Searched refs:challenge (Results 1 - 25 of 69) sorted by relevance

123

/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/freebsd-10.0-release/crypto/openssh/
H A Dauth-bsdauth.c55 char *challenge = NULL; local
59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
60 if (challenge == NULL) {
66 if (challenge == NULL) {
71 authctxt->style, "auth-ssh", &challenge);
73 challenge = NULL;
74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
77 if (challenge == NULL)
85 (*prompts)[0] = xstrdup(challenge);
[all...]
H A Dauth-skey.c56 char challenge[1024]; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
60 sizeof(challenge)) == -1)
69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
H A Dsshconnect1.c71 BIGNUM *challenge; local
78 if ((challenge = BN_new()) == NULL)
105 /* Otherwise it should have sent a challenge. */
110 packet_get_bignum(challenge);
113 debug("Received RSA challenge from server.");
115 /* Ask the agent to decrypt the challenge. */
116 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) {
122 logit("Authentication agent failed to decrypt challenge.");
126 debug("Sending response to RSA challenge.");
128 /* Send the decrypted challenge bac
161 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) argument
208 BIGNUM *challenge; local
329 BIGNUM *challenge; local
391 char *challenge, *response; local
[all...]
H A Dauth-rsa.c73 BIGNUM *challenge; local
76 if ((challenge = BN_new()) == NULL)
78 /* Generate a random challenge. */
79 if (BN_rand(challenge, 256, 0, 0) == 0)
83 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0)
87 return challenge;
91 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) argument
104 /* The response is MD5 of decrypted challenge plus session id. */
105 len = BN_num_bytes(challenge);
133 BIGNUM *challenge, *encrypted_challenge; local
[all...]
H A Dauth-chall.c48 char *challenge, *name, *info, **prompts; local
70 challenge = xstrdup(prompts[0]);
78 return (challenge);
/freebsd-10.0-release/crypto/openssl/crypto/asn1/
H A Dx_spki.c70 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/freebsd-10.0-release/contrib/opie/
H A Dopieserv.c27 char challenge[OPIE_CHALLENGE_MAX+1]; local
43 switch (result = opiechallenge(&opie, principal, challenge)) {
60 fputs(challenge, stdout);
/freebsd-10.0-release/contrib/telnet/libtelnet/
H A Dkerberos.c95 static Block challenge = { 0 }; variable
204 * the challenge, and verify it when the response comes back.
212 des_ecb_encrypt(&session_key, &challenge, sched, 0);
214 * Increment the challenge by 1, and encrypt it for
219 x = (unsigned int)challenge[i] + 1;
220 challenge[i] = x; /* ignore overflow */
224 des_ecb_encrypt(&challenge, &challenge, sched, 1);
304 * Take the received encrypted challenge, and encrypt
314 * Now decrypt the received encrypted challenge,
[all...]
H A Dkrb4encpwd.c115 static char challenge[REALM_SZ]; variable
218 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) {
240 * Take the received random challenge text and save
243 memmove((void *)challenge, (void *)data, sizeof(Block));
249 * Receive ack, if mutual then send random challenge
254 * the challenge, and verify it when the response comes back.
261 sprintf(challenge, "%x", now);
262 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge));
304 * Verify that the response to the challenge i
[all...]
H A Drsaencpwd.c110 static char challenge[CHAL_SZ]; variable
226 r = accept_rsa_encpwd(&auth, key, challenge,
252 * the challenge, and verify it when the response comes back.
260 sprintf(challenge, "%x", now);
261 challenge_len = strlen(challenge);
263 strcpy(challenge, "randchal");
294 memmove(ptr, challenge, challenge_len);
342 * Verify that the response to the challenge is correct.
354 memmove(challenge, ptr, challenge_len);
366 Challenge = challenge;
[all...]
/freebsd-10.0-release/usr.bin/csup/
H A Dauth.c95 char *line, *cmd, *challenge, *realm, *client, *srvresponse, *msg; local
106 challenge = proto_get_ascii(&line);
107 if (challenge == NULL ||
117 if (config->reqauth || (strcmp(challenge, ".") != 0)) {
129 if (strcmp(challenge, ".") != 0)
130 auth_makeresponse(challenge, shrdsecret, response);
262 auth_makeresponse(char *challenge, char *sharedsecret, char *response) argument
270 MD5_Update(&md5, challenge, strlen(challenge));
276 * Generates a challenge strin
283 auth_makechallenge(struct config *config, char *challenge) argument
313 auth_checkresponse(char *response, char *challenge, char *secret) argument
[all...]
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dms_funcs.c77 * @challenge: 8-octet Challenge (OUT)
82 u8 *challenge)
97 os_memcpy(challenge, hash, 8);
140 * @challenge: 8-octet Challenge (IN)
144 void challenge_response(const u8 *challenge, const u8 *password_hash, argument
148 des_encrypt(challenge, password_hash, response);
149 des_encrypt(challenge, password_hash + 7, response + 8);
153 des_encrypt(challenge, zpwd, response + 16);
173 u8 challenge[8]; local
177 username_len, challenge))
80 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument
202 u8 challenge[8]; local
245 u8 password_hash_hash[16], challenge[8]; local
307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
H A Dms_funcs.h31 int nt_challenge_response(const u8 *challenge, const u8 *password,
34 void challenge_response(const u8 *challenge, const u8 *password_hash,
/freebsd-10.0-release/lib/libpam/modules/pam_opie/
H A Dpam_opie.c65 char challenge[OPIE_CHALLENGE_MAX]; local
103 * user with a bogus OPIE challenge.
105 if (opiechallenge(&opie, principal, challenge) != 0 &&
111 * typed in, since we haven't presented the challenge to the user
119 promptstr[i], challenge);
125 PAM_LOG("Completed challenge %d: %s", i, response);
/freebsd-10.0-release/crypto/heimdal/appl/telnet/libtelnet/
H A Drsaencpwd.c111 static char challenge[CHAL_SZ]; variable
226 r = accept_rsa_encpwd(&auth, key, challenge,
252 * the challenge, and verify it when the response comes back.
260 snprintf(challenge, sizeof(challenge), "%x", now);
261 challenge_len = strlen(challenge);
263 strlcpy(challenge, "randchal", sizeof(challenge));
294 memmove(ptr, challenge, challenge_len);
342 * Verify that the response to the challenge i
[all...]
/freebsd-10.0-release/usr.sbin/ppp/
H A Dchap.c125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge
152 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */
175 mschap_NT(digest, challenge + 1);
199 /* Copy our challenge */
214 /* Generate NTRESPONSE to respond on challenge call */
215 GenerateNTResponse(challenge + 1, peerchallenge + 1, name,
223 peerchallenge + 1, challenge + 1, name,
241 MD5Update(&MD5context, challenge + 1, *challenge);
332 write(in[1], chap->challenge
[all...]
H A Dchap.h53 } challenge; member in struct:chap
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_svn/
H A Dcram.c83 static void compute_digest(unsigned char *digest, const char *challenge,
97 /* Compute MD5(secret XOR opad, MD5(secret XOR ipad, challenge)),
103 apr_md5_update(&ctx, challenge, strlen(challenge));
143 const char *challenge, *sep, *password;
149 /* Send a challenge. */
155 challenge = apr_psprintf(pool,
158 SVN_ERR(svn_ra_svn__write_tuple(conn, pool, "w(c)", "step", challenge));
175 compute_digest(sdigest, challenge, password);
191 /* Read the server challenge
82 compute_digest(unsigned char *digest, const char *challenge, const char *password) argument
142 const char *challenge, *sep, *password; local
[all...]
/freebsd-10.0-release/contrib/opie/libopie/
H A Dgenerator.c13 previously released test code. Renamed buffer to challenge.
18 challenge for extended response support and don't send
20 indicated in the challenge.
136 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response)
151 if (!(challenge = strstr(challenge, "otp-")))
154 challenge += 4;
156 if (__opieparsechallenge(challenge, &algorithm, &sequence, &seed, &exts))
/freebsd-10.0-release/crypto/openssl/apps/
H A Dspkac.c92 char *challenge = NULL, *keyfile = NULL; local
132 else if (strcmp(*argv,"-challenge") == 0)
135 challenge= *(++argv);
174 BIO_printf(bio_err," -challenge arg challenge string\n");
203 if(challenge) ASN1_STRING_set(spki->spkac->challenge,
204 challenge, (int)strlen(challenge));
/freebsd-10.0-release/crypto/heimdal/lib/ntlm/
H A Dtest_ntlm.c87 memset(type2.challenge, 0x7f, sizeof(type2.challenge));
121 type2.challenge,
160 memset(type2.challenge, 0x7f, sizeof(type2.challenge));

Completed in 308 milliseconds

123