/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/l2tpd-0.69/ |
H A D | aaa.h | 35 struct challenge struct 40 unsigned char *challenge; /* The original challenge */ member in struct:challenge 45 int state; /* What state is challenge in? */ 54 extern int handle_challenge (struct tunnel *, struct challenge *);
|
H A D | file.h | 69 int challenge; /* Challenge authenticate the peer? */ member in struct:lns 105 int challenge; /* Challenge authenticate the peer? */ member in struct:lac
|
H A D | aaa.c | 216 int handle_challenge (struct tunnel *t, struct challenge *chal) 222 log (LOG_DEBUG, "%s: No LNS or LAC to handle challenge!\n", 266 log (LOG_DEBUG, "%s: Here comes the challenge\n", __FUNCTION__); 267 bufferDump (chal->challenge, strlen (chal->challenge)); 274 MD5Update (&chal->md5, chal->challenge, strlen(chal->challenge)); 283 *((int *) &chal->challenge[0]), 284 *((int *) &chal->challenge[4]), 285 *((int *) &chal->challenge[ [all...] |
H A D | l2tp.h | 148 struct challenge chal_us; /* Their Challenge to us */ 149 struct challenge chal_them; /* Our challenge to them */
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap-md5.c | 59 unsigned char *challenge, unsigned char *response, 67 challenge_len = *challenge++; 70 /* Generate hash of ID, secret, challenge */ 74 MD5_Update(&ctx, challenge, challenge_len); 89 unsigned char *challenge, char *secret, int secret_len, 94 int challenge_len = *challenge++; 99 MD5_Update(&ctx, challenge, challenge_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.h | 52 * Semi-arbitrary limits on challenge and response fields. 97 * Note: challenge and response arguments below are formatted as 98 * a length byte followed by the actual challenge/response data. 100 void (*generate_challenge)(unsigned char *challenge); 103 unsigned char *challenge, unsigned char *response, 106 unsigned char *challenge, char *secret, int secret_len, 114 /* Hook for a plugin to validate CHAP challenge */ 117 unsigned char *challenge, unsigned char *response,
|
H A D | chap_ms.c | 150 { "mschap-challenge", o_string, &mschap_challenge, 151 "specify CHAP challenge" }, 152 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 153 "specify CHAP peer challenge" }, 159 * chapms_generate_challenge - generate a challenge for MS-CHAP. 160 * For MS-CHAP the challenge length is fixed at 8 bytes. 161 * The length goes in challenge[0] and the actual challenge starts 162 * at challenge[1]. 165 chapms_generate_challenge(unsigned char *challenge) argument 177 chapms2_generate_challenge(unsigned char *challenge) argument 189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 442 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument [all...] |
H A D | chap-new.c | 48 /* Hook for a plugin to validate CHAP challenge */ 51 unsigned char *challenge, unsigned char *response, 67 { "chap-max-challenge", o_int, &chap_max_transmits, 68 "Set max #xmits for challenge", OPT_PRIO }, 85 * These limits apply to challenge and response packets we send. 98 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state 122 unsigned char *challenge, unsigned char *response, 221 * There isn't much to do until we receive a challenge. 246 * chap_timeout - It's time to send another challenge to the peer. 247 * This could be either a retransmission of a previous challenge, 392 chap_verify_response(char *name, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | credentials.c | 38 Input: 8 byte challenge block 39 8 byte server challenge block 123 DEBUG(5,(" challenge : %s\n", credstr(cred->data))); 154 if (!cred_assert(&rcv_srv_cred->challenge, sess_key, 155 &sto_clnt_cred->challenge, new_clnt_time)) 161 new_cred = IVAL(sto_clnt_cred->challenge.data, 0); 165 SIVAL(sto_clnt_cred->challenge.data, 0, new_cred); 167 DEBUG(5,(" new clnt cred: %s\n", credstr(sto_clnt_cred->challenge.data))); 185 if (!cred_assert(&rcv_clnt_cred->challenge, sess_key, 186 &sto_clnt_cred->challenge, rcv_clnt_cre [all...] |
H A D | ntlm_check.c | 48 DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect challenge size (%lu)\n", 71 DEBUGADD(100,("Given challenge was |\n")); 105 DEBUG(0, ("smb_pwd_check_ntlmv2: incorrect challenge size (%lu)\n", 144 DEBUGADD(100,("Given challenge was |\n")); 157 * Check a challenge-response password against the value of the NT or 161 * @param challenge 8-byte challenge. If all zero, forces plaintext comparison 162 * @param nt_response 'unicode' NT response to the challenge, or unicode password 163 * @param lm_response ASCII or LANMAN response to the challenge, or password in DOS code page 174 const DATA_BLOB *challenge, 173 ntlm_password_check(TALLOC_CTX *mem_ctx, const DATA_BLOB *challenge, const DATA_BLOB *lm_response, const DATA_BLOB *nt_response, const DATA_BLOB *lm_interactive_pwd, const DATA_BLOB *nt_interactive_pwd, const char *username, const char *client_username, const char *client_domain, const uint8 *lm_pw, const uint8 *nt_pw, DATA_BLOB *user_sess_key, DATA_BLOB *lm_sess_key) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/ |
H A D | ntlm_auth_proto.h | 15 const DATA_BLOB *challenge,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/asn1/ |
H A D | x_spki.c | 70 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
|
H A D | t_spki.c | 99 chal = spki->spkac->challenge;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | x_spki.c | 70 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/auth/ |
H A D | auth_ntlmssp.c | 27 * Return the challenge as determined by the authentication subsystem 28 * @return an 8 byte random challenge 38 * Some authentication methods 'fix' the challenge, so we may not be able to set it 40 * @return If the effective challenge used by the auth subsystem may be modified 52 * @param challenge The new challenge value 54 static NTSTATUS auth_ntlmssp_set_challenge(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge) argument 59 SMB_ASSERT(challenge->length == 8); 61 auth_context->challenge = data_blob_talloc(auth_context->mem_ctx, 62 challenge [all...] |
H A D | auth.c | 74 Try to get a challenge out of the various authentication modules. 80 DATA_BLOB challenge = data_blob(NULL, 0); local 85 if (auth_context->challenge.length) { 86 DEBUG(5, ("get_ntlm_challenge (auth subsystem): returning previous challenge by module %s (normal)\n", 88 return auth_context->challenge.data; 95 DEBUG(5, ("auth_get_challenge: module %s did not want to specify a challenge\n", auth_method->name)); 99 DEBUG(5, ("auth_get_challenge: getting challenge from module %s\n", auth_method->name)); 101 DEBUG(1, ("auth_get_challenge: CONFIGURATION ERROR: authentication method %s has already specified a challenge. Challenge by %s ignored.\n", 111 challenge = auth_method->get_chal(auth_context, &auth_method->private_data, mem_ctx); 112 if (!challenge [all...] |
H A D | auth_builtin.c | 117 * Return a 'fixed' challenge instead of a variable one. 120 * with a fixed challenge, so as to aid debugging. 125 * just pretenteds to need a specified challenge. 126 * This module removes *all* security from the challenge-response system 141 Get the challenge out of a password server. 148 const char *challenge = "I am a teapot"; local 149 return data_blob(challenge, 8);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/ |
H A D | rdt.h | 49 * challenge (RealChallenge1 in the RTSP header from the Real/Helix 56 * @param challenge pointer to the RealChallenge1 value provided by the 60 const char *challenge);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/plugins/ |
H A D | winbind.c | 100 unsigned char *challenge, 245 const u_char *challenge, 355 sprintf(challenge_hex + i * 2, "%02X", challenge[i]); 513 unsigned char *challenge, 525 challenge_len = *challenge++; 580 challenge, challenge_len, 585 mppe_set_keys(challenge, session_key); 595 challenge_len, challenge); 610 ChallengeHash(&response[MS_CHAP2_PEER_CHALLENGE], challenge, 629 challenge, use 241 run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) argument 511 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/ |
H A D | spkac.c | 91 char *challenge = NULL, *keyfile = NULL; local 131 else if (strcmp(*argv,"-challenge") == 0) 134 challenge= *(++argv); 173 BIO_printf(bio_err," -challenge arg challenge string\n"); 202 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 203 challenge, strlen(challenge));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 132 else if (strcmp(*argv,"-challenge") == 0) 135 challenge= *(++argv); 174 BIO_printf(bio_err," -challenge arg challenge string\n"); 203 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 204 challenge, (int)strlen(challenge));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/ieee80211/softmac/ |
H A D | ieee80211softmac_auth.c | 120 /* Sends a response to an auth challenge (for shared key auth). */ 211 /* Check to make sure we have a challenge IE */ 214 printkl(KERN_NOTICE PFX "Shared Key Authentication failed due to a missing challenge.\n"); 217 /* Save the challenge */ 222 kfree(net->challenge); 223 net->challenge = kmemdup(data, net->challenge_len, 225 if (net->challenge == NULL) { 245 kfree(net->challenge); 246 net->challenge = NULL; 333 if(net->challenge ! [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_client/ |
H A D | cli_netlogon.c | 28 /* LSA Request Challenge. Sends our challenge to server, then gets 83 encrypt of the server challenge originally received. JRA. 108 credstr(cli->clnt_cred.challenge.data), *neg_flags)); 113 sec_chan, global_myname(), &cli->clnt_cred.challenge, 136 * server received challenge. 166 encrypt of the server challenge originally received. JRA. 185 credstr(cli->clnt_cred.challenge.data), *neg_flags)); 189 sec_chan, global_myname(), &cli->clnt_cred.challenge, 212 * server received challenge. 252 /* send a client challenge; receiv [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | auth.h | 84 DATA_BLOB challenge; member in struct:auth_context
|
H A D | ntlmssp.h | 87 DATA_BLOB internal_chal; /* Random challenge as supplied to the client for NTLM authentication */ 89 DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */ 99 * Callback to get the 'challenge' used for NTLM authentication. 102 * @return 8 bytes of challnege data, determined by the server to be the challenge for NTLM authentication 108 * Callback to find if the challenge used by NTLM authentication may be modified 110 * The NTLM2 authentication scheme modifies the effective challenge, but this is not compatiable with the 114 * @return Can the challenge be set to arbitary values? 120 * Callback to set the 'challenge' used for NTLM authentication. 126 * @param challange 8 bytes of data, agreed by the client and server to be the effective challenge for NTLM2 authentication 129 NTSTATUS (*set_challenge)(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge); [all...] |