Lines Matching full:challenge
78 #define KRB_CHALLENGE 3 /* Challenge for mutual auth. */
87 static Block challenge = { 0 }; variable
196 * the challenge, and verify it when the response comes back. in kerberos4_send()
204 DES_ecb_encrypt(&session_key, &challenge, sched, 0); in kerberos4_send()
206 * Increment the challenge by 1, and encrypt it for in kerberos4_send()
211 x = (unsigned int)challenge[i] + 1; in kerberos4_send()
212 challenge[i] = x; /* ignore overflow */ in kerberos4_send()
216 DES_ecb_encrypt(&challenge, &challenge, sched, 1); in kerberos4_send()
296 * Take the received encrypted challenge, and encrypt in kerberos4_is()
306 * Now decrypt the received encrypted challenge, in kerberos4_is()
309 DES_ecb_encrypt(&datablock, &challenge, sched, 0); in kerberos4_is()
312 t = (unsigned int)challenge[r] + 1; in kerberos4_is()
313 challenge[r] = t; /* ignore overflow */ in kerberos4_is()
317 DES_ecb_encrypt(&challenge, &challenge, sched, 1); in kerberos4_is()
318 Data(ap, KRB_RESPONSE, challenge, sizeof(challenge)); in kerberos4_is()
352 * Send over the encrypted challenge. in kerberos4_reply()
372 * Verify that the response to the challenge is correct. in kerberos4_reply()
375 (0 != memcmp((void *)data, (void *)challenge, in kerberos4_reply()
376 sizeof(challenge)))) in kerberos4_reply()
379 printf("[ Kerberos V4 challenge failed!!! ]\r\n"); in kerberos4_reply()
384 printf("[ Kerberos V4 challenge successful ]\r\n"); in kerberos4_reply()
443 strncpy((char *)buf, " CHALLENGE", buflen); in kerberos4_printsub()