/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/ |
H A D | chap-md5.c | 64 unsigned char *challenge, unsigned char *response, 72 challenge_len = *challenge++; 75 /* Generate hash of ID, secret, challenge */ 79 MD5Update(&ctx, challenge, challenge_len); 94 unsigned char *challenge, char *secret, int secret_len, 99 int challenge_len = *challenge++; 104 MD5Update(&ctx, challenge, challenge_len); 62 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 93 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.h | 57 * Semi-arbitrary limits on challenge and response fields. 105 * Note: challenge and response arguments below are formatted as 106 * a length byte followed by the actual challenge/response data. 108 void (*generate_challenge)(unsigned char *challenge); 111 unsigned char *challenge, unsigned char *response, 114 unsigned char *challenge, char *secret, int secret_len, 122 /* Hook for a plugin to validate CHAP challenge */ 125 unsigned char *challenge, unsigned char *response,
|
H A D | chap_ms.c | 149 { "mschap-challenge", o_string, &mschap_challenge, 150 "specify CHAP challenge" }, 151 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 152 "specify CHAP peer challenge" }, 158 * chapms_generate_challenge - generate a challenge for MS-CHAP. 159 * For MS-CHAP the challenge length is fixed at 8 bytes. 160 * The length goes in challenge[0] and the actual challenge starts 161 * at challenge[1]. 164 chapms_generate_challenge(unsigned char *challenge) argument 176 chapms2_generate_challenge(unsigned char *challenge) argument 188 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 238 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 317 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 327 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 446 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument [all...] |
H A D | chap-new.c | 48 /* Hook for a plugin to validate CHAP challenge */ 51 unsigned char *challenge, unsigned char *response, 67 { "chap-max-challenge", o_int, &chap_max_transmits, 68 "Set max #xmits for challenge", OPT_PRIO }, 85 * These limits apply to challenge and response packets we send. 98 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state 121 unsigned char *challenge, unsigned char *response, 220 * There isn't much to do until we receive a challenge. 245 * chap_timeout - It's time to send another challenge to the peer. 246 * This could be either a retransmission of a previous challenge, 391 chap_verify_response(char *name, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, unsigned char *message, int message_space) argument [all...] |
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/ |
H A D | chap-md5.c | 64 unsigned char *challenge, unsigned char *response, 72 challenge_len = *challenge++; 75 /* Generate hash of ID, secret, challenge */ 79 MD5Update(&ctx, challenge, challenge_len); 94 unsigned char *challenge, char *secret, int secret_len, 99 int challenge_len = *challenge++; 104 MD5Update(&ctx, challenge, challenge_len); 62 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 93 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.h | 57 * Semi-arbitrary limits on challenge and response fields. 105 * Note: challenge and response arguments below are formatted as 106 * a length byte followed by the actual challenge/response data. 108 void (*generate_challenge)(unsigned char *challenge); 111 unsigned char *challenge, unsigned char *response, 114 unsigned char *challenge, char *secret, int secret_len, 122 /* Hook for a plugin to validate CHAP challenge */ 125 unsigned char *challenge, unsigned char *response,
|
H A D | chap_ms.c | 149 { "mschap-challenge", o_string, &mschap_challenge, 150 "specify CHAP challenge" }, 151 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 152 "specify CHAP peer challenge" }, 158 * chapms_generate_challenge - generate a challenge for MS-CHAP. 159 * For MS-CHAP the challenge length is fixed at 8 bytes. 160 * The length goes in challenge[0] and the actual challenge starts 161 * at challenge[1]. 164 chapms_generate_challenge(unsigned char *challenge) argument 174 chapms2_generate_challenge(unsigned char *challenge) argument 184 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 234 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 313 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 323 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 436 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument [all...] |
H A D | chap-new.c | 48 /* Hook for a plugin to validate CHAP challenge */ 51 unsigned char *challenge, unsigned char *response, 67 { "chap-max-challenge", o_int, &chap_max_transmits, 68 "Set max #xmits for challenge", OPT_PRIO }, 85 * These limits apply to challenge and response packets we send. 98 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state 121 unsigned char *challenge, unsigned char *response, 220 * There isn't much to do until we receive a challenge. 245 * chap_timeout - It's time to send another challenge to the peer. 246 * This could be either a retransmission of a previous challenge, 391 chap_verify_response(char *name, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, unsigned char *message, int message_space) argument [all...] |
/asus-wl-520gu-7.0.1.45/src/router/samba/source/libsmb/ |
H A D | credentials.c | 38 Input: 8 byte challenge block 39 8 byte server challenge block 123 DEBUG(5,(" challenge : %s\n", credstr(cred->data))); 154 if (!cred_assert(&rcv_srv_cred->challenge, sess_key, 155 &sto_clnt_cred->challenge, new_clnt_time)) 161 new_cred = IVAL(sto_clnt_cred->challenge.data, 0); 165 SIVAL(sto_clnt_cred->challenge.data, 0, new_cred); 167 DEBUG(5,(" new clnt cred: %s\n", credstr(sto_clnt_cred->challenge.data))); 185 if (!cred_assert(&rcv_clnt_cred->challenge, sess_key, 186 &sto_clnt_cred->challenge, rcv_clnt_cre [all...] |
H A D | ntlm_check.c | 48 DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect challenge size (%lu)\n", 71 DEBUGADD(100,("Given challenge was |\n")); 103 DEBUG(0, ("smb_pwd_check_ntlmv2: incorrect challenge size (%lu)\n", 142 DEBUGADD(100,("Given challenge was |\n")); 152 * Check a challenge-response password against the value of the NT or 156 * @param challenge 8-byte challenge. If all zero, forces plaintext comparison 157 * @param nt_response 'unicode' NT response to the challenge, or unicode password 158 * @param lm_response ASCII or LANMAN response to the challenge, or password in DOS code page 169 const DATA_BLOB *challenge, 168 ntlm_password_check(TALLOC_CTX *mem_ctx, const DATA_BLOB *challenge, const DATA_BLOB *lm_response, const DATA_BLOB *nt_response, const char *username, const char *client_username, const char *client_domain, const uint8 *lm_pw, const uint8 *nt_pw, DATA_BLOB *user_sess_key, DATA_BLOB *lm_sess_key) argument [all...] |
/asus-wl-520gu-7.0.1.45/src/router/rp-l2tp/ |
H A D | auth.c | 28 * challenge -- challenge received from peer 29 * chal_len -- length of challenge 34 * Computes a response for the challenge using "secret" 39 unsigned char const *challenge, 49 MD5Update(&ctx, challenge, chal_len); 37 l2tp_auth_gen_response(uint16_t msg_type, char const *secret, unsigned char const *challenge, size_t chal_len, unsigned char buf[16]) argument
|
H A D | tunnel.c | 574 unsigned char challenge[16]; local 627 l2tp_random_fill(challenge, sizeof(challenge)); 629 sizeof(challenge), VENDOR_IETF, 630 AVP_CHALLENGE, challenge); 634 challenge, sizeof(challenge), tunnel->expected_response); 779 unsigned char challenge[16]; local 848 l2tp_random_fill(challenge, sizeof(challenge)); [all...] |
/asus-wl-520gu-7.0.1.45/src/router/samba/source/auth/ |
H A D | auth.c | 74 Try to get a challenge out of the various authentication modules. 80 DATA_BLOB challenge = data_blob(NULL, 0); local 85 if (auth_context->challenge.length) { 86 DEBUG(5, ("get_ntlm_challenge (auth subsystem): returning previous challenge by module %s (normal)\n", 88 return auth_context->challenge.data; 95 DEBUG(5, ("auth_get_challenge: module %s did not want to specify a challenge\n", auth_method->name)); 99 DEBUG(5, ("auth_get_challenge: getting challenge from module %s\n", auth_method->name)); 101 DEBUG(1, ("auth_get_challenge: CONFIGURATION ERROR: authentication method %s has already specified a challenge. Challenge by %s ignored.\n", 111 challenge = auth_method->get_chal(auth_context, &auth_method->private_data, mem_ctx); 112 if (!challenge [all...] |
H A D | auth_ntlmssp.c | 27 * Return the challenge as determined by the authentication subsystem 28 * @return an 8 byte random challenge 38 * Some authentication methods 'fix' the challenge, so we may not be able to set it 40 * @return If the effective challenge used by the auth subsystem may be modified 52 * @param challenge The new challenge value 54 static NTSTATUS auth_ntlmssp_set_challenge(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge) argument 59 SMB_ASSERT(challenge->length == 8); 61 auth_context->challenge = data_blob_talloc(auth_context->mem_ctx, 62 challenge [all...] |
H A D | auth_builtin.c | 117 * Return a 'fixed' challenge instead of a variable one. 120 * with a fixed challenge, so as to aid debugging. 125 * just pretenteds to need a specified challenge. 126 * This module removes *all* security from the challenge-response system 141 Get the challenge out of a password server. 148 const char *challenge = "I am a teapot"; local 149 return data_blob(challenge, 8);
|
/asus-wl-520gu-7.0.1.45/src/router/ppp/pppd/ |
H A D | chap.h | 70 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state 71 u_char chal_len; /* challenge length */ 72 u_char chal_id; /* ID of last challenge */ 75 char *chal_name; /* Our name to use with challenge */ 76 int chal_interval; /* Time until we challenge peer again */ 78 int max_transmits; /* Maximum # of challenge transmissions */ 79 int chal_transmits; /* Number of transmissions of challenge */ 95 #define CHAPCS_LISTEN 3 /* Listening for a challenge */ 105 #define CHAPSS_INITIAL_CHAL 3 /* We've sent the first challenge */ [all...] |
H A D | chap_ms.c | 89 ChallengeResponse(challenge, pwHash, response) 90 u_char *challenge; /* IN 8 octets */ 100 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); 101 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); 102 DesEncrypt(challenge, ZPasswordHash + 14, response + 16);
|
/asus-wl-520gu-7.0.1.45/src/router/LPRng/src/common/ |
H A D | user_auth.c | 509 char challenge[KEY_LENGTH+1]; local 574 /* Read the challenge dest server */ 579 "md5_send: error reading challenge - '%s'", Link_err_str(n) ); 583 "md5_send: zero length challenge"); 586 DEBUG1("md5_send: challenge '%s'", buffer ); 590 "md5_send: bad challenge length '%d'", safestrlen(buffer) ); 593 memset(challenge, 0, sizeof(challenge)); 597 challenge[i] = strtol(smallbuffer,0,16); 600 DEBUG1("md5_send: decoded challenge ' 757 char challenge[KEY_LENGTH+1]; local [all...] |
/asus-wl-520gu-7.0.1.45/src/router/samba/source/rpc_server/ |
H A D | srv_netlog_nt.c | 195 /* JRA. This is ok as it is only used for generating the challenge. */ 234 /* create a server challenge for the client */ 238 memcpy(p->dc.srv_cred.challenge.data, p->dc.srv_chal.data, 8); 241 memcpy(p->dc.clnt_cred.challenge.data, q_u->clnt_chal.data, sizeof(q_u->clnt_chal.data)); 284 if (cred_assert(&q_u->clnt_chal, p->dc.sess_key, &p->dc.clnt_cred.challenge, srv_time)) { 286 /* create server challenge for inclusion in the reply */ 287 cred_create(p->dc.sess_key, &p->dc.srv_cred.challenge, srv_time, &srv_cred); 290 memcpy(p->dc.clnt_cred.challenge.data, q_u->clnt_chal.data, sizeof(q_u->clnt_chal.data)); 291 memcpy(p->dc.srv_cred .challenge.data, q_u->clnt_chal.data, sizeof(q_u->clnt_chal.data)); 353 if (cred_assert(&q_u->clnt_chal, p->dc.sess_key, &p->dc.clnt_cred.challenge, srv_tim [all...] |
/asus-wl-520gu-7.0.1.45/src/router/samba/source/rpc_client/ |
H A D | cli_netlogon.c | 28 /* LSA Request Challenge. Sends our challenge to server, then gets 83 encrypt of the server challenge originally received. JRA. 102 credstr(cli->clnt_cred.challenge.data), *neg_flags)); 106 sec_chan, global_myname(), &cli->clnt_cred.challenge, 129 * server received challenge. 159 encrypt of the server challenge originally received. JRA. 178 credstr(cli->clnt_cred.challenge.data), *neg_flags)); 182 sec_chan, global_myname(), &cli->clnt_cred.challenge, 205 * server received challenge. 245 /* send a client challenge; receiv [all...] |
/asus-wl-520gu-7.0.1.45/src/router/samba/source/include/ |
H A D | ntlmssp.h | 87 DATA_BLOB internal_chal; /* Random challenge as supplied to the client for NTLM authentication */ 89 DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */ 99 * Callback to get the 'challenge' used for NTLM authentication. 102 * @return 8 bytes of challnege data, determined by the server to be the challenge for NTLM authentication 108 * Callback to find if the challenge used by NTLM authentication may be modified 110 * The NTLM2 authentication scheme modifies the effective challenge, but this is not compatiable with the 114 * @return Can the challenge be set to arbitary values? 120 * Callback to set the 'challenge' used for NTLM authentication. 126 * @param challange 8 bytes of data, agreed by the client and server to be the effective challenge for NTLM2 authentication 129 NTSTATUS (*set_challenge)(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge); [all...] |
H A D | auth.h | 104 DATA_BLOB challenge; member in struct:auth_context
|
/asus-wl-520gu-7.0.1.45/src/router/samba/source/libads/ |
H A D | sasl.c | 34 uint8 challenge[8]; local 83 /* encrypt the password with the challenge */ 84 memcpy(challenge, chal1.data + 24, 8); 85 SMBencrypt(ads->auth.password, challenge,lmhash); 86 SMBNTencrypt(ads->auth.password, challenge,nthash);
|
/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/plugins/radius/ |
H A D | radius.c | 70 unsigned char *challenge, 79 unsigned char *challenge, 312 * id -- the ID byte in the challenge 314 * challenge -- the challenge string we sent (length in first byte) 326 unsigned char *challenge, unsigned char *response, 342 challenge_len = *challenge++; 385 * add the challenge and response fields 396 challenge, challenge_len, VENDOR_NONE); 419 challenge, challenge_le 324 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, unsigned char *message, int message_space) argument 533 radius_setparams(VALUE_PAIR *vp, char *msg, REQUEST_INFO *req_info, struct chap_digest_type *digest, unsigned char *challenge, char *message, int message_space) argument 720 radius_setmppekeys(VALUE_PAIR *vp, REQUEST_INFO *req_info, unsigned char *challenge) argument [all...] |
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/plugins/radius/ |
H A D | radius.c | 70 unsigned char *challenge, 79 unsigned char *challenge, 312 * id -- the ID byte in the challenge 314 * challenge -- the challenge string we sent (length in first byte) 326 unsigned char *challenge, unsigned char *response, 342 challenge_len = *challenge++; 385 * add the challenge and response fields 396 challenge, challenge_len, VENDOR_NONE); 419 challenge, challenge_le 324 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, unsigned char *message, int message_space) argument 533 radius_setparams(VALUE_PAIR *vp, char *msg, REQUEST_INFO *req_info, struct chap_digest_type *digest, unsigned char *challenge, char *message, int message_space) argument 720 radius_setmppekeys(VALUE_PAIR *vp, REQUEST_INFO *req_info, unsigned char *challenge) argument [all...] |