/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | chap-md5.c | 63 const unsigned char *challenge, const unsigned char *response, 72 challenge_len = *challenge++; 75 /* Generate hash of ID, secret, challenge */ 80 lwip_md5_update(&ctx, challenge, challenge_len); 96 const unsigned char *challenge, const char *secret, int secret_len, 100 int challenge_len = *challenge++; 109 lwip_md5_update(&ctx, challenge, challenge_len); 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
|
H A D | chap_ms.c | 209 { "mschap-challenge", o_string, &mschap_challenge, 210 "specify CHAP challenge" }, 211 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 212 "specify CHAP peer challenge" }, 220 * chapms_generate_challenge - generate a challenge for MS-CHAP. 221 * For MS-CHAP the challenge length is fixed at 8 bytes. 222 * The length goes in challenge[0] and the actual challenge starts 223 * at challenge[1]. 225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { argument 237 chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) argument 249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument 385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument 496 ChallengeResponse(const u_char *challenge, const u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument [all...] |
H A D | chap-new.c | 53 /* Hook for a plugin to validate CHAP challenge */ 56 const unsigned char *challenge, const unsigned char *response, 67 { "chap-max-challenge", o_int, &pcb->settings.chap_max_transmits, 68 "Set max #xmits for challenge", OPT_PRIO }, 97 const unsigned char *challenge, const unsigned char *response, 191 * There isn't much to do until we receive a challenge. 219 * chap_timeout - It's time to send another challenge to the peer. 220 * This could be either a retransmission of a previous challenge, 221 * or a new challenge to start re-authentication. 246 MEMCPY(p->payload, pcb->chap_server.challenge, pc 411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument [all...] |
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | chap-md5.c | 63 const unsigned char *challenge, const unsigned char *response, 72 challenge_len = *challenge++; 75 /* Generate hash of ID, secret, challenge */ 80 lwip_md5_update(&ctx, challenge, challenge_len); 96 const unsigned char *challenge, const char *secret, int secret_len, 100 int challenge_len = *challenge++; 109 lwip_md5_update(&ctx, challenge, challenge_len); 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
|
H A D | chap-new.h | 62 * Semi-arbitrary limits on challenge and response fields. 68 * These limits apply to challenge and response packets we send. 132 * Note: challenge and response arguments below are formatted as 133 * a length byte followed by the actual challenge/response data. 135 void (*generate_challenge)(ppp_pcb *pcb, unsigned char *challenge); 138 const unsigned char *challenge, const unsigned char *response, 142 const unsigned char *challenge, const char *secret, int secret_len, 167 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state 173 /* Hook for a plugin to validate CHAP challenge */ 176 unsigned char *challenge, unsigne [all...] |
H A D | chap_ms.c | 209 { "mschap-challenge", o_string, &mschap_challenge, 210 "specify CHAP challenge" }, 211 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 212 "specify CHAP peer challenge" }, 220 * chapms_generate_challenge - generate a challenge for MS-CHAP. 221 * For MS-CHAP the challenge length is fixed at 8 bytes. 222 * The length goes in challenge[0] and the actual challenge starts 223 * at challenge[1]. 225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { argument 237 chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) argument 249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument 374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument 385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument 496 ChallengeResponse(const u_char *challenge, const u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument [all...] |
H A D | chap-new.c | 53 /* Hook for a plugin to validate CHAP challenge */ 56 const unsigned char *challenge, const unsigned char *response, 67 { "chap-max-challenge", o_int, &pcb->settings.chap_max_transmits, 68 "Set max #xmits for challenge", OPT_PRIO }, 97 const unsigned char *challenge, const unsigned char *response, 191 * There isn't much to do until we receive a challenge. 219 * chap_timeout - It's time to send another challenge to the peer. 220 * This could be either a retransmission of a previous challenge, 221 * or a new challenge to start re-authentication. 246 MEMCPY(p->payload, pcb->chap_server.challenge, pc 411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | x_spki.c | 70 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
|
H A D | t_spki.c | 90 chal = spki->spkac->challenge;
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 132 else if (strcmp(*argv,"-challenge") == 0) 135 challenge= *(++argv); 174 BIO_printf(bio_err," -challenge arg challenge string\n"); 203 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 204 challenge, (int)strlen(challenge));
|
/barrelfish-master/lib/openssl-1.0.0d/demos/ |
H A D | spkigen.c | 61 /* lets make the spki and set the public key and challenge */ 66 fprintf(stderr,"please enter challenge string:"); 72 if (!ASN1_STRING_set((ASN1_STRING *)spki->spkac->challenge,
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | ssl2.h | 198 unsigned char challenge[SSL2_MAX_CHALLENGE_LENGTH]; member in struct:ssl2_state_st
|
H A D | s2_lib.c | 493 EVP_DigestUpdate(&ctx,s->s2->challenge,s->s2->challenge_length);
|
H A D | s2_srvr.c | 683 /* challenge */ 684 if (s->s2->challenge_length > sizeof s->s2->challenge) 690 memcpy(s->s2->challenge,p,(unsigned int)s->s2->challenge_length); 878 if (s->s2->challenge_length > sizeof s->s2->challenge) 883 memcpy(p,s->s2->challenge,(unsigned int)s->s2->challenge_length);
|
H A D | s2_clnt.c | 596 s2n(SSL2_CHALLENGE_LENGTH,p); /* challenge length */ 597 /*challenge id data*/ 598 if (RAND_pseudo_bytes(s->s2->challenge,SSL2_CHALLENGE_LENGTH) <= 0) 600 memcpy(d,s->s2->challenge,SSL2_CHALLENGE_LENGTH); 940 if (memcmp(p,s->s2->challenge,s->s2->challenge_length) != 0)
|
H A D | s23_clnt.c | 389 /* write out sslv2 challenge */ 569 /* write out sslv2 challenge */ 577 memcpy(s->s2->challenge,
|
/barrelfish-master/include/openssl/ |
H A D | ssl2.h | 198 unsigned char challenge[SSL2_MAX_CHALLENGE_LENGTH]; member in struct:ssl2_state_st
|
H A D | x509.h | 534 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member in struct:Netscape_spkac_st 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509.h | 534 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member in struct:Netscape_spkac_st 539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
|
/barrelfish-master/doc/017-arm/ |
H A D | ARM.tex | 643 code reuse across different platforms a challenge.
|
/barrelfish-master/usr/eclipseclp/documents/tutorial/ |
H A D | hybrid.tex | 653 The challenge is to find a combination of {\tt ic} and {\tt eplex}
|
/barrelfish-master/usr/eclipseclp/documents/intro_paper/ |
H A D | eclipse.tex | 700 recent challenge within the MIP community. 842 tough challenge to reduce this time from hours to minutes!
|
/barrelfish-master/lib/tommath/ |
H A D | tommath.tex | 3593 & $512 \ldots 4096$ bits significantly ($> 2x$) to complete this challenge. \\
|