Searched refs:challange (Results 1 - 10 of 10) sorted by relevance
/freebsd-9.3-release/crypto/heimdal/lib/ntlm/ |
H A D | heimntlm-protos.h | 22 unsigned char challange[8],
|
H A D | heimntlm.h | 100 unsigned char challange[8]; /**< */ member in struct:ntlm_type2
|
H A D | test_ntlm.c | 90 memset(type2.challange, 0x7f, sizeof(type2.challange)); 124 type2.challange, 163 memset(type2.challange, 0x7f, sizeof(type2.challange));
|
H A D | ntlm.c | 565 CHECK(krb5_storage_read(in, type2->challange, sizeof(type2->challange)), 566 sizeof(type2->challange)); 636 CHECK(krb5_storage_write(out, type2->challange, sizeof(type2->challange)), 637 sizeof(type2->challange)); 863 unsigned char *challange, 880 DES_ecb_encrypt((DES_cblock *)challange, (DES_cblock *)answer, &sched, 1); 926 * @param challange sent by the server 937 unsigned char challange[ 862 splitandenc(unsigned char *hash, unsigned char *challange, unsigned char *answer) argument 936 heim_ntlm_calculate_ntlm1(void *key, size_t len, unsigned char challange[8], struct ntlm_buf *answer) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | digest.c | 253 krb5_data challange; local 295 ret = krb5_ntlm_init_get_challange(c->context, c->ntlm, &challange); 301 if (challange.length != sizeof(type2.challange)) { 305 memcpy(type2.challange, challange.data, sizeof(type2.challange)); 306 krb5_data_free(&challange);
|
H A D | init_sec_context.c | 362 type2.challange, 369 type2.challange, 433 type2.challange,
|
/freebsd-9.3-release/crypto/heimdal/kuser/ |
H A D | kdigest.c | 267 unsigned char md[SHA_DIGEST_LENGTH], challange[SHA_DIGEST_LENGTH]; local 313 SHA1_Final(challange, &ctx); 317 SHA1_Update(&ctx, challange, 8); 416 krb5_data challange, opaque; local 440 ret = krb5_ntlm_init_get_challange(context, ntlm, &challange); 444 if (challange.length != sizeof(type2.challange)) 445 krb5_errx(context, 1, "ntlm challange have wrong length"); 446 memcpy(type2.challange, challange [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | digest.c | 784 unsigned char md[SHA_DIGEST_LENGTH], challange[SHA_DIGEST_LENGTH]; local 844 SHA1_Final(challange, &ctx); 873 challange, &answer); 921 SHA1_Update(&ctx, challange, 8); 1028 r.u.ntlmInitReply.challange.data = malloc(8); 1029 if (r.u.ntlmInitReply.challange.data == NULL) { 1034 r.u.ntlmInitReply.challange.length = 8; 1035 if (RAND_bytes(r.u.ntlmInitReply.challange.data, 1036 r.u.ntlmInitReply.challange.length) != 1) 1071 ret = krb5_storage_write(sp, r.u.ntlmInitReply.challange 1108 unsigned char challange[8]; local [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/ |
H A D | test_ntlm.c | 123 type2.challange, 250 type2.challange,
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | digest.c | 918 krb5_data *challange) 922 ret = der_copy_octet_string(&ntlm->initReply.challange, challange); 916 krb5_ntlm_init_get_challange(krb5_context context, krb5_ntlm ntlm, krb5_data *challange) argument
|
Completed in 132 milliseconds