Searched refs:challenge (Results 1 - 23 of 23) sorted by relevance

/barrelfish-master/lib/lwip2/src/netif/ppp/
H A Dchap-md5.c63 const unsigned char *challenge, const unsigned char *response,
72 challenge_len = *challenge++;
75 /* Generate hash of ID, secret, challenge */
80 lwip_md5_update(&ctx, challenge, challenge_len);
96 const unsigned char *challenge, const char *secret, int secret_len,
100 int challenge_len = *challenge++;
109 lwip_md5_update(&ctx, challenge, challenge_len);
61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
H A Dchap_ms.c209 { "mschap-challenge", o_string, &mschap_challenge,
210 "specify CHAP challenge" },
211 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
212 "specify CHAP peer challenge" },
220 * chapms_generate_challenge - generate a challenge for MS-CHAP.
221 * For MS-CHAP the challenge length is fixed at 8 bytes.
222 * The length goes in challenge[0] and the actual challenge starts
223 * at challenge[1].
225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { argument
237 chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) argument
249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
496 ChallengeResponse(const u_char *challenge, const u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument
[all...]
H A Dchap-new.c53 /* Hook for a plugin to validate CHAP challenge */
56 const unsigned char *challenge, const unsigned char *response,
67 { "chap-max-challenge", o_int, &pcb->settings.chap_max_transmits,
68 "Set max #xmits for challenge", OPT_PRIO },
97 const unsigned char *challenge, const unsigned char *response,
191 * There isn't much to do until we receive a challenge.
219 * chap_timeout - It's time to send another challenge to the peer.
220 * This could be either a retransmission of a previous challenge,
221 * or a new challenge to start re-authentication.
246 MEMCPY(p->payload, pcb->chap_server.challenge, pc
411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
[all...]
/barrelfish-master/include/lwip2/netif/ppp/
H A Dchap-md5.c63 const unsigned char *challenge, const unsigned char *response,
72 challenge_len = *challenge++;
75 /* Generate hash of ID, secret, challenge */
80 lwip_md5_update(&ctx, challenge, challenge_len);
96 const unsigned char *challenge, const char *secret, int secret_len,
100 int challenge_len = *challenge++;
109 lwip_md5_update(&ctx, challenge, challenge_len);
61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
H A Dchap-new.h62 * Semi-arbitrary limits on challenge and response fields.
68 * These limits apply to challenge and response packets we send.
132 * Note: challenge and response arguments below are formatted as
133 * a length byte followed by the actual challenge/response data.
135 void (*generate_challenge)(ppp_pcb *pcb, unsigned char *challenge);
138 const unsigned char *challenge, const unsigned char *response,
142 const unsigned char *challenge, const char *secret, int secret_len,
167 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state
173 /* Hook for a plugin to validate CHAP challenge */
176 unsigned char *challenge, unsigne
[all...]
H A Dchap_ms.c209 { "mschap-challenge", o_string, &mschap_challenge,
210 "specify CHAP challenge" },
211 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
212 "specify CHAP peer challenge" },
220 * chapms_generate_challenge - generate a challenge for MS-CHAP.
221 * For MS-CHAP the challenge length is fixed at 8 bytes.
222 * The length goes in challenge[0] and the actual challenge starts
223 * at challenge[1].
225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { argument
237 chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) argument
249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) argument
496 ChallengeResponse(const u_char *challenge, const u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument
[all...]
H A Dchap-new.c53 /* Hook for a plugin to validate CHAP challenge */
56 const unsigned char *challenge, const unsigned char *response,
67 { "chap-max-challenge", o_int, &pcb->settings.chap_max_transmits,
68 "Set max #xmits for challenge", OPT_PRIO },
97 const unsigned char *challenge, const unsigned char *response,
191 * There isn't much to do until we receive a challenge.
219 * chap_timeout - It's time to send another challenge to the peer.
220 * This could be either a retransmission of a previous challenge,
221 * or a new challenge to start re-authentication.
246 MEMCPY(p->payload, pcb->chap_server.challenge, pc
411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) argument
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/
H A Dx_spki.c70 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
H A Dt_spki.c90 chal = spki->spkac->challenge;
/barrelfish-master/lib/openssl-1.0.0d/apps/
H A Dspkac.c92 char *challenge = NULL, *keyfile = NULL; local
132 else if (strcmp(*argv,"-challenge") == 0)
135 challenge= *(++argv);
174 BIO_printf(bio_err," -challenge arg challenge string\n");
203 if(challenge) ASN1_STRING_set(spki->spkac->challenge,
204 challenge, (int)strlen(challenge));
/barrelfish-master/lib/openssl-1.0.0d/demos/
H A Dspkigen.c61 /* lets make the spki and set the public key and challenge */
66 fprintf(stderr,"please enter challenge string:");
72 if (!ASN1_STRING_set((ASN1_STRING *)spki->spkac->challenge,
/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Dssl2.h198 unsigned char challenge[SSL2_MAX_CHALLENGE_LENGTH]; member in struct:ssl2_state_st
H A Ds2_lib.c493 EVP_DigestUpdate(&ctx,s->s2->challenge,s->s2->challenge_length);
H A Ds2_srvr.c683 /* challenge */
684 if (s->s2->challenge_length > sizeof s->s2->challenge)
690 memcpy(s->s2->challenge,p,(unsigned int)s->s2->challenge_length);
878 if (s->s2->challenge_length > sizeof s->s2->challenge)
883 memcpy(p,s->s2->challenge,(unsigned int)s->s2->challenge_length);
H A Ds2_clnt.c596 s2n(SSL2_CHALLENGE_LENGTH,p); /* challenge length */
597 /*challenge id data*/
598 if (RAND_pseudo_bytes(s->s2->challenge,SSL2_CHALLENGE_LENGTH) <= 0)
600 memcpy(d,s->s2->challenge,SSL2_CHALLENGE_LENGTH);
940 if (memcmp(p,s->s2->challenge,s->s2->challenge_length) != 0)
H A Ds23_clnt.c389 /* write out sslv2 challenge */
569 /* write out sslv2 challenge */
577 memcpy(s->s2->challenge,
/barrelfish-master/include/openssl/
H A Dssl2.h198 unsigned char challenge[SSL2_MAX_CHALLENGE_LENGTH]; member in struct:ssl2_state_st
H A Dx509.h534 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member in struct:Netscape_spkac_st
539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/
H A Dx509.h534 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ member in struct:Netscape_spkac_st
539 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
/barrelfish-master/doc/017-arm/
H A DARM.tex643 code reuse across different platforms a challenge.
/barrelfish-master/usr/eclipseclp/documents/tutorial/
H A Dhybrid.tex653 The challenge is to find a combination of {\tt ic} and {\tt eplex}
/barrelfish-master/usr/eclipseclp/documents/intro_paper/
H A Declipse.tex700 recent challenge within the MIP community.
842 tough challenge to reduce this time from hours to minutes!
/barrelfish-master/lib/tommath/
H A Dtommath.tex3593 & $512 \ldots 4096$ bits significantly ($> 2x$) to complete this challenge. \\

Completed in 124 milliseconds