Lines Matching refs:challenge

72 	BIGNUM *challenge;
83 if ((challenge = BN_new()) == NULL)
113 /* Otherwise it should have sent a challenge. */
118 packet_get_bignum(challenge);
121 debug("Received RSA challenge from server.");
123 /* Ask the agent to decrypt the challenge. */
125 challenge, session_id, response)) != 0) {
132 "challenge: %s", ssh_err(r));
135 debug("Sending response to RSA challenge.");
137 /* Send the decrypted challenge back to the server. */
164 BN_clear_free(challenge);
169 * Computes the proper response to a RSA challenge, and sends the response to
173 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv)
179 /* Decrypt the challenge using the private key. */
181 if (rsa_private_decrypt(challenge, challenge, prv) != 0)
186 /* The response is MD5 of decrypted challenge plus session id. */
187 len = BN_num_bytes(challenge);
190 "respond_to_rsa_challenge: bad challenge length %d", len);
193 BN_bn2bin(challenge, buf + sizeof(buf) - len);
201 debug("Sending response to host key RSA challenge.");
222 BIGNUM *challenge;
251 /* Otherwise, the server should respond with a challenge. */
255 /* Get the challenge from the packet. */
256 if ((challenge = BN_new()) == NULL)
258 packet_get_bignum(challenge);
261 debug("Received RSA challenge from server.");
316 BN_clear_free(challenge);
320 /* Compute and send a response to the challenge. */
321 respond_to_rsa_challenge(challenge, private->rsa);
327 /* We no longer need the challenge. */
328 BN_clear_free(challenge);
350 BIGNUM *challenge;
372 /* Otherwise, the server should respond with a challenge. */
376 /* Get the challenge from the packet. */
377 if ((challenge = BN_new()) == NULL)
379 packet_get_bignum(challenge);
382 debug("Received RSA challenge for host key from server.");
384 /* Compute a response to the challenge. */
385 respond_to_rsa_challenge(challenge, host_key->rsa);
387 /* We no longer need the challenge. */
388 BN_clear_free(challenge);
403 * Tries to authenticate with any string-based challenge/response system.
412 char *challenge, *response;
414 debug("Doing challenge response authentication.");
417 /* request a challenge */
429 debug("No challenge.");
432 challenge = packet_get_string(&clen);
434 snprintf(prompt, sizeof prompt, "%s%s", challenge,
435 strchr(challenge, '\n') ? "" : "\nResponse: ");
436 free(challenge);
750 /* Try challenge response authentication if the server supports it. */