Searched refs:challange (Results 1 - 10 of 10) sorted by relevance

/freebsd-9.3-release/crypto/heimdal/lib/ntlm/
H A Dheimntlm-protos.h22 unsigned char challange[8],
H A Dheimntlm.h100 unsigned char challange[8]; /**< */ member in struct:ntlm_type2
H A Dtest_ntlm.c90 memset(type2.challange, 0x7f, sizeof(type2.challange));
124 type2.challange,
163 memset(type2.challange, 0x7f, sizeof(type2.challange));
H A Dntlm.c565 CHECK(krb5_storage_read(in, type2->challange, sizeof(type2->challange)),
566 sizeof(type2->challange));
636 CHECK(krb5_storage_write(out, type2->challange, sizeof(type2->challange)),
637 sizeof(type2->challange));
863 unsigned char *challange,
880 DES_ecb_encrypt((DES_cblock *)challange, (DES_cblock *)answer, &sched, 1);
926 * @param challange sent by the server
937 unsigned char challange[
862 splitandenc(unsigned char *hash, unsigned char *challange, unsigned char *answer) argument
936 heim_ntlm_calculate_ntlm1(void *key, size_t len, unsigned char challange[8], struct ntlm_buf *answer) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/ntlm/
H A Ddigest.c253 krb5_data challange; local
295 ret = krb5_ntlm_init_get_challange(c->context, c->ntlm, &challange);
301 if (challange.length != sizeof(type2.challange)) {
305 memcpy(type2.challange, challange.data, sizeof(type2.challange));
306 krb5_data_free(&challange);
H A Dinit_sec_context.c362 type2.challange,
369 type2.challange,
433 type2.challange,
/freebsd-9.3-release/crypto/heimdal/kuser/
H A Dkdigest.c267 unsigned char md[SHA_DIGEST_LENGTH], challange[SHA_DIGEST_LENGTH]; local
313 SHA1_Final(challange, &ctx);
317 SHA1_Update(&ctx, challange, 8);
416 krb5_data challange, opaque; local
440 ret = krb5_ntlm_init_get_challange(context, ntlm, &challange);
444 if (challange.length != sizeof(type2.challange))
445 krb5_errx(context, 1, "ntlm challange have wrong length");
446 memcpy(type2.challange, challange
[all...]
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Ddigest.c784 unsigned char md[SHA_DIGEST_LENGTH], challange[SHA_DIGEST_LENGTH]; local
844 SHA1_Final(challange, &ctx);
873 challange, &answer);
921 SHA1_Update(&ctx, challange, 8);
1028 r.u.ntlmInitReply.challange.data = malloc(8);
1029 if (r.u.ntlmInitReply.challange.data == NULL) {
1034 r.u.ntlmInitReply.challange.length = 8;
1035 if (RAND_bytes(r.u.ntlmInitReply.challange.data,
1036 r.u.ntlmInitReply.challange.length) != 1)
1071 ret = krb5_storage_write(sp, r.u.ntlmInitReply.challange
1108 unsigned char challange[8]; local
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/
H A Dtest_ntlm.c123 type2.challange,
250 type2.challange,
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Ddigest.c918 krb5_data *challange)
922 ret = der_copy_octet_string(&ntlm->initReply.challange, challange);
916 krb5_ntlm_init_get_challange(krb5_context context, krb5_ntlm ntlm, krb5_data *challange) argument

Completed in 132 milliseconds