Searched refs:challenge (Results 1 - 25 of 71) sorted by relevance

123

/freebsd-10-stable/contrib/wpa/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/freebsd-10-stable/crypto/openssh/
H A Dauth-bsdauth.c57 char *challenge = NULL; local
66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
67 if (challenge == NULL) {
73 if (challenge == NULL) {
78 authctxt->style, "auth-ssh", &challenge);
80 challenge = NULL;
81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
84 if (challenge == NULL)
92 (*prompts)[0] = xstrdup(challenge);
[all...]
H A Dauth-skey.c56 char challenge[1024]; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
60 sizeof(challenge)) == -1)
69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
H A Dauth-rsa.c76 BIGNUM *challenge; local
79 if ((challenge = BN_new()) == NULL)
81 /* Generate a random challenge. */
82 if (BN_rand(challenge, 256, 0, 0) == 0)
86 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0)
90 return challenge;
94 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) argument
108 /* The response is MD5 of decrypted challenge plus session id. */
109 len = BN_num_bytes(challenge);
139 BIGNUM *challenge, *encrypted_challenge; local
[all...]
H A Dsshconnect1.c72 BIGNUM *challenge; local
83 if ((challenge = BN_new()) == NULL)
113 /* Otherwise it should have sent a challenge. */
118 packet_get_bignum(challenge);
121 debug("Received RSA challenge from server.");
123 /* Ask the agent to decrypt the challenge. */
125 challenge, session_id, response)) != 0) {
132 "challenge: %s", ssh_err(r));
135 debug("Sending response to RSA challenge.");
137 /* Send the decrypted challenge bac
173 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) argument
222 BIGNUM *challenge; local
350 BIGNUM *challenge; local
412 char *challenge, *response; local
[all...]
H A Dauth-chall.c50 char *challenge, *name, *info, **prompts; local
72 challenge = xstrdup(prompts[0]);
80 return (challenge);
/freebsd-10-stable/crypto/openssl/crypto/asn1/
H A Dx_spki.c71 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
/freebsd-10-stable/contrib/wpa/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/freebsd-10-stable/contrib/opie/
H A Dopieserv.c27 char challenge[OPIE_CHALLENGE_MAX+1]; local
43 switch (result = opiechallenge(&opie, principal, challenge)) {
60 fputs(challenge, stdout);
/freebsd-10-stable/contrib/telnet/libtelnet/
H A Dkerberos.c95 static Block challenge = { 0 }; variable
204 * the challenge, and verify it when the response comes back.
212 des_ecb_encrypt(&session_key, &challenge, sched, 0);
214 * Increment the challenge by 1, and encrypt it for
219 x = (unsigned int)challenge[i] + 1;
220 challenge[i] = x; /* ignore overflow */
224 des_ecb_encrypt(&challenge, &challenge, sched, 1);
304 * Take the received encrypted challenge, and encrypt
314 * Now decrypt the received encrypted challenge,
[all...]
H A Dkrb4encpwd.c115 static char challenge[REALM_SZ]; variable
218 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) {
240 * Take the received random challenge text and save
243 memmove((void *)challenge, (void *)data, sizeof(Block));
249 * Receive ack, if mutual then send random challenge
254 * the challenge, and verify it when the response comes back.
261 sprintf(challenge, "%x", now);
262 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge));
304 * Verify that the response to the challenge i
[all...]
H A Drsaencpwd.c110 static char challenge[CHAL_SZ]; variable
226 r = accept_rsa_encpwd(&auth, key, challenge,
252 * the challenge, and verify it when the response comes back.
260 sprintf(challenge, "%x", now);
261 challenge_len = strlen(challenge);
263 strcpy(challenge, "randchal");
294 memmove(ptr, challenge, challenge_len);
342 * Verify that the response to the challenge is correct.
354 memmove(challenge, ptr, challenge_len);
366 Challenge = challenge;
[all...]
/freebsd-10-stable/usr.bin/csup/
H A Dauth.c95 char *line, *cmd, *challenge, *realm, *client, *srvresponse, *msg; local
106 challenge = proto_get_ascii(&line);
107 if (challenge == NULL ||
117 if (config->reqauth || (strcmp(challenge, ".") != 0)) {
129 if (strcmp(challenge, ".") != 0)
130 auth_makeresponse(challenge, shrdsecret, response);
262 auth_makeresponse(char *challenge, char *sharedsecret, char *response) argument
270 MD5_Update(&md5, challenge, strlen(challenge));
276 * Generates a challenge strin
283 auth_makechallenge(struct config *config, char *challenge) argument
313 auth_checkresponse(char *response, char *challenge, char *secret) argument
[all...]
/freebsd-10-stable/contrib/wpa/src/crypto/
H A Dms_funcs.c77 * @challenge: 8-octet Challenge (OUT)
82 u8 *challenge)
97 os_memcpy(challenge, hash, 8);
140 * @challenge: 8-octet Challenge (IN)
144 void challenge_response(const u8 *challenge, const u8 *password_hash, argument
148 des_encrypt(challenge, password_hash, response);
149 des_encrypt(challenge, password_hash + 7, response + 8);
153 des_encrypt(challenge, zpwd, response + 16);
173 u8 challenge[8]; local
177 username_len, challenge))
80 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument
202 u8 challenge[8]; local
245 u8 password_hash_hash[16], challenge[8]; local
307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
H A Dms_funcs.h31 int nt_challenge_response(const u8 *challenge, const u8 *password,
34 void challenge_response(const u8 *challenge, const u8 *password_hash,
/freebsd-10-stable/lib/libpam/modules/pam_opie/
H A Dpam_opie.c65 char challenge[OPIE_CHALLENGE_MAX + 1]; local
103 * user with a bogus OPIE challenge.
105 if (opiechallenge(&opie, principal, challenge) != 0 &&
111 * typed in, since we haven't presented the challenge to the user
119 promptstr[i], challenge);
125 PAM_LOG("Completed challenge %d: %s", i, response);
/freebsd-10-stable/crypto/heimdal/appl/telnet/libtelnet/
H A Drsaencpwd.c111 static char challenge[CHAL_SZ]; variable
226 r = accept_rsa_encpwd(&auth, key, challenge,
252 * the challenge, and verify it when the response comes back.
260 snprintf(challenge, sizeof(challenge), "%x", now);
261 challenge_len = strlen(challenge);
263 strlcpy(challenge, "randchal", sizeof(challenge));
294 memmove(ptr, challenge, challenge_len);
342 * Verify that the response to the challenge i
[all...]
/freebsd-10-stable/usr.sbin/ppp/
H A Dchap.c125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge
152 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */
175 mschap_NT(digest, challenge + 1);
199 /* Copy our challenge */
214 /* Generate NTRESPONSE to respond on challenge call */
215 GenerateNTResponse(challenge + 1, peerchallenge + 1, name,
223 peerchallenge + 1, challenge + 1, name,
241 MD5Update(&MD5context, challenge + 1, *challenge);
332 write(in[1], chap->challenge
[all...]
H A Dchap.h53 } challenge; member in struct:chap
/freebsd-10-stable/contrib/wpa/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
/freebsd-10-stable/usr.sbin/ctld/
H A Dchap.c45 const void *challenge, size_t challenge_len, void *response,
55 MD5Update(&ctx, challenge, challenge_len);
240 * Generate the challenge.
347 const void *challenge, size_t challenge_len)
354 memcpy(rchap->rchap_challenge, challenge, challenge_len);
359 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) argument
369 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len);
371 log_debugx("got incorrectly encoded CHAP challenge \"%s\"",
372 challenge);
44 chap_compute_md5(const char id, const char *secret, const void *challenge, size_t challenge_len, void *response, size_t response_len) argument
346 rchap_receive_bin(struct rchap *rchap, const unsigned char id, const void *challenge, size_t challenge_len) argument
/freebsd-10-stable/usr.sbin/iscsid/
H A Dchap.c45 const void *challenge, size_t challenge_len, void *response,
55 MD5Update(&ctx, challenge, challenge_len);
240 * Generate the challenge.
347 const void *challenge, size_t challenge_len)
354 memcpy(rchap->rchap_challenge, challenge, challenge_len);
359 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) argument
369 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len);
371 log_debugx("got incorrectly encoded CHAP challenge \"%s\"",
372 challenge);
44 chap_compute_md5(const char id, const char *secret, const void *challenge, size_t challenge_len, void *response, size_t response_len) argument
346 rchap_receive_bin(struct rchap *rchap, const unsigned char id, const void *challenge, size_t challenge_len) argument
/freebsd-10-stable/contrib/subversion/subversion/libsvn_ra_svn/
H A Dcram.c83 static void compute_digest(unsigned char *digest, const char *challenge,
97 /* Compute MD5(secret XOR opad, MD5(secret XOR ipad, challenge)),
103 apr_md5_update(&ctx, challenge, strlen(challenge));
143 const char *challenge, *sep, *password;
149 /* Send a challenge. */
155 challenge = apr_psprintf(pool,
158 SVN_ERR(svn_ra_svn__write_tuple(conn, pool, "w(c)", "step", challenge));
175 compute_digest(sdigest, challenge, password);
191 /* Read the server challenge
82 compute_digest(unsigned char *digest, const char *challenge, const char *password) argument
142 const char *challenge, *sep, *password; local
[all...]
/freebsd-10-stable/contrib/opie/libopie/
H A Dgenerator.c13 previously released test code. Renamed buffer to challenge.
18 challenge for extended response support and don't send
20 indicated in the challenge.
136 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response)
151 if (!(challenge = strstr(challenge, "otp-")))
154 challenge += 4;
156 if (__opieparsechallenge(challenge, &algorithm, &sequence, &seed, &exts))

Completed in 303 milliseconds

123