/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | mschap_test.c | 40 u_char challenge[8]; local 41 int challengeInt[sizeof(challenge)]; 55 for (i = 0; i < sizeof(challenge); i++) 56 challenge[i] = (u_char)challengeInt[i]; 59 ChapMS(&cstate, challenge, sizeof(challenge), argv[2], strlen(argv[2])); 66 cstate.chal_len = sizeof(challenge); 67 BCOPY(challenge, cstate.challenge, cstate.chal_len); 81 ChapMSv2(&cstate, cstate.challenge, 16, argv[2], strlen(argv[2]));
|
H A D | chap_ms.c | 117 ChallengeResponse(challenge, pwHash, response) in ChallengeResponse() argument 118 u_char *challenge; /* IN 8 octets */ in ChallengeResponse() 132 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); 133 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); 134 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); 402 ChapMS_NT(cstate->challenge, secret, secret_len, &ckresp); 408 ChapMS_LANMan(cstate->challenge, secret, secret_len, &ckresp); 419 ChallengeHash(peerchallenge, authenticatorchallenge, username, challenge) in ChallengeHash() argument 420 u_char *peerchallenge, *authenticatorchallenge, *challenge; in ChallengeHash() 441 BCOPY(digest, challenge, 8); [all …]
|
H A D | chap.h | 79 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member
|
H A D | chap.c | 652 MD5Update(&mdContext, cstate->challenge, cstate->chal_len); 801 BCOPY(cstate->challenge, outp, chal_len); 860 u_char *ptr = cstate->challenge;
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 70 struct berval *challenge = NULL; in ldap_sasl_cram_md5_bind_s() local 81 …((res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, NULL, serverctrls, clientctrls, &challenge)) in ldap_sasl_cram_md5_bind_s() 85 if (challenge == NULL){ in ldap_sasl_cram_md5_bind_s() 89 LDAPDebug (LDAP_DEBUG_TRACE, "SASL challenge: %s\n", challenge->bv_val, 0, 0); in ldap_sasl_cram_md5_bind_s() 91 hmac_md5((unsigned char *)challenge->bv_val, challenge->bv_len, in ldap_sasl_cram_md5_bind_s() 93 ber_bvfree(challenge); in ldap_sasl_cram_md5_bind_s() 94 challenge = NULL; in ldap_sasl_cram_md5_bind_s() 110 res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, &resp, serverctrls, clientctrls, &challenge); in ldap_sasl_cram_md5_bind_s()
|
H A D | digest_md5.c | 596 const char *challenge, in ldap_digest_md5_encode() argument 609 if (challenge == NULL || username == NULL || passwd == NULL) { in ldap_digest_md5_encode() 615 ret = digest_parse(challenge, 0, &attrs); in ldap_digest_md5_encode() 633 outlen = strlen(challenge) + DIGEST_CLIENT_EXTRA + 1; in ldap_digest_md5_encode() 665 struct berval *challenge = NULL; in ldap_x_sasl_digest_md5_bind_s() local 681 NULL, serverctrls, clientctrls, &challenge); in ldap_x_sasl_digest_md5_bind_s() 684 if (challenge != NULL) { in ldap_x_sasl_digest_md5_bind_s() 687 challenge->bv_val, 0, 0); in ldap_x_sasl_digest_md5_bind_s() 688 errnum = ldap_digest_md5_encode(challenge->bv_val, in ldap_x_sasl_digest_md5_bind_s() 690 ber_bvfree(challenge); in ldap_x_sasl_digest_md5_bind_s() [all …]
|
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_auth.c | 175 unsigned char *challenge, /* NTLM_CHAL_SZ */ in smb_auth_lm_response() argument 189 challenge, NTLM_CHAL_SZ)); in smb_auth_lm_response() 232 unsigned char *challenge, /* NTLM_CHAL_SZ */ in smb_auth_ntlm_response() argument 240 S21, 21, challenge, NTLM_CHAL_SZ) == SMBAUTH_FAILURE) in smb_auth_ntlm_response() 337 unsigned char *challenge, in smb_lm_password_ok() argument 344 rc = smb_auth_lm_response(lm_hash, challenge, ok_resp); in smb_lm_password_ok() 353 unsigned char *challenge, in smb_ntlm_password_ok() argument 362 rc = smb_auth_ntlm_response(ntlm_hash, challenge, ok_resp); in smb_ntlm_password_ok() 377 unsigned char *challenge, in smb_ntlmv2_password_ok() argument 430 if (smb_auth_v2_response(ntlmv2_hash, challenge, in smb_ntlmv2_password_ok() [all …]
|
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | radius_auth.c | 51 uint8_t *challenge, 61 uint8_t *challenge, in radius_chap_validate() argument 95 challenge, in radius_chap_validate() 160 uint8_t *challenge, in set_radius_attrs() argument 177 bcopy(challenge, in set_radius_attrs()
|
H A D | chap.c | 35 uint8_t *challenge, in chap_validate_tgt() argument 54 challenge, in chap_validate_tgt()
|
H A D | radius_auth.h | 61 uint8_t *challenge,
|
H A D | chap.h | 86 uint8_t *challenge,
|
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/ |
H A D | iscsit_radiusauth.c | 47 uint8_t *challenge, 57 uint8_t *challenge, in iscsit_radius_chap_validate() argument 91 challenge, in iscsit_radius_chap_validate() 159 uint8_t *challenge, in set_radius_attrs() argument 176 bcopy(challenge, in set_radius_attrs()
|
H A D | radius_auth.h | 58 uint8_t *challenge,
|
/illumos-gate/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 108 char *challenge; member 114 const char *challenge __attribute__((unused)), in crammd5_server_mech_new() argument 221 text->challenge = sparams->utils->malloc(200 + 1); in crammd5_server_mech_step1() 222 if (text->challenge == NULL) { in crammd5_server_mech_step1() 228 snprintf(text->challenge, 200, "<%s.%s@%s>", randdigits, time, in crammd5_server_mech_step1() 231 *serverout = text->challenge; in crammd5_server_mech_step1() 232 *serveroutlen = strlen(text->challenge); in crammd5_server_mech_step1() 370 (const unsigned char *) text->challenge, in crammd5_server_mech_step2() 371 strlen(text->challenge)); in crammd5_server_mech_step2() 475 if (text->challenge) _plug_free_string(utils,&(text->challenge)); in crammd5_server_mech_dispose()
|
/illumos-gate/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 510 const char *challenge, const char *promptstr, argument 540 challenge, promptstr, NULL, result, NULL); 642 (prompts)->challenge = convert_prompt(utils, h, 645 (prompts)->challenge = "Authorization Name"; 656 (prompts)->challenge = convert_prompt(utils, h, 659 (prompts)->challenge = "Authentication Name"; 670 (prompts)->challenge = convert_prompt(utils, h, gettext("Password")); 672 (prompts)->challenge = "Password"; 682 (prompts)->challenge = echo_chal; 691 (prompts)->challenge = realm_chal; [all …]
|
/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | sasl.h | 569 const char *challenge, 839 const char *challenge; /* presented to user (e.g. OTP challenge) */ member 1099 const char *challenge, unsigned challen,
|
H A D | plugin_common.h | 174 const char *challenge, const char *promptstr,
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 264 const char *challenge, in _sasl_auxprop_verify_apop() argument 281 if (!conn || !userstr || !challenge || !response) in _sasl_auxprop_verify_apop() 310 _sasl_MD5Update(&ctx, challenge, strlen(challenge)); in _sasl_auxprop_verify_apop()
|
/illumos-gate/usr/src/test/libmlrpc-tests/cfg/ |
H A D | samlogon.config | 29 export CHALLENGE_FILE=/path/to/challenge.bin
|
/illumos-gate/usr/src/cmd/ldap/common/ |
H A D | ldaptool-sasl.c | 149 if (interact->challenge) 150 fprintf(stderr, gettext("Challenge:%s\n"), interact->challenge);
|
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_input.c | 615 uint8_t *challenge; in ieee80211_auth_shared() local 630 challenge = NULL; in ieee80211_auth_shared() 645 challenge = frm; in ieee80211_auth_shared() 651 if (challenge == NULL) { in ieee80211_auth_shared() 656 if (challenge[1] != IEEE80211_CHALLENGE_LEN) { in ieee80211_auth_shared() 659 challenge[1]); in ieee80211_auth_shared() 693 bcopy(&challenge[2], in->in_challenge, challenge[1]); in ieee80211_auth_shared()
|
/illumos-gate/usr/src/uts/common/sys/iscsit/ |
H A D | chap.h | 84 uint8_t *challenge,
|
/illumos-gate/usr/src/cmd/bhyve/common/ |
H A D | rfb.c | 344 unsigned char challenge[RFBP_SECURITY_VNC_AUTH_LEN]; in rfb_handshake_auth() local 371 arc4random_buf(challenge, sizeof (challenge)); in rfb_handshake_auth() 374 if (stream_write(c->rc_fd, challenge, RFBP_SECURITY_VNC_AUTH_LEN) in rfb_handshake_auth() 388 memcpy(crypt_expected, challenge, RFBP_SECURITY_VNC_AUTH_LEN); in rfb_handshake_auth() 392 DES_ecb_encrypt((const_DES_cblock *)challenge, in rfb_handshake_auth() 395 (const_DES_cblock *)(challenge + RFBP_SECURITY_VNC_PASSWD_LEN), in rfb_handshake_auth()
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | netr_auth.c | 649 netr_gen_credentials(BYTE *session_key, netr_cred_t *challenge, in netr_gen_credentials() argument 658 p = (DWORD *)(uintptr_t)challenge; in netr_gen_credentials()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | preauth.c | 398 char *challenge = sc->sam_challenge.data; in handle_sam_labels() local 449 strncpy(p, challenge, challenge_len); p += challenge_len; in handle_sam_labels()
|