Searched refs:challenge (Results 1 - 25 of 71) sorted by relevance

123

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/l2tpd-0.69/
H A Daaa.h35 struct challenge struct
40 unsigned char *challenge; /* The original challenge */ member in struct:challenge
45 int state; /* What state is challenge in? */
54 extern int handle_challenge (struct tunnel *, struct challenge *);
H A Dfile.h69 int challenge; /* Challenge authenticate the peer? */ member in struct:lns
105 int challenge; /* Challenge authenticate the peer? */ member in struct:lac
H A Daaa.c216 int handle_challenge (struct tunnel *t, struct challenge *chal)
222 log (LOG_DEBUG, "%s: No LNS or LAC to handle challenge!\n",
266 log (LOG_DEBUG, "%s: Here comes the challenge\n", __FUNCTION__);
267 bufferDump (chal->challenge, strlen (chal->challenge));
274 MD5Update (&chal->md5, chal->challenge, strlen(chal->challenge));
283 *((int *) &chal->challenge[0]),
284 *((int *) &chal->challenge[4]),
285 *((int *) &chal->challenge[
[all...]
H A Dl2tp.h148 struct challenge chal_us; /* Their Challenge to us */
149 struct challenge chal_them; /* Our challenge to them */
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/
H A Dchap-md5.c59 unsigned char *challenge, unsigned char *response,
67 challenge_len = *challenge++;
70 /* Generate hash of ID, secret, challenge */
74 MD5_Update(&ctx, challenge, challenge_len);
89 unsigned char *challenge, char *secret, int secret_len,
94 int challenge_len = *challenge++;
99 MD5_Update(&ctx, challenge, challenge_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap-new.h52 * Semi-arbitrary limits on challenge and response fields.
97 * Note: challenge and response arguments below are formatted as
98 * a length byte followed by the actual challenge/response data.
100 void (*generate_challenge)(unsigned char *challenge);
103 unsigned char *challenge, unsigned char *response,
106 unsigned char *challenge, char *secret, int secret_len,
114 /* Hook for a plugin to validate CHAP challenge */
117 unsigned char *challenge, unsigned char *response,
H A Dchap_ms.c150 { "mschap-challenge", o_string, &mschap_challenge,
151 "specify CHAP challenge" },
152 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
153 "specify CHAP peer challenge" },
159 * chapms_generate_challenge - generate a challenge for MS-CHAP.
160 * For MS-CHAP the challenge length is fixed at 8 bytes.
161 * The length goes in challenge[0] and the actual challenge starts
162 * at challenge[1].
165 chapms_generate_challenge(unsigned char *challenge) argument
177 chapms2_generate_challenge(unsigned char *challenge) argument
189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
442 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument
[all...]
H A Dchap-new.c48 /* Hook for a plugin to validate CHAP challenge */
51 unsigned char *challenge, unsigned char *response,
67 { "chap-max-challenge", o_int, &chap_max_transmits,
68 "Set max #xmits for challenge", OPT_PRIO },
85 * These limits apply to challenge and response packets we send.
98 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state
122 unsigned char *challenge, unsigned char *response,
221 * There isn't much to do until we receive a challenge.
246 * chap_timeout - It's time to send another challenge to the peer.
247 * This could be either a retransmission of a previous challenge,
392 chap_verify_response(char *name, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dcredentials.c38 Input: 8 byte challenge block
39 8 byte server challenge block
123 DEBUG(5,(" challenge : %s\n", credstr(cred->data)));
154 if (!cred_assert(&rcv_srv_cred->challenge, sess_key,
155 &sto_clnt_cred->challenge, new_clnt_time))
161 new_cred = IVAL(sto_clnt_cred->challenge.data, 0);
165 SIVAL(sto_clnt_cred->challenge.data, 0, new_cred);
167 DEBUG(5,(" new clnt cred: %s\n", credstr(sto_clnt_cred->challenge.data)));
185 if (!cred_assert(&rcv_clnt_cred->challenge, sess_key,
186 &sto_clnt_cred->challenge, rcv_clnt_cre
[all...]
H A Dntlm_check.c48 DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect challenge size (%lu)\n",
71 DEBUGADD(100,("Given challenge was |\n"));
105 DEBUG(0, ("smb_pwd_check_ntlmv2: incorrect challenge size (%lu)\n",
144 DEBUGADD(100,("Given challenge was |\n"));
157 * Check a challenge-response password against the value of the NT or
161 * @param challenge 8-byte challenge. If all zero, forces plaintext comparison
162 * @param nt_response 'unicode' NT response to the challenge, or unicode password
163 * @param lm_response ASCII or LANMAN response to the challenge, or password in DOS code page
174 const DATA_BLOB *challenge,
173 ntlm_password_check(TALLOC_CTX *mem_ctx, const DATA_BLOB *challenge, const DATA_BLOB *lm_response, const DATA_BLOB *nt_response, const DATA_BLOB *lm_interactive_pwd, const DATA_BLOB *nt_interactive_pwd, const char *username, const char *client_username, const char *client_domain, const uint8 *lm_pw, const uint8 *nt_pw, DATA_BLOB *user_sess_key, DATA_BLOB *lm_sess_key) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/
H A Dntlm_auth_proto.h15 const DATA_BLOB *challenge,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/asn1/
H A Dx_spki.c70 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
H A Dt_spki.c99 chal = spki->spkac->challenge;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dx_spki.c70 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/auth/
H A Dauth_ntlmssp.c27 * Return the challenge as determined by the authentication subsystem
28 * @return an 8 byte random challenge
38 * Some authentication methods 'fix' the challenge, so we may not be able to set it
40 * @return If the effective challenge used by the auth subsystem may be modified
52 * @param challenge The new challenge value
54 static NTSTATUS auth_ntlmssp_set_challenge(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge) argument
59 SMB_ASSERT(challenge->length == 8);
61 auth_context->challenge = data_blob_talloc(auth_context->mem_ctx,
62 challenge
[all...]
H A Dauth.c74 Try to get a challenge out of the various authentication modules.
80 DATA_BLOB challenge = data_blob(NULL, 0); local
85 if (auth_context->challenge.length) {
86 DEBUG(5, ("get_ntlm_challenge (auth subsystem): returning previous challenge by module %s (normal)\n",
88 return auth_context->challenge.data;
95 DEBUG(5, ("auth_get_challenge: module %s did not want to specify a challenge\n", auth_method->name));
99 DEBUG(5, ("auth_get_challenge: getting challenge from module %s\n", auth_method->name));
101 DEBUG(1, ("auth_get_challenge: CONFIGURATION ERROR: authentication method %s has already specified a challenge. Challenge by %s ignored.\n",
111 challenge = auth_method->get_chal(auth_context, &auth_method->private_data, mem_ctx);
112 if (!challenge
[all...]
H A Dauth_builtin.c117 * Return a 'fixed' challenge instead of a variable one.
120 * with a fixed challenge, so as to aid debugging.
125 * just pretenteds to need a specified challenge.
126 * This module removes *all* security from the challenge-response system
141 Get the challenge out of a password server.
148 const char *challenge = "I am a teapot"; local
149 return data_blob(challenge, 8);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/
H A Drdt.h49 * challenge (RealChallenge1 in the RTSP header from the Real/Helix
56 * @param challenge pointer to the RealChallenge1 value provided by the
60 const char *challenge);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/plugins/
H A Dwinbind.c100 unsigned char *challenge,
245 const u_char *challenge,
355 sprintf(challenge_hex + i * 2, "%02X", challenge[i]);
513 unsigned char *challenge,
525 challenge_len = *challenge++;
580 challenge, challenge_len,
585 mppe_set_keys(challenge, session_key);
595 challenge_len, challenge);
610 ChallengeHash(&response[MS_CHAP2_PEER_CHALLENGE], challenge,
629 challenge, use
241 run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) argument
511 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/
H A Dspkac.c91 char *challenge = NULL, *keyfile = NULL; local
131 else if (strcmp(*argv,"-challenge") == 0)
134 challenge= *(++argv);
173 BIO_printf(bio_err," -challenge arg challenge string\n");
202 if(challenge) ASN1_STRING_set(spki->spkac->challenge,
203 challenge, strlen(challenge));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dspkac.c92 char *challenge = NULL, *keyfile = NULL; local
132 else if (strcmp(*argv,"-challenge") == 0)
135 challenge= *(++argv);
174 BIO_printf(bio_err," -challenge arg challenge string\n");
203 if(challenge) ASN1_STRING_set(spki->spkac->challenge,
204 challenge, (int)strlen(challenge));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/ieee80211/softmac/
H A Dieee80211softmac_auth.c120 /* Sends a response to an auth challenge (for shared key auth). */
211 /* Check to make sure we have a challenge IE */
214 printkl(KERN_NOTICE PFX "Shared Key Authentication failed due to a missing challenge.\n");
217 /* Save the challenge */
222 kfree(net->challenge);
223 net->challenge = kmemdup(data, net->challenge_len,
225 if (net->challenge == NULL) {
245 kfree(net->challenge);
246 net->challenge = NULL;
333 if(net->challenge !
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_client/
H A Dcli_netlogon.c28 /* LSA Request Challenge. Sends our challenge to server, then gets
83 encrypt of the server challenge originally received. JRA.
108 credstr(cli->clnt_cred.challenge.data), *neg_flags));
113 sec_chan, global_myname(), &cli->clnt_cred.challenge,
136 * server received challenge.
166 encrypt of the server challenge originally received. JRA.
185 credstr(cli->clnt_cred.challenge.data), *neg_flags));
189 sec_chan, global_myname(), &cli->clnt_cred.challenge,
212 * server received challenge.
252 /* send a client challenge; receiv
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/
H A Dauth.h84 DATA_BLOB challenge; member in struct:auth_context
H A Dntlmssp.h87 DATA_BLOB internal_chal; /* Random challenge as supplied to the client for NTLM authentication */
89 DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */
99 * Callback to get the 'challenge' used for NTLM authentication.
102 * @return 8 bytes of challnege data, determined by the server to be the challenge for NTLM authentication
108 * Callback to find if the challenge used by NTLM authentication may be modified
110 * The NTLM2 authentication scheme modifies the effective challenge, but this is not compatiable with the
114 * @return Can the challenge be set to arbitary values?
120 * Callback to set the 'challenge' used for NTLM authentication.
126 * @param challange 8 bytes of data, agreed by the client and server to be the effective challenge for NTLM2 authentication
129 NTSTATUS (*set_challenge)(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge);
[all...]

Completed in 128 milliseconds

123