unsigned char *ntlm_rsp) argument
336 smb_lm_password_ok( unsigned char *challenge, unsigned char *lm_hash, unsigned char *lm_resp) argument
352 smb_ntlm_password_ok( unsigned char *challenge, unsigned char *ntlm_hash, unsigned char *nt_resp, unsigned char *session_key) argument
376 smb_ntlmv2_password_ok( unsigned char *challenge, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument
518 smb_auth_validate( smb_passwd_t *smbpw, char *domain, char *username, unsigned char *challenge, uint_t clen, unsigned char *nt_resp, uint_t nt_len, unsigned char *lm_resp, uint_t lm_len, uchar_t *session_key) argument
[all...]
/illumos-gate/usr/src/uts/common/sys/iscsit/
H A Dchap.h69 * To validate a target CHAP response given the associated challenge.
73 * challenge - The CHAP challenge to which the target responded.
75 * identifier - The identifier associated with the CHAP challenge.
84 uint8_t *challenge,
/illumos-gate/usr/src/lib/sasl_plugins/cram/
H A Dcram.c109 char *challenge; member in struct:server_context
115 const char *challenge __attribute__((unused)),
221 /* allocate some space for the challenge */
222 text->challenge = sparams->utils->malloc(200 + 1);
223 if (text->challenge == NULL) {
228 /* create the challenge */
229 snprintf(text->challenge, 200, "<%s.%s@%s>", randdigits, time,
232 *serverout = text->challenge;
233 *serveroutlen = strlen(text->challenge);
371 (const unsigned char *) text->challenge,
[all...]
/illumos-gate/usr/src/cmd/ldap/common/
H A Dldaptool-sasl.c149 if (interact->challenge)
150 fprintf(stderr, gettext("Challenge:%s\n"), interact->challenge);
/illumos-gate/usr/src/lib/libsasl/include/
H A Dsasl.h34 * sasl_chalprompt_t client: Display challenge and prompt for response
69 * sasl_checkapop Check an APOP challenge/response (uses pseudo "APOP"
560 * prompt for input in response to a challenge.
564 * challenge -- server challenge
571 const char *challenge,
574 #define SASL_CB_ECHOPROMPT 0x4005 /* challenge and client enterred result */
575 #define SASL_CB_NOECHOPROMPT 0x4006 /* challenge and client enterred result */
841 const char *challenge; /* presented to user (e.g. OTP challenge) */ member in struct:sasl_interact
[all...]
H A Dplugin_common.h174 const char *challenge, const char *promptstr,
H A Dsaslplug.h594 * challenge -- server challenge from previous instance or NULL
595 * challen -- length of challenge from previous instance or 0
606 const char *challenge,
/illumos-gate/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c508 * Retrieve the string given by the challenge prompt id.
511 const char *challenge, const char *promptstr,
541 challenge, promptstr, NULL, result, NULL);
643 (prompts)->challenge = convert_prompt(utils, h,
646 (prompts)->challenge = "Authorization Name";
657 (prompts)->challenge = convert_prompt(utils, h,
660 (prompts)->challenge = "Authentication Name";
671 (prompts)->challenge = convert_prompt(utils, h, gettext("Password"));
673 (prompts)->challenge = "Password";
683 (prompts)->challenge
510 _plug_challenge_prompt(const sasl_utils_t *utils, unsigned int id, const char *challenge, const char *promptstr, const char **result, sasl_interact_t **prompt_need) argument
[all...]
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dcheckpw.c265 const char *challenge,
282 if (!conn || !userstr || !challenge || !response)
311 _sasl_MD5Update(&ctx, challenge, strlen(challenge));
263 _sasl_auxprop_verify_apop(sasl_conn_t *conn, const char *userstr, const char *challenge, const char *response, const char *user_realm __attribute__((unused))) argument
/illumos-gate/usr/src/uts/common/io/net80211/
H A Dnet80211_input.c360 * Only shared key auth frames with a challenge
588 * Allocate challenge text for use by shared-key authentication
600 "[%s] shared key challenge alloc failed\n",
615 uint8_t *challenge; local
630 challenge = NULL;
636 * frm[2]... - challenge text
645 challenge = frm;
651 if (challenge == NULL) {
653 "ieee80211_auth_shared: no challenge\n");
656 if (challenge[
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dpreauth.c398 char *challenge = sc->sam_challenge.data; local
449 strncpy(p, challenge, challenge_len); p += challenge_len;
459 * preauthentication type. It presents the challenge...
550 /* copy things from the challenge */
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetr_auth.c28 * NETR challenge/response client functions.
71 * Do the challenge response authentication.
351 * input: challenge
424 * Generate a set of credentials from a challenge and a session key.
426 * timestamp is added to the challenge and the result is stored in a
429 * input: challenge (including timestamp)
449 netr_gen_credentials(BYTE *session_key, netr_cred_t *challenge, argument
458 p = (DWORD *)(uintptr_t)challenge;
541 * the timestamp and add it to the client challenge. Then we
542 * need to copy the challenge t
[all...]
/illumos-gate/usr/src/lib/sasl_plugins/login/
H A Dlogin.c85 const char *challenge __attribute__((unused)),
440 "Server didn't issue challenge for USERNAME");
443 "Server didn't issue challenge for USERNAME");
466 "Server didn't issue challenge for PASSWORD");
469 "Server didn't issue challenge for PASSWORD");

Completed in 114 milliseconds

12