Searched refs:challenge (Results 1 - 5 of 5) sorted by relevance

/haiku/src/libs/libtelnet/
H A Dkerberos.c91 static Block challenge = { 0 }; variable
200 * the challenge, and verify it when the response comes back.
208 DES_ecb_encrypt(&session_key, &challenge, sched, 0);
210 * Increment the challenge by 1, and encrypt it for
215 x = (unsigned int)challenge[i] + 1;
216 challenge[i] = x; /* ignore overflow */
220 DES_ecb_encrypt(&challenge, &challenge, sched, 1);
300 * Take the received encrypted challenge, and encrypt
310 * Now decrypt the received encrypted challenge,
[all...]
H A Dkrb4encpwd.c111 static char challenge[REALM_SZ]; variable
214 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) {
236 * Take the received random challenge text and save
239 memmove((void *)challenge, (void *)data, sizeof(Block));
245 * Receive ack, if mutual then send random challenge
250 * the challenge, and verify it when the response comes back.
257 sprintf(challenge, "%x", now);
258 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge));
300 * Verify that the response to the challenge i
[all...]
H A Drsaencpwd.c106 static char challenge[CHAL_SZ]; variable
222 r = accept_rsa_encpwd(&auth, key, challenge,
248 * the challenge, and verify it when the response comes back.
256 sprintf(challenge, "%x", now);
257 challenge_len = strlen(challenge);
259 strcpy(challenge, "randchal");
290 memmove(ptr, challenge, challenge_len);
338 * Verify that the response to the challenge is correct.
350 memmove(challenge, ptr, challenge_len);
362 Challenge = challenge;
[all...]
/haiku/src/libs/compat/freebsd_wlan/net80211/
H A Dieee80211_hostap.c849 * Only shared key auth frames with a challenge
923 * Clear any challenge text that may be there if
993 uint8_t *challenge; local
1028 challenge = NULL;
1040 challenge = frm;
1046 if (challenge == NULL) {
1049 "%s", "no challenge");
1054 if (challenge[1] != IEEE80211_CHALLENGE_LEN) {
1057 "bad challenge len %d", challenge[
[all...]
H A Dieee80211_sta.c931 * Only shared key auth frames with a challenge
1024 uint8_t *challenge; local
1054 challenge = NULL;
1065 challenge = frm;
1071 if (challenge == NULL) {
1074 "%s", "no challenge");
1078 if (challenge[1] != IEEE80211_CHALLENGE_LEN) {
1081 "bad challenge len %d", challenge[1]);
1109 /* XXX could optimize by passing recvd challenge */
[all...]

Completed in 38 milliseconds