/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/freebsd-10-stable/crypto/openssh/ |
H A D | auth-bsdauth.c | 57 char *challenge = NULL; local 66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 67 if (challenge == NULL) { 73 if (challenge == NULL) { 78 authctxt->style, "auth-ssh", &challenge); 80 challenge = NULL; 81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 84 if (challenge == NULL) 92 (*prompts)[0] = xstrdup(challenge); [all...] |
H A D | auth-skey.c | 56 char challenge[1024]; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 60 sizeof(challenge)) == -1) 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
|
H A D | auth-rsa.c | 76 BIGNUM *challenge; local 79 if ((challenge = BN_new()) == NULL) 81 /* Generate a random challenge. */ 82 if (BN_rand(challenge, 256, 0, 0) == 0) 86 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0) 90 return challenge; 94 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) argument 108 /* The response is MD5 of decrypted challenge plus session id. */ 109 len = BN_num_bytes(challenge); 139 BIGNUM *challenge, *encrypted_challenge; local [all...] |
H A D | sshconnect1.c | 72 BIGNUM *challenge; local 83 if ((challenge = BN_new()) == NULL) 113 /* Otherwise it should have sent a challenge. */ 118 packet_get_bignum(challenge); 121 debug("Received RSA challenge from server."); 123 /* Ask the agent to decrypt the challenge. */ 125 challenge, session_id, response)) != 0) { 132 "challenge: %s", ssh_err(r)); 135 debug("Sending response to RSA challenge."); 137 /* Send the decrypted challenge bac 173 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) argument 222 BIGNUM *challenge; local 350 BIGNUM *challenge; local 412 char *challenge, *response; local [all...] |
H A D | auth-chall.c | 50 char *challenge, *name, *info, **prompts; local 72 challenge = xstrdup(prompts[0]); 80 return (challenge);
|
/freebsd-10-stable/crypto/openssl/crypto/asn1/ |
H A D | x_spki.c | 71 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
|
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/freebsd-10-stable/contrib/opie/ |
H A D | opieserv.c | 27 char challenge[OPIE_CHALLENGE_MAX+1]; local 43 switch (result = opiechallenge(&opie, principal, challenge)) { 60 fputs(challenge, stdout);
|
/freebsd-10-stable/contrib/telnet/libtelnet/ |
H A D | kerberos.c | 95 static Block challenge = { 0 }; variable 204 * the challenge, and verify it when the response comes back. 212 des_ecb_encrypt(&session_key, &challenge, sched, 0); 214 * Increment the challenge by 1, and encrypt it for 219 x = (unsigned int)challenge[i] + 1; 220 challenge[i] = x; /* ignore overflow */ 224 des_ecb_encrypt(&challenge, &challenge, sched, 1); 304 * Take the received encrypted challenge, and encrypt 314 * Now decrypt the received encrypted challenge, [all...] |
H A D | krb4encpwd.c | 115 static char challenge[REALM_SZ]; variable 218 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) { 240 * Take the received random challenge text and save 243 memmove((void *)challenge, (void *)data, sizeof(Block)); 249 * Receive ack, if mutual then send random challenge 254 * the challenge, and verify it when the response comes back. 261 sprintf(challenge, "%x", now); 262 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge)); 304 * Verify that the response to the challenge i [all...] |
H A D | rsaencpwd.c | 110 static char challenge[CHAL_SZ]; variable 226 r = accept_rsa_encpwd(&auth, key, challenge, 252 * the challenge, and verify it when the response comes back. 260 sprintf(challenge, "%x", now); 261 challenge_len = strlen(challenge); 263 strcpy(challenge, "randchal"); 294 memmove(ptr, challenge, challenge_len); 342 * Verify that the response to the challenge is correct. 354 memmove(challenge, ptr, challenge_len); 366 Challenge = challenge; [all...] |
/freebsd-10-stable/usr.bin/csup/ |
H A D | auth.c | 95 char *line, *cmd, *challenge, *realm, *client, *srvresponse, *msg; local 106 challenge = proto_get_ascii(&line); 107 if (challenge == NULL || 117 if (config->reqauth || (strcmp(challenge, ".") != 0)) { 129 if (strcmp(challenge, ".") != 0) 130 auth_makeresponse(challenge, shrdsecret, response); 262 auth_makeresponse(char *challenge, char *sharedsecret, char *response) argument 270 MD5_Update(&md5, challenge, strlen(challenge)); 276 * Generates a challenge strin 283 auth_makechallenge(struct config *config, char *challenge) argument 313 auth_checkresponse(char *response, char *challenge, char *secret) argument [all...] |
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | ms_funcs.c | 77 * @challenge: 8-octet Challenge (OUT) 82 u8 *challenge) 97 os_memcpy(challenge, hash, 8); 140 * @challenge: 8-octet Challenge (IN) 144 void challenge_response(const u8 *challenge, const u8 *password_hash, argument 148 des_encrypt(challenge, password_hash, response); 149 des_encrypt(challenge, password_hash + 7, response + 8); 153 des_encrypt(challenge, zpwd, response + 16); 173 u8 challenge[8]; local 177 username_len, challenge)) 80 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument 202 u8 challenge[8]; local 245 u8 password_hash_hash[16], challenge[8]; local 307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
H A D | ms_funcs.h | 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 34 void challenge_response(const u8 *challenge, const u8 *password_hash,
|
/freebsd-10-stable/lib/libpam/modules/pam_opie/ |
H A D | pam_opie.c | 65 char challenge[OPIE_CHALLENGE_MAX + 1]; local 103 * user with a bogus OPIE challenge. 105 if (opiechallenge(&opie, principal, challenge) != 0 && 111 * typed in, since we haven't presented the challenge to the user 119 promptstr[i], challenge); 125 PAM_LOG("Completed challenge %d: %s", i, response);
|
/freebsd-10-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 111 static char challenge[CHAL_SZ]; variable 226 r = accept_rsa_encpwd(&auth, key, challenge, 252 * the challenge, and verify it when the response comes back. 260 snprintf(challenge, sizeof(challenge), "%x", now); 261 challenge_len = strlen(challenge); 263 strlcpy(challenge, "randchal", sizeof(challenge)); 294 memmove(ptr, challenge, challenge_len); 342 * Verify that the response to the challenge i [all...] |
/freebsd-10-stable/usr.sbin/ppp/ |
H A D | chap.c | 125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge 152 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */ 175 mschap_NT(digest, challenge + 1); 199 /* Copy our challenge */ 214 /* Generate NTRESPONSE to respond on challenge call */ 215 GenerateNTResponse(challenge + 1, peerchallenge + 1, name, 223 peerchallenge + 1, challenge + 1, name, 241 MD5Update(&MD5context, challenge + 1, *challenge); 332 write(in[1], chap->challenge [all...] |
H A D | chap.h | 53 } challenge; member in struct:chap
|
/freebsd-10-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/freebsd-10-stable/usr.sbin/ctld/ |
H A D | chap.c | 45 const void *challenge, size_t challenge_len, void *response, 55 MD5Update(&ctx, challenge, challenge_len); 240 * Generate the challenge. 347 const void *challenge, size_t challenge_len) 354 memcpy(rchap->rchap_challenge, challenge, challenge_len); 359 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) argument 369 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len); 371 log_debugx("got incorrectly encoded CHAP challenge \"%s\"", 372 challenge); 44 chap_compute_md5(const char id, const char *secret, const void *challenge, size_t challenge_len, void *response, size_t response_len) argument 346 rchap_receive_bin(struct rchap *rchap, const unsigned char id, const void *challenge, size_t challenge_len) argument
|
/freebsd-10-stable/usr.sbin/iscsid/ |
H A D | chap.c | 45 const void *challenge, size_t challenge_len, void *response, 55 MD5Update(&ctx, challenge, challenge_len); 240 * Generate the challenge. 347 const void *challenge, size_t challenge_len) 354 memcpy(rchap->rchap_challenge, challenge, challenge_len); 359 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) argument 369 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len); 371 log_debugx("got incorrectly encoded CHAP challenge \"%s\"", 372 challenge); 44 chap_compute_md5(const char id, const char *secret, const void *challenge, size_t challenge_len, void *response, size_t response_len) argument 346 rchap_receive_bin(struct rchap *rchap, const unsigned char id, const void *challenge, size_t challenge_len) argument
|
/freebsd-10-stable/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cram.c | 83 static void compute_digest(unsigned char *digest, const char *challenge, 97 /* Compute MD5(secret XOR opad, MD5(secret XOR ipad, challenge)), 103 apr_md5_update(&ctx, challenge, strlen(challenge)); 143 const char *challenge, *sep, *password; 149 /* Send a challenge. */ 155 challenge = apr_psprintf(pool, 158 SVN_ERR(svn_ra_svn__write_tuple(conn, pool, "w(c)", "step", challenge)); 175 compute_digest(sdigest, challenge, password); 191 /* Read the server challenge 82 compute_digest(unsigned char *digest, const char *challenge, const char *password) argument 142 const char *challenge, *sep, *password; local [all...] |
/freebsd-10-stable/contrib/opie/libopie/ |
H A D | generator.c | 13 previously released test code. Renamed buffer to challenge. 18 challenge for extended response support and don't send 20 indicated in the challenge. 136 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response) 151 if (!(challenge = strstr(challenge, "otp-"))) 154 challenge += 4; 156 if (__opieparsechallenge(challenge, &algorithm, &sequence, &seed, &exts))
|