Home
last modified time | relevance | path

Searched refs:challange (Results 1 – 4 of 4) sorted by relevance

/freebsd/crypto/heimdal/kdc/
H A Ddigest.c801 unsigned char md[SHA_DIGEST_LENGTH], challange[SHA_DIGEST_LENGTH]; in _kdc_do_digest() local
867 EVP_DigestFinal_ex(ctp, challange, NULL); in _kdc_do_digest()
898 challange, &answer); in _kdc_do_digest()
949 EVP_DigestUpdate(ctxp, challange, 8); in _kdc_do_digest()
1062 r.u.ntlmInitReply.challange.data = malloc(8); in _kdc_do_digest()
1063 if (r.u.ntlmInitReply.challange.data == NULL) { in _kdc_do_digest()
1068 r.u.ntlmInitReply.challange.length = 8; in _kdc_do_digest()
1069 if (RAND_bytes(r.u.ntlmInitReply.challange.data, in _kdc_do_digest()
1070 r.u.ntlmInitReply.challange.length) != 1) in _kdc_do_digest()
1105 ret = krb5_storage_write(sp, r.u.ntlmInitReply.challange.data, 8); in _kdc_do_digest()
[all …]
/freebsd/crypto/heimdal/lib/gssapi/ntlm/
H A Dkdc.c254 krb5_data challange; in kdc_type2() local
296 ret = krb5_ntlm_init_get_challange(c->context, c->ntlm, &challange); in kdc_type2()
302 if (challange.length != sizeof(type2.challenge)) { in kdc_type2()
306 memcpy(type2.challenge, challange.data, sizeof(type2.challenge)); in kdc_type2()
307 krb5_data_free(&challange); in kdc_type2()
/freebsd/crypto/heimdal/lib/asn1/
H A Ddigest.asn127 nonce UTF8String, -- service nonce/challange
81 challange [3] OCTET STRING,
/freebsd/crypto/heimdal/lib/krb5/
H A Ddigest.c938 krb5_data *challange) in krb5_ntlm_init_get_challange() argument
942 ret = der_copy_octet_string(&ntlm->initReply.challange, challange); in krb5_ntlm_init_get_challange()