Searched refs:challenge (Results 1 - 25 of 43) sorted by relevance

12

/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/
H A Dchap-md5.c64 unsigned char *challenge, unsigned char *response,
72 challenge_len = *challenge++;
75 /* Generate hash of ID, secret, challenge */
79 MD5Update(&ctx, challenge, challenge_len);
94 unsigned char *challenge, char *secret, int secret_len,
99 int challenge_len = *challenge++;
104 MD5Update(&ctx, challenge, challenge_len);
62 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
93 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap-new.h57 * Semi-arbitrary limits on challenge and response fields.
105 * Note: challenge and response arguments below are formatted as
106 * a length byte followed by the actual challenge/response data.
108 void (*generate_challenge)(unsigned char *challenge);
111 unsigned char *challenge, unsigned char *response,
114 unsigned char *challenge, char *secret, int secret_len,
122 /* Hook for a plugin to validate CHAP challenge */
125 unsigned char *challenge, unsigned char *response,
H A Dchap_ms.c149 { "mschap-challenge", o_string, &mschap_challenge,
150 "specify CHAP challenge" },
151 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
152 "specify CHAP peer challenge" },
158 * chapms_generate_challenge - generate a challenge for MS-CHAP.
159 * For MS-CHAP the challenge length is fixed at 8 bytes.
160 * The length goes in challenge[0] and the actual challenge starts
161 * at challenge[1].
164 chapms_generate_challenge(unsigned char *challenge) argument
176 chapms2_generate_challenge(unsigned char *challenge) argument
188 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
238 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
317 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
327 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
446 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument
[all...]
H A Dchap-new.c48 /* Hook for a plugin to validate CHAP challenge */
51 unsigned char *challenge, unsigned char *response,
67 { "chap-max-challenge", o_int, &chap_max_transmits,
68 "Set max #xmits for challenge", OPT_PRIO },
85 * These limits apply to challenge and response packets we send.
98 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state
121 unsigned char *challenge, unsigned char *response,
220 * There isn't much to do until we receive a challenge.
245 * chap_timeout - It's time to send another challenge to the peer.
246 * This could be either a retransmission of a previous challenge,
391 chap_verify_response(char *name, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, unsigned char *message, int message_space) argument
[all...]
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/
H A Dchap-md5.c64 unsigned char *challenge, unsigned char *response,
72 challenge_len = *challenge++;
75 /* Generate hash of ID, secret, challenge */
79 MD5Update(&ctx, challenge, challenge_len);
94 unsigned char *challenge, char *secret, int secret_len,
99 int challenge_len = *challenge++;
104 MD5Update(&ctx, challenge, challenge_len);
62 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
93 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap-new.h57 * Semi-arbitrary limits on challenge and response fields.
105 * Note: challenge and response arguments below are formatted as
106 * a length byte followed by the actual challenge/response data.
108 void (*generate_challenge)(unsigned char *challenge);
111 unsigned char *challenge, unsigned char *response,
114 unsigned char *challenge, char *secret, int secret_len,
122 /* Hook for a plugin to validate CHAP challenge */
125 unsigned char *challenge, unsigned char *response,
H A Dchap_ms.c149 { "mschap-challenge", o_string, &mschap_challenge,
150 "specify CHAP challenge" },
151 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
152 "specify CHAP peer challenge" },
158 * chapms_generate_challenge - generate a challenge for MS-CHAP.
159 * For MS-CHAP the challenge length is fixed at 8 bytes.
160 * The length goes in challenge[0] and the actual challenge starts
161 * at challenge[1].
164 chapms_generate_challenge(unsigned char *challenge) argument
174 chapms2_generate_challenge(unsigned char *challenge) argument
184 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
234 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
313 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
323 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
436 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument
[all...]
H A Dchap-new.c48 /* Hook for a plugin to validate CHAP challenge */
51 unsigned char *challenge, unsigned char *response,
67 { "chap-max-challenge", o_int, &chap_max_transmits,
68 "Set max #xmits for challenge", OPT_PRIO },
85 * These limits apply to challenge and response packets we send.
98 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state
121 unsigned char *challenge, unsigned char *response,
220 * There isn't much to do until we receive a challenge.
245 * chap_timeout - It's time to send another challenge to the peer.
246 * This could be either a retransmission of a previous challenge,
391 chap_verify_response(char *name, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, unsigned char *message, int message_space) argument
[all...]
/asus-wl-520gu-7.0.1.45/src/router/samba/source/libsmb/
H A Dcredentials.c38 Input: 8 byte challenge block
39 8 byte server challenge block
123 DEBUG(5,(" challenge : %s\n", credstr(cred->data)));
154 if (!cred_assert(&rcv_srv_cred->challenge, sess_key,
155 &sto_clnt_cred->challenge, new_clnt_time))
161 new_cred = IVAL(sto_clnt_cred->challenge.data, 0);
165 SIVAL(sto_clnt_cred->challenge.data, 0, new_cred);
167 DEBUG(5,(" new clnt cred: %s\n", credstr(sto_clnt_cred->challenge.data)));
185 if (!cred_assert(&rcv_clnt_cred->challenge, sess_key,
186 &sto_clnt_cred->challenge, rcv_clnt_cre
[all...]
H A Dntlm_check.c48 DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect challenge size (%lu)\n",
71 DEBUGADD(100,("Given challenge was |\n"));
103 DEBUG(0, ("smb_pwd_check_ntlmv2: incorrect challenge size (%lu)\n",
142 DEBUGADD(100,("Given challenge was |\n"));
152 * Check a challenge-response password against the value of the NT or
156 * @param challenge 8-byte challenge. If all zero, forces plaintext comparison
157 * @param nt_response 'unicode' NT response to the challenge, or unicode password
158 * @param lm_response ASCII or LANMAN response to the challenge, or password in DOS code page
169 const DATA_BLOB *challenge,
168 ntlm_password_check(TALLOC_CTX *mem_ctx, const DATA_BLOB *challenge, const DATA_BLOB *lm_response, const DATA_BLOB *nt_response, const char *username, const char *client_username, const char *client_domain, const uint8 *lm_pw, const uint8 *nt_pw, DATA_BLOB *user_sess_key, DATA_BLOB *lm_sess_key) argument
[all...]
/asus-wl-520gu-7.0.1.45/src/router/rp-l2tp/
H A Dauth.c28 * challenge -- challenge received from peer
29 * chal_len -- length of challenge
34 * Computes a response for the challenge using "secret"
39 unsigned char const *challenge,
49 MD5Update(&ctx, challenge, chal_len);
37 l2tp_auth_gen_response(uint16_t msg_type, char const *secret, unsigned char const *challenge, size_t chal_len, unsigned char buf[16]) argument
H A Dtunnel.c574 unsigned char challenge[16]; local
627 l2tp_random_fill(challenge, sizeof(challenge));
629 sizeof(challenge), VENDOR_IETF,
630 AVP_CHALLENGE, challenge);
634 challenge, sizeof(challenge), tunnel->expected_response);
779 unsigned char challenge[16]; local
848 l2tp_random_fill(challenge, sizeof(challenge));
[all...]
/asus-wl-520gu-7.0.1.45/src/router/samba/source/auth/
H A Dauth.c74 Try to get a challenge out of the various authentication modules.
80 DATA_BLOB challenge = data_blob(NULL, 0); local
85 if (auth_context->challenge.length) {
86 DEBUG(5, ("get_ntlm_challenge (auth subsystem): returning previous challenge by module %s (normal)\n",
88 return auth_context->challenge.data;
95 DEBUG(5, ("auth_get_challenge: module %s did not want to specify a challenge\n", auth_method->name));
99 DEBUG(5, ("auth_get_challenge: getting challenge from module %s\n", auth_method->name));
101 DEBUG(1, ("auth_get_challenge: CONFIGURATION ERROR: authentication method %s has already specified a challenge. Challenge by %s ignored.\n",
111 challenge = auth_method->get_chal(auth_context, &auth_method->private_data, mem_ctx);
112 if (!challenge
[all...]
H A Dauth_ntlmssp.c27 * Return the challenge as determined by the authentication subsystem
28 * @return an 8 byte random challenge
38 * Some authentication methods 'fix' the challenge, so we may not be able to set it
40 * @return If the effective challenge used by the auth subsystem may be modified
52 * @param challenge The new challenge value
54 static NTSTATUS auth_ntlmssp_set_challenge(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge) argument
59 SMB_ASSERT(challenge->length == 8);
61 auth_context->challenge = data_blob_talloc(auth_context->mem_ctx,
62 challenge
[all...]
H A Dauth_builtin.c117 * Return a 'fixed' challenge instead of a variable one.
120 * with a fixed challenge, so as to aid debugging.
125 * just pretenteds to need a specified challenge.
126 * This module removes *all* security from the challenge-response system
141 Get the challenge out of a password server.
148 const char *challenge = "I am a teapot"; local
149 return data_blob(challenge, 8);
/asus-wl-520gu-7.0.1.45/src/router/ppp/pppd/
H A Dchap.h70 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state
71 u_char chal_len; /* challenge length */
72 u_char chal_id; /* ID of last challenge */
75 char *chal_name; /* Our name to use with challenge */
76 int chal_interval; /* Time until we challenge peer again */
78 int max_transmits; /* Maximum # of challenge transmissions */
79 int chal_transmits; /* Number of transmissions of challenge */
95 #define CHAPCS_LISTEN 3 /* Listening for a challenge */
105 #define CHAPSS_INITIAL_CHAL 3 /* We've sent the first challenge */
[all...]
H A Dchap_ms.c89 ChallengeResponse(challenge, pwHash, response)
90 u_char *challenge; /* IN 8 octets */
100 DesEncrypt(challenge, ZPasswordHash + 0, response + 0);
101 DesEncrypt(challenge, ZPasswordHash + 7, response + 8);
102 DesEncrypt(challenge, ZPasswordHash + 14, response + 16);
/asus-wl-520gu-7.0.1.45/src/router/LPRng/src/common/
H A Duser_auth.c509 char challenge[KEY_LENGTH+1]; local
574 /* Read the challenge dest server */
579 "md5_send: error reading challenge - '%s'", Link_err_str(n) );
583 "md5_send: zero length challenge");
586 DEBUG1("md5_send: challenge '%s'", buffer );
590 "md5_send: bad challenge length '%d'", safestrlen(buffer) );
593 memset(challenge, 0, sizeof(challenge));
597 challenge[i] = strtol(smallbuffer,0,16);
600 DEBUG1("md5_send: decoded challenge '
757 char challenge[KEY_LENGTH+1]; local
[all...]
/asus-wl-520gu-7.0.1.45/src/router/samba/source/rpc_server/
H A Dsrv_netlog_nt.c195 /* JRA. This is ok as it is only used for generating the challenge. */
234 /* create a server challenge for the client */
238 memcpy(p->dc.srv_cred.challenge.data, p->dc.srv_chal.data, 8);
241 memcpy(p->dc.clnt_cred.challenge.data, q_u->clnt_chal.data, sizeof(q_u->clnt_chal.data));
284 if (cred_assert(&q_u->clnt_chal, p->dc.sess_key, &p->dc.clnt_cred.challenge, srv_time)) {
286 /* create server challenge for inclusion in the reply */
287 cred_create(p->dc.sess_key, &p->dc.srv_cred.challenge, srv_time, &srv_cred);
290 memcpy(p->dc.clnt_cred.challenge.data, q_u->clnt_chal.data, sizeof(q_u->clnt_chal.data));
291 memcpy(p->dc.srv_cred .challenge.data, q_u->clnt_chal.data, sizeof(q_u->clnt_chal.data));
353 if (cred_assert(&q_u->clnt_chal, p->dc.sess_key, &p->dc.clnt_cred.challenge, srv_tim
[all...]
/asus-wl-520gu-7.0.1.45/src/router/samba/source/rpc_client/
H A Dcli_netlogon.c28 /* LSA Request Challenge. Sends our challenge to server, then gets
83 encrypt of the server challenge originally received. JRA.
102 credstr(cli->clnt_cred.challenge.data), *neg_flags));
106 sec_chan, global_myname(), &cli->clnt_cred.challenge,
129 * server received challenge.
159 encrypt of the server challenge originally received. JRA.
178 credstr(cli->clnt_cred.challenge.data), *neg_flags));
182 sec_chan, global_myname(), &cli->clnt_cred.challenge,
205 * server received challenge.
245 /* send a client challenge; receiv
[all...]
/asus-wl-520gu-7.0.1.45/src/router/samba/source/include/
H A Dntlmssp.h87 DATA_BLOB internal_chal; /* Random challenge as supplied to the client for NTLM authentication */
89 DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */
99 * Callback to get the 'challenge' used for NTLM authentication.
102 * @return 8 bytes of challnege data, determined by the server to be the challenge for NTLM authentication
108 * Callback to find if the challenge used by NTLM authentication may be modified
110 * The NTLM2 authentication scheme modifies the effective challenge, but this is not compatiable with the
114 * @return Can the challenge be set to arbitary values?
120 * Callback to set the 'challenge' used for NTLM authentication.
126 * @param challange 8 bytes of data, agreed by the client and server to be the effective challenge for NTLM2 authentication
129 NTSTATUS (*set_challenge)(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge);
[all...]
H A Dauth.h104 DATA_BLOB challenge; member in struct:auth_context
/asus-wl-520gu-7.0.1.45/src/router/samba/source/libads/
H A Dsasl.c34 uint8 challenge[8]; local
83 /* encrypt the password with the challenge */
84 memcpy(challenge, chal1.data + 24, 8);
85 SMBencrypt(ads->auth.password, challenge,lmhash);
86 SMBNTencrypt(ads->auth.password, challenge,nthash);
/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/plugins/radius/
H A Dradius.c70 unsigned char *challenge,
79 unsigned char *challenge,
312 * id -- the ID byte in the challenge
314 * challenge -- the challenge string we sent (length in first byte)
326 unsigned char *challenge, unsigned char *response,
342 challenge_len = *challenge++;
385 * add the challenge and response fields
396 challenge, challenge_len, VENDOR_NONE);
419 challenge, challenge_le
324 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, unsigned char *message, int message_space) argument
533 radius_setparams(VALUE_PAIR *vp, char *msg, REQUEST_INFO *req_info, struct chap_digest_type *digest, unsigned char *challenge, char *message, int message_space) argument
720 radius_setmppekeys(VALUE_PAIR *vp, REQUEST_INFO *req_info, unsigned char *challenge) argument
[all...]
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/plugins/radius/
H A Dradius.c70 unsigned char *challenge,
79 unsigned char *challenge,
312 * id -- the ID byte in the challenge
314 * challenge -- the challenge string we sent (length in first byte)
326 unsigned char *challenge, unsigned char *response,
342 challenge_len = *challenge++;
385 * add the challenge and response fields
396 challenge, challenge_len, VENDOR_NONE);
419 challenge, challenge_le
324 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, unsigned char *message, int message_space) argument
533 radius_setparams(VALUE_PAIR *vp, char *msg, REQUEST_INFO *req_info, struct chap_digest_type *digest, unsigned char *challenge, char *message, int message_space) argument
720 radius_setmppekeys(VALUE_PAIR *vp, REQUEST_INFO *req_info, unsigned char *challenge) argument
[all...]

Completed in 279 milliseconds

12