Searched refs:challenge (Results 1 - 5 of 5) sorted by relevance
/haiku/src/libs/libtelnet/ |
H A D | kerberos.c | 91 static Block challenge = { 0 }; variable 200 * the challenge, and verify it when the response comes back. 208 DES_ecb_encrypt(&session_key, &challenge, sched, 0); 210 * Increment the challenge by 1, and encrypt it for 215 x = (unsigned int)challenge[i] + 1; 216 challenge[i] = x; /* ignore overflow */ 220 DES_ecb_encrypt(&challenge, &challenge, sched, 1); 300 * Take the received encrypted challenge, and encrypt 310 * Now decrypt the received encrypted challenge, [all...] |
H A D | krb4encpwd.c | 111 static char challenge[REALM_SZ]; variable 214 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) { 236 * Take the received random challenge text and save 239 memmove((void *)challenge, (void *)data, sizeof(Block)); 245 * Receive ack, if mutual then send random challenge 250 * the challenge, and verify it when the response comes back. 257 sprintf(challenge, "%x", now); 258 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge)); 300 * Verify that the response to the challenge i [all...] |
H A D | rsaencpwd.c | 106 static char challenge[CHAL_SZ]; variable 222 r = accept_rsa_encpwd(&auth, key, challenge, 248 * the challenge, and verify it when the response comes back. 256 sprintf(challenge, "%x", now); 257 challenge_len = strlen(challenge); 259 strcpy(challenge, "randchal"); 290 memmove(ptr, challenge, challenge_len); 338 * Verify that the response to the challenge is correct. 350 memmove(challenge, ptr, challenge_len); 362 Challenge = challenge; [all...] |
/haiku/src/libs/compat/freebsd_wlan/net80211/ |
H A D | ieee80211_hostap.c | 849 * Only shared key auth frames with a challenge 923 * Clear any challenge text that may be there if 993 uint8_t *challenge; local 1028 challenge = NULL; 1040 challenge = frm; 1046 if (challenge == NULL) { 1049 "%s", "no challenge"); 1054 if (challenge[1] != IEEE80211_CHALLENGE_LEN) { 1057 "bad challenge len %d", challenge[ [all...] |
H A D | ieee80211_sta.c | 931 * Only shared key auth frames with a challenge 1024 uint8_t *challenge; local 1054 challenge = NULL; 1065 challenge = frm; 1071 if (challenge == NULL) { 1074 "%s", "no challenge"); 1078 if (challenge[1] != IEEE80211_CHALLENGE_LEN) { 1081 "bad challenge len %d", challenge[1]); 1109 /* XXX could optimize by passing recvd challenge */ [all...] |
Completed in 38 milliseconds