/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/ |
H A D | aaa.c | 216 int handle_challenge (struct tunnel *t, struct challenge *chal) argument 252 if (!get_secret (us, them, chal->secret, sizeof (chal->secret))) 260 log (LOG_DEBUG, "*%s: Here comes the chal->ss:\n", __FUNCTION__); 261 bufferDump (&chal->ss, 1); 264 bufferDump (chal->secret, strlen (chal->secret)); 267 bufferDump (chal->challenge, strlen (chal->challenge)); 270 memset (chal 351 print_challenge(struct challenge *chal) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | t_spki.c | 77 ASN1_IA5STRING *chal; local 91 chal = spki->spkac->challenge; 92 if (chal->length) 93 BIO_printf(out, " Challenge String: %s\n", chal->data);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | t_spki.c | 77 ASN1_IA5STRING *chal; local 91 chal = spki->spkac->challenge; 92 if (chal->length) 93 BIO_printf(out, " Challenge String: %s\n", chal->data);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | t_spki.c | 76 ASN1_IA5STRING *chal; local 115 chal = spki->spkac->challenge; 116 if(chal->length) 117 BIO_printf(out, " Challenge String: %s\n", chal->data);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | auth_compat.c | 43 const uint8 *chal; local 49 chal = plaintext_auth_context->get_ntlm_challenge(plaintext_auth_context); 52 smb_name, lp_workgroup(), chal,
|
H A D | auth.c | 127 uchar chal[8]; local 129 generate_random_buffer(chal, sizeof(chal)); 131 chal, sizeof(chal)); 550 NTSTATUS make_auth_context_fixed(struct auth_context **auth_context, uchar chal[8]) argument 557 (*auth_context)->challenge = data_blob_talloc((*auth_context)->mem_ctx, chal, 8);
|
H A D | auth_winbind.c | 97 memcpy(request.data.auth_crap.chal, auth_context->challenge.data, sizeof(request.data.auth_crap.chal));
|
H A D | auth_domain.c | 184 uchar chal[8], 242 chal, /* 8 byte challenge. */ 181 domain_client_validate(TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, const char *domain, uchar chal[8], auth_serversupplied_info **server_info, const char *dc_name, struct in_addr dc_ip) argument
|
H A D | auth_util.c | 239 const uchar chal[8], 285 SMBOWFencrypt((const unsigned char *)lm_pwd, chal, 289 SMBOWFencrypt((const unsigned char *)nt_pwd, chal, 350 const uint8 chal[8], 376 (const uchar*)chal, local_lm_response); 234 make_user_info_netlogon_interactive(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, const char *wksta_name, uint32 logon_parameters, const uchar chal[8], const uchar lm_interactive_pwd[16], const uchar nt_interactive_pwd[16], const uchar *dc_sess_key) argument 347 make_user_info_for_reply(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, const uint8 chal[8], DATA_BLOB plaintext_password) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | ntlmssp.h | 98 DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */ member in struct:ntlmssp_state 132 * from the DATA_BLOB chal on this structure.
|
H A D | rpc_netlogon.h | 961 uint8 chal[16]; member in struct:__anon5378
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | sesssetup.c | 138 unsigned char chal[8]; local 140 ZERO_STRUCT(chal); 144 if (!NT_STATUS_IS_OK(nt_status = make_auth_context_fixed(&auth_context, chal))) { 686 DATA_BLOB chal; local 725 secblob, &chal); 730 &chal, status, True); 732 data_blob_free(&chal); 1138 DATA_BLOB chal; local 1150 blob1, &chal); 1156 &chal, statu 1469 const uint8 *chal; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | ntlmssp.c | 114 static uchar chal[8]; local 115 generate_random_buffer(chal, sizeof(chal)); 117 return chal; 364 data_blob_free(&(*ntlmssp_state)->chal); 563 ntlmssp_state->chal = data_blob_talloc(ntlmssp_state->mem_ctx, cryptkey, 8); 794 ntlmssp_state->chal = data_blob_talloc(ntlmssp_state->mem_ctx, session_nonce_hash, 8); 800 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->set_challenge(ntlmssp_state, &ntlmssp_state->chal))) { 1215 data_blob_free(&ntlmssp_state->chal); 1219 ntlmssp_state->chal [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/ |
H A D | py_winbind.c | 435 generate_random_buffer(request.data.auth_crap.chal, 8); 438 SMBencrypt((uchar *)password, request.data.auth_crap.chal, 444 SMBNTencrypt((uchar *)password, request.data.auth_crap.chal, 484 generate_random_buffer(request.data.smbd_auth_crap.chal, 8); 488 request.data.smbd_auth_crap.chal, 495 request.data.smbd_auth_crap.chal,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/ |
H A D | cli_netlogon.c | 97 DEBUG(4,("cli_net_auth2: srv:%s acct:%s sc:%x mc: %s chal %s neg: %x\n", 222 DEBUG(4,("cli_net_auth3: srv:%s acct:%s sc:%x mc: %s chal %s neg: %x\n", 862 uint8 chal[8]; local 866 generate_random_buffer(chal, 8); 868 SMBencrypt(password, chal, local_lm_response); 869 SMBNTencrypt(password, chal, local_nt_response); 874 username, clnt_name_slash, chal, 928 const uint8 chal[8], 978 username, workstation_name_slash, (const uchar*)chal, 921 rpccli_netlogon_sam_network_logon(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 logon_parameters, const char *server, const char *username, const char *domain, const char *workstation, const uint8 chal[8], DATA_BLOB lm_response, DATA_BLOB nt_response, NET_USER_INFO_3 *info3) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 184 static DATA_BLOB chal; local 188 chal = data_blob(NULL, 8); 190 generate_random_buffer(chal.data, chal.length); 191 return chal; 343 memcpy(request.data.auth_crap.chal, challenge->data, MIN(challenge->length, 8)); 491 &ntlmssp_state->chal, 529 &ntlmssp_state->chal,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | wbinfo.c | 875 generate_random_buffer(request.data.auth_crap.chal, 8); 884 server_chal = data_blob(request.data.auth_crap.chal, 8); 914 && SMBencrypt(pass, request.data.auth_crap.chal, 920 SMBNTencrypt(pass, request.data.auth_crap.chal,
|
H A D | winbindd_nss.h | 247 unsigned char chal[8]; member in struct:winbindd_request::__anon5839::__anon5841
|
H A D | winbindd_pam.c | 1105 uchar chal[8]; local 1136 generate_random_buffer(chal, 8); 1142 server_chal = data_blob_talloc(state->mem_ctx, chal, 8); 1173 chal, 1182 chal, 1231 chal, 1810 state->request.data.auth_crap.chal,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/ |
H A D | srv_pipe.c | 1102 DATA_BLOB chal; local 1111 ZERO_STRUCT(chal); 1167 status = auth_ntlmssp_update(a, secblob, &chal); 1175 response = spnego_gen_auth_response(&chal, status, OID_NTLMSSP); 1195 data_blob_free(&chal); 1205 data_blob_free(&chal);
|
H A D | srv_netlog_nt.c | 386 &p->dc->clnt_chal, /* Stored client chal. */ 387 &p->dc->srv_chal, /* Stored server chal. */ 469 &p->dc->clnt_chal, /* Stored client chal. */ 470 &p->dc->srv_chal, /* Stored server chal. */ 900 const uint8 *chal; local 906 chal = auth_context->get_ntlm_challenge(auth_context); 912 chal,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_parse/ |
H A D | parse_misc.c | 1498 BOOL smb_io_chal(const char *desc, DOM_CHAL *chal, prs_struct *ps, int depth) argument 1500 if (chal == NULL) 1506 if(!prs_uint8s (False, "data", ps, depth, chal->data, 8))
|
H A D | parse_net.c | 2869 if(!prs_uint8s (False, "chal", ps, depth, info->chal, info->chal_len2))
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | cdrom.h | 625 dvd_challenge chal; member in struct:dvd_host_send_challenge 639 dvd_challenge chal; member in struct:dvd_lu_send_challenge
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/cdrom/ |
H A D | cdrom.c | 1609 copy_chal(ai->lsc.chal, &buf[4]); 1648 copy_chal(&buf[4], ai->hsc.chal);
|