Searched refs:challange (Results 1 – 4 of 4) sorted by relevance
/freebsd/crypto/heimdal/kdc/ |
H A D | digest.c | 801 unsigned char md[SHA_DIGEST_LENGTH], challange[SHA_DIGEST_LENGTH]; in _kdc_do_digest() local 867 EVP_DigestFinal_ex(ctp, challange, NULL); in _kdc_do_digest() 898 challange, &answer); in _kdc_do_digest() 949 EVP_DigestUpdate(ctxp, challange, 8); in _kdc_do_digest() 1062 r.u.ntlmInitReply.challange.data = malloc(8); in _kdc_do_digest() 1063 if (r.u.ntlmInitReply.challange.data == NULL) { in _kdc_do_digest() 1068 r.u.ntlmInitReply.challange.length = 8; in _kdc_do_digest() 1069 if (RAND_bytes(r.u.ntlmInitReply.challange.data, in _kdc_do_digest() 1070 r.u.ntlmInitReply.challange.length) != 1) in _kdc_do_digest() 1105 ret = krb5_storage_write(sp, r.u.ntlmInitReply.challange.data, 8); in _kdc_do_digest() [all …]
|
/freebsd/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | kdc.c | 254 krb5_data challange; in kdc_type2() local 296 ret = krb5_ntlm_init_get_challange(c->context, c->ntlm, &challange); in kdc_type2() 302 if (challange.length != sizeof(type2.challenge)) { in kdc_type2() 306 memcpy(type2.challenge, challange.data, sizeof(type2.challenge)); in kdc_type2() 307 krb5_data_free(&challange); in kdc_type2()
|
/freebsd/crypto/heimdal/lib/asn1/ |
H A D | digest.asn1 | 27 nonce UTF8String, -- service nonce/challange 81 challange [3] OCTET STRING,
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | digest.c | 938 krb5_data *challange) in krb5_ntlm_init_get_challange() argument 942 ret = der_copy_octet_string(&ntlm->initReply.challange, challange); in krb5_ntlm_init_get_challange()
|