Searched refs:chal (Results 1 - 25 of 25) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/
H A Daaa.c216 int handle_challenge (struct tunnel *t, struct challenge *chal) argument
252 if (!get_secret (us, them, chal->secret, sizeof (chal->secret)))
260 log (LOG_DEBUG, "*%s: Here comes the chal->ss:\n", __FUNCTION__);
261 bufferDump (&chal->ss, 1);
264 bufferDump (chal->secret, strlen (chal->secret));
267 bufferDump (chal->challenge, strlen (chal->challenge));
270 memset (chal
351 print_challenge(struct challenge *chal) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/
H A Dt_spki.c77 ASN1_IA5STRING *chal; local
91 chal = spki->spkac->challenge;
92 if (chal->length)
93 BIO_printf(out, " Challenge String: %s\n", chal->data);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/
H A Dt_spki.c77 ASN1_IA5STRING *chal; local
91 chal = spki->spkac->challenge;
92 if (chal->length)
93 BIO_printf(out, " Challenge String: %s\n", chal->data);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dt_spki.c76 ASN1_IA5STRING *chal; local
115 chal = spki->spkac->challenge;
116 if(chal->length)
117 BIO_printf(out, " Challenge String: %s\n", chal->data);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/
H A Dauth_compat.c43 const uint8 *chal; local
49 chal = plaintext_auth_context->get_ntlm_challenge(plaintext_auth_context);
52 smb_name, lp_workgroup(), chal,
H A Dauth.c127 uchar chal[8]; local
129 generate_random_buffer(chal, sizeof(chal));
131 chal, sizeof(chal));
550 NTSTATUS make_auth_context_fixed(struct auth_context **auth_context, uchar chal[8]) argument
557 (*auth_context)->challenge = data_blob_talloc((*auth_context)->mem_ctx, chal, 8);
H A Dauth_winbind.c97 memcpy(request.data.auth_crap.chal, auth_context->challenge.data, sizeof(request.data.auth_crap.chal));
H A Dauth_domain.c184 uchar chal[8],
242 chal, /* 8 byte challenge. */
181 domain_client_validate(TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, const char *domain, uchar chal[8], auth_serversupplied_info **server_info, const char *dc_name, struct in_addr dc_ip) argument
H A Dauth_util.c239 const uchar chal[8],
285 SMBOWFencrypt((const unsigned char *)lm_pwd, chal,
289 SMBOWFencrypt((const unsigned char *)nt_pwd, chal,
350 const uint8 chal[8],
376 (const uchar*)chal, local_lm_response);
234 make_user_info_netlogon_interactive(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, const char *wksta_name, uint32 logon_parameters, const uchar chal[8], const uchar lm_interactive_pwd[16], const uchar nt_interactive_pwd[16], const uchar *dc_sess_key) argument
347 make_user_info_for_reply(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, const uint8 chal[8], DATA_BLOB plaintext_password) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Dntlmssp.h98 DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */ member in struct:ntlmssp_state
132 * from the DATA_BLOB chal on this structure.
H A Drpc_netlogon.h961 uint8 chal[16]; member in struct:__anon5378
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Dsesssetup.c138 unsigned char chal[8]; local
140 ZERO_STRUCT(chal);
144 if (!NT_STATUS_IS_OK(nt_status = make_auth_context_fixed(&auth_context, chal))) {
686 DATA_BLOB chal; local
725 secblob, &chal);
730 &chal, status, True);
732 data_blob_free(&chal);
1138 DATA_BLOB chal; local
1150 blob1, &chal);
1156 &chal, statu
1469 const uint8 *chal; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dntlmssp.c114 static uchar chal[8]; local
115 generate_random_buffer(chal, sizeof(chal));
117 return chal;
364 data_blob_free(&(*ntlmssp_state)->chal);
563 ntlmssp_state->chal = data_blob_talloc(ntlmssp_state->mem_ctx, cryptkey, 8);
794 ntlmssp_state->chal = data_blob_talloc(ntlmssp_state->mem_ctx, session_nonce_hash, 8);
800 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->set_challenge(ntlmssp_state, &ntlmssp_state->chal))) {
1215 data_blob_free(&ntlmssp_state->chal);
1219 ntlmssp_state->chal
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/
H A Dpy_winbind.c435 generate_random_buffer(request.data.auth_crap.chal, 8);
438 SMBencrypt((uchar *)password, request.data.auth_crap.chal,
444 SMBNTencrypt((uchar *)password, request.data.auth_crap.chal,
484 generate_random_buffer(request.data.smbd_auth_crap.chal, 8);
488 request.data.smbd_auth_crap.chal,
495 request.data.smbd_auth_crap.chal,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/
H A Dcli_netlogon.c97 DEBUG(4,("cli_net_auth2: srv:%s acct:%s sc:%x mc: %s chal %s neg: %x\n",
222 DEBUG(4,("cli_net_auth3: srv:%s acct:%s sc:%x mc: %s chal %s neg: %x\n",
862 uint8 chal[8]; local
866 generate_random_buffer(chal, 8);
868 SMBencrypt(password, chal, local_lm_response);
869 SMBNTencrypt(password, chal, local_nt_response);
874 username, clnt_name_slash, chal,
928 const uint8 chal[8],
978 username, workstation_name_slash, (const uchar*)chal,
921 rpccli_netlogon_sam_network_logon(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 logon_parameters, const char *server, const char *username, const char *domain, const char *workstation, const uint8 chal[8], DATA_BLOB lm_response, DATA_BLOB nt_response, NET_USER_INFO_3 *info3) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dntlm_auth.c184 static DATA_BLOB chal; local
188 chal = data_blob(NULL, 8);
190 generate_random_buffer(chal.data, chal.length);
191 return chal;
343 memcpy(request.data.auth_crap.chal, challenge->data, MIN(challenge->length, 8));
491 &ntlmssp_state->chal,
529 &ntlmssp_state->chal,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dwbinfo.c875 generate_random_buffer(request.data.auth_crap.chal, 8);
884 server_chal = data_blob(request.data.auth_crap.chal, 8);
914 && SMBencrypt(pass, request.data.auth_crap.chal,
920 SMBNTencrypt(pass, request.data.auth_crap.chal,
H A Dwinbindd_nss.h247 unsigned char chal[8]; member in struct:winbindd_request::__anon5839::__anon5841
H A Dwinbindd_pam.c1105 uchar chal[8]; local
1136 generate_random_buffer(chal, 8);
1142 server_chal = data_blob_talloc(state->mem_ctx, chal, 8);
1173 chal,
1182 chal,
1231 chal,
1810 state->request.data.auth_crap.chal,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/
H A Dsrv_pipe.c1102 DATA_BLOB chal; local
1111 ZERO_STRUCT(chal);
1167 status = auth_ntlmssp_update(a, secblob, &chal);
1175 response = spnego_gen_auth_response(&chal, status, OID_NTLMSSP);
1195 data_blob_free(&chal);
1205 data_blob_free(&chal);
H A Dsrv_netlog_nt.c386 &p->dc->clnt_chal, /* Stored client chal. */
387 &p->dc->srv_chal, /* Stored server chal. */
469 &p->dc->clnt_chal, /* Stored client chal. */
470 &p->dc->srv_chal, /* Stored server chal. */
900 const uint8 *chal; local
906 chal = auth_context->get_ntlm_challenge(auth_context);
912 chal,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_parse/
H A Dparse_misc.c1498 BOOL smb_io_chal(const char *desc, DOM_CHAL *chal, prs_struct *ps, int depth) argument
1500 if (chal == NULL)
1506 if(!prs_uint8s (False, "data", ps, depth, chal->data, 8))
H A Dparse_net.c2869 if(!prs_uint8s (False, "chal", ps, depth, info->chal, info->chal_len2))
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dcdrom.h625 dvd_challenge chal; member in struct:dvd_host_send_challenge
639 dvd_challenge chal; member in struct:dvd_lu_send_challenge
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/cdrom/
H A Dcdrom.c1609 copy_chal(ai->lsc.chal, &buf[4]);
1648 copy_chal(&buf[4], ai->hsc.chal);

Completed in 486 milliseconds