/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/l2tpd-0.69/ |
H A D | aaa.c | 216 int handle_challenge (struct tunnel *t, struct challenge *chal) argument 252 if (!get_secret (us, them, chal->secret, sizeof (chal->secret))) 260 log (LOG_DEBUG, "*%s: Here comes the chal->ss:\n", __FUNCTION__); 261 bufferDump (&chal->ss, 1); 264 bufferDump (chal->secret, strlen (chal->secret)); 267 bufferDump (chal->challenge, strlen (chal->challenge)); 270 memset (chal 351 print_challenge(struct challenge *chal) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/asn1/ |
H A D | t_spki.c | 69 ASN1_IA5STRING *chal; local 99 chal = spki->spkac->challenge; 100 if(chal->length) 101 BIO_printf(out, " Challenge String: %s\n", chal->data);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | t_spki.c | 76 ASN1_IA5STRING *chal; local 115 chal = spki->spkac->challenge; 116 if(chal->length) 117 BIO_printf(out, " Challenge String: %s\n", chal->data);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/auth/ |
H A D | auth_compat.c | 40 const uint8 *chal; local 46 chal = plaintext_auth_context->get_ntlm_challenge(plaintext_auth_context); 49 smb_name, lp_workgroup(), chal,
|
H A D | auth.c | 125 uchar chal[8]; local 127 generate_random_buffer(chal, sizeof(chal)); 129 chal, sizeof(chal)); 544 NTSTATUS make_auth_context_fixed(struct auth_context **auth_context, uchar chal[8]) argument 551 (*auth_context)->challenge = data_blob_talloc((*auth_context)->mem_ctx, chal, 8);
|
H A D | auth_winbind.c | 98 memcpy(request.data.auth_crap.chal, auth_context->challenge.data, sizeof(request.data.auth_crap.chal));
|
H A D | auth_domain.c | 140 uchar chal[8], 186 user_info->wksta_name.str, chal, user_info->lm_resp, 137 domain_client_validate(TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, const char *domain, uchar chal[8], auth_serversupplied_info **server_info, const char *dc_name, struct in_addr dc_ip, const char *setup_creds_as, uint16 sec_chan, unsigned char trust_passwd[16], time_t last_change_time) argument
|
H A D | auth_util.c | 291 const uchar chal[8], 334 SMBOWFencrypt((const unsigned char *)lm_pwd, chal, local_lm_response); 337 SMBOWFencrypt((const unsigned char *)nt_pwd, chal, local_nt_response); 390 const uint8 chal[8], 412 SMBencrypt( (const char *)plaintext_password.data, (const uchar*)chal, local_lm_response); 287 make_user_info_netlogon_interactive(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, const char *wksta_name, const uchar chal[8], const uchar lm_interactive_pwd[16], const uchar nt_interactive_pwd[16], const uchar *dc_sess_key) argument 387 make_user_info_for_reply(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, const uint8 chal[8], DATA_BLOB plaintext_password) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | sesssetup.c | 116 unsigned char chal[8]; local 118 ZERO_STRUCT(chal); 122 if (!NT_STATUS_IS_OK(nt_status = make_auth_context_fixed(&auth_context, chal))) { 435 DATA_BLOB chal; local 484 secblob, &chal); 491 &chal, nt_status, True); 494 data_blob_free(&chal); 618 DATA_BLOB chal; local 628 blob1, &chal); 634 &chal, nt_statu 926 const uint8 *chal; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/python/ |
H A D | py_winbind.c | 435 generate_random_buffer(request.data.auth_crap.chal, 8); 438 SMBencrypt((uchar *)password, request.data.auth_crap.chal, 444 SMBNTencrypt((uchar *)password, request.data.auth_crap.chal, 484 generate_random_buffer(request.data.smbd_auth_crap.chal, 8); 488 request.data.smbd_auth_crap.chal, 495 request.data.smbd_auth_crap.chal,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | ntlmssp.h | 89 DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */ member in struct:ntlmssp_state 123 * from the DATA_BLOB chal on this structure.
|
H A D | rpc_netlogon.h | 911 uint8 chal[16]; member in struct:__anon1621
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | winbindd_pam.c | 161 uchar chal[8]; local 194 generate_random_buffer(chal, 8); 200 server_chal = data_blob_talloc(mem_ctx, chal, 8); 229 chal, 238 chal, 296 global_myname(), chal, 546 state->request.data.auth_crap.chal,
|
H A D | winbindd_nss.h | 176 unsigned char chal[8]; member in struct:winbindd_request::__anon1703::__anon1705
|
H A D | wbinfo.c | 575 generate_random_buffer(request.data.auth_crap.chal, 8); 584 server_chal = data_blob(request.data.auth_crap.chal, 8); 614 && SMBencrypt(pass, request.data.auth_crap.chal, 620 SMBNTencrypt(pass, request.data.auth_crap.chal,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_client/ |
H A D | cli_netlogon.c | 106 DEBUG(4,("cli_net_auth2: srv:%s acct:%s sc:%x mc: %s chal %s neg: %x\n", 183 DEBUG(4,("cli_net_auth3: srv:%s acct:%s sc:%x mc: %s chal %s neg: %x\n", 579 uint8 chal[8]; local 583 generate_random_buffer(chal, 8); 585 SMBencrypt(password, chal, local_lm_response); 586 SMBNTencrypt(password, chal, local_nt_response); 591 username, cli->clnt_name_slash, chal, 642 const uint8 chal[8], 689 username, workstation_name_slash, (const uchar*)chal, 639 cli_netlogon_sam_network_logon(struct cli_state *cli, TALLOC_CTX *mem_ctx, DOM_CRED *ret_creds, const char *username, const char *domain, const char *workstation, const uint8 chal[8], DATA_BLOB lm_response, DATA_BLOB nt_response, NET_USER_INFO_3 *info3) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | ntlmssp.c | 105 static uchar chal[8]; local 106 generate_random_buffer(chal, sizeof(chal)); 108 return chal; 282 data_blob_free(&(*ntlmssp_state)->chal); 430 ntlmssp_state->chal = data_blob_talloc(ntlmssp_state->mem_ctx, cryptkey, 8); 661 ntlmssp_state->chal = data_blob_talloc(ntlmssp_state->mem_ctx, session_nonce_hash, 8); 667 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->set_challenge(ntlmssp_state, &ntlmssp_state->chal))) { 1075 data_blob_free(&ntlmssp_state->chal); 1077 ntlmssp_state->chal [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/ |
H A D | ntlm_auth.c | 178 static DATA_BLOB chal; local 182 chal = data_blob(NULL, 8); 184 generate_random_buffer(chal.data, chal.length); 185 return chal; 335 memcpy(request.data.auth_crap.chal, challenge->data, MIN(challenge->length, 8)); 403 &ntlmssp_state->chal, 441 &ntlmssp_state->chal,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_server/ |
H A D | srv_netlog_nt.c | 684 const uint8 *chal; local 690 chal = auth_context->get_ntlm_challenge(auth_context); 694 nt_workstation, chal,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_parse/ |
H A D | parse_misc.c | 1411 BOOL smb_io_chal(const char *desc, DOM_CHAL *chal, prs_struct *ps, int depth) argument 1413 if (chal == NULL) 1419 if(!prs_uint8s (False, "data", ps, depth, chal->data, 8))
|
H A D | parse_net.c | 2728 if(!prs_uint8s (False, "chal", ps, depth, info->chal, info->chal_len2))
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/linux/ |
H A D | cdrom.h | 621 dvd_challenge chal; member in struct:dvd_host_send_challenge 635 dvd_challenge chal; member in struct:dvd_lu_send_challenge
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/cdrom/ |
H A D | cdrom.c | 1625 copy_chal(ai->lsc.chal, &buf[4]); 1664 copy_chal(&buf[4], ai->hsc.chal);
|