Lines Matching refs:challenge
91 static Block challenge = { 0 };
200 * the challenge, and verify it when the response comes back.
208 des_ecb_encrypt(&session_key, &challenge, sched, 0);
210 * Increment the challenge by 1, and encrypt it for
215 x = (unsigned int)challenge[i] + 1;
216 challenge[i] = x; /* ignore overflow */
220 des_ecb_encrypt(&challenge, &challenge, sched, 1);
300 * Take the received encrypted challenge, and encrypt
310 * Now decrypt the received encrypted challenge,
313 des_ecb_encrypt(&datablock, &challenge, sched, 0);
316 t = (unsigned int)challenge[r] + 1;
317 challenge[r] = t; /* ignore overflow */
321 des_ecb_encrypt(&challenge, &challenge, sched, 1);
322 Data(ap, KRB_RESPONSE, challenge, sizeof(challenge));
356 * Send over the encrypted challenge.
376 * Verify that the response to the challenge is correct.
379 (0 != memcmp((void *)data, (void *)challenge,
380 sizeof(challenge))))
383 printf("[ Kerberos V4 challenge failed!!! ]\r\n");
388 printf("[ Kerberos V4 challenge successful ]\r\n");