Searched refs:challenge (Results 1 - 25 of 69) sorted by relevance

123

/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/freebsd-11-stable/crypto/openssh/
H A Dauth-bsdauth.c57 char *challenge = NULL; local
66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
67 if (challenge == NULL) {
73 if (challenge == NULL) {
78 authctxt->style, "auth-ssh", &challenge);
80 challenge = NULL;
81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
84 if (challenge == NULL)
92 (*prompts)[0] = xstrdup(challenge);
[all...]
H A Dauth-skey.c56 char challenge[1024]; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
60 sizeof(challenge)) == -1)
69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
H A Dsshconnect1.c72 BIGNUM *challenge; local
83 if ((challenge = BN_new()) == NULL)
113 /* Otherwise it should have sent a challenge. */
118 packet_get_bignum(challenge);
121 debug("Received RSA challenge from server.");
123 /* Ask the agent to decrypt the challenge. */
125 challenge, session_id, response)) != 0) {
132 "challenge: %s", ssh_err(r));
135 debug("Sending response to RSA challenge.");
137 /* Send the decrypted challenge bac
173 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) argument
222 BIGNUM *challenge; local
350 BIGNUM *challenge; local
412 char *challenge, *response; local
[all...]
/freebsd-11-stable/crypto/openssl/crypto/asn1/
H A Dx_spki.c71 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/freebsd-11-stable/contrib/opie/
H A Dopieserv.c27 char challenge[OPIE_CHALLENGE_MAX+1]; local
43 switch (result = opiechallenge(&opie, principal, challenge)) {
60 fputs(challenge, stdout);
/freebsd-11-stable/contrib/telnet/libtelnet/
H A Dkerberos.c91 static Block challenge = { 0 }; variable
200 * the challenge, and verify it when the response comes back.
208 des_ecb_encrypt(&session_key, &challenge, sched, 0);
210 * Increment the challenge by 1, and encrypt it for
215 x = (unsigned int)challenge[i] + 1;
216 challenge[i] = x; /* ignore overflow */
220 des_ecb_encrypt(&challenge, &challenge, sched, 1);
300 * Take the received encrypted challenge, and encrypt
310 * Now decrypt the received encrypted challenge,
[all...]
H A Dkrb4encpwd.c111 static char challenge[REALM_SZ]; variable
214 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) {
236 * Take the received random challenge text and save
239 memmove((void *)challenge, (void *)data, sizeof(Block));
245 * Receive ack, if mutual then send random challenge
250 * the challenge, and verify it when the response comes back.
257 sprintf(challenge, "%x", now);
258 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge));
300 * Verify that the response to the challenge i
[all...]
H A Drsaencpwd.c106 static char challenge[CHAL_SZ]; variable
222 r = accept_rsa_encpwd(&auth, key, challenge,
248 * the challenge, and verify it when the response comes back.
256 sprintf(challenge, "%x", now);
257 challenge_len = strlen(challenge);
259 strcpy(challenge, "randchal");
290 memmove(ptr, challenge, challenge_len);
338 * Verify that the response to the challenge is correct.
350 memmove(challenge, ptr, challenge_len);
362 Challenge = challenge;
[all...]
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dms_funcs.c78 * @challenge: 8-octet Challenge (OUT)
82 const u8 *username, size_t username_len, u8 *challenge)
97 os_memcpy(challenge, hash, 8);
140 * @challenge: 8-octet Challenge (IN)
145 int challenge_response(const u8 *challenge, const u8 *password_hash, argument
150 if (des_encrypt(challenge, password_hash, response) < 0 ||
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0)
156 return des_encrypt(challenge, zpwd, response + 16);
176 u8 challenge[8]; local
180 username_len, challenge) ||
81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument
204 u8 challenge[8]; local
247 u8 password_hash_hash[16], challenge[8]; local
306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
H A Dms_funcs.h31 int nt_challenge_response(const u8 *challenge, const u8 *password,
34 int challenge_response(const u8 *challenge, const u8 *password_hash,
37 const u8 *username, size_t username_len, u8 *challenge);
/freebsd-11-stable/lib/libpam/modules/pam_opie/
H A Dpam_opie.c65 char challenge[OPIE_CHALLENGE_MAX + 1]; local
103 * user with a bogus OPIE challenge.
105 if (opiechallenge(&opie, principal, challenge) != 0 &&
111 * typed in, since we haven't presented the challenge to the user
119 promptstr[i], challenge);
125 PAM_LOG("Completed challenge %d: %s", i, response);
/freebsd-11-stable/crypto/heimdal/appl/telnet/libtelnet/
H A Drsaencpwd.c111 static char challenge[CHAL_SZ]; variable
226 r = accept_rsa_encpwd(&auth, key, challenge,
252 * the challenge, and verify it when the response comes back.
260 snprintf(challenge, sizeof(challenge), "%x", now);
261 challenge_len = strlen(challenge);
263 strlcpy(challenge, "randchal", sizeof(challenge));
294 memmove(ptr, challenge, challenge_len);
342 * Verify that the response to the challenge i
[all...]
/freebsd-11-stable/usr.sbin/ppp/
H A Dchap.c127 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge
154 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */
177 mschap_NT(digest, challenge + 1);
201 /* Copy our challenge */
216 /* Generate NTRESPONSE to respond on challenge call */
217 GenerateNTResponse(challenge + 1, peerchallenge + 1, name,
225 peerchallenge + 1, challenge + 1, name,
243 MD5Update(&MD5context, challenge + 1, *challenge);
334 write(in[1], chap->challenge
[all...]
H A Dchap.h55 } challenge; member in struct:chap
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
/freebsd-11-stable/usr.sbin/ctld/
H A Dchap.c47 const void *challenge, size_t challenge_len, void *response,
57 MD5Update(&ctx, challenge, challenge_len);
242 * Generate the challenge.
349 const void *challenge, size_t challenge_len)
356 memcpy(rchap->rchap_challenge, challenge, challenge_len);
361 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) argument
371 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len);
373 log_debugx("got incorrectly encoded CHAP challenge \"%s\"",
374 challenge);
46 chap_compute_md5(const char id, const char *secret, const void *challenge, size_t challenge_len, void *response, size_t response_len) argument
348 rchap_receive_bin(struct rchap *rchap, const unsigned char id, const void *challenge, size_t challenge_len) argument
/freebsd-11-stable/usr.sbin/iscsid/
H A Dchap.c47 const void *challenge, size_t challenge_len, void *response,
57 MD5Update(&ctx, challenge, challenge_len);
242 * Generate the challenge.
349 const void *challenge, size_t challenge_len)
356 memcpy(rchap->rchap_challenge, challenge, challenge_len);
361 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) argument
371 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len);
373 log_debugx("got incorrectly encoded CHAP challenge \"%s\"",
374 challenge);
46 chap_compute_md5(const char id, const char *secret, const void *challenge, size_t challenge_len, void *response, size_t response_len) argument
348 rchap_receive_bin(struct rchap *rchap, const unsigned char id, const void *challenge, size_t challenge_len) argument
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/
H A Dcram.c83 static void compute_digest(unsigned char *digest, const char *challenge,
97 /* Compute MD5(secret XOR opad, MD5(secret XOR ipad, challenge)),
103 apr_md5_update(&ctx, challenge, strlen(challenge));
143 const char *challenge, *sep, *password;
149 /* Send a challenge. */
155 challenge = apr_psprintf(pool,
158 SVN_ERR(svn_ra_svn__write_tuple(conn, pool, "w(c)", "step", challenge));
175 compute_digest(sdigest, challenge, password);
191 /* Read the server challenge
82 compute_digest(unsigned char *digest, const char *challenge, const char *password) argument
142 const char *challenge, *sep, *password; local
[all...]
/freebsd-11-stable/contrib/opie/libopie/
H A Dgenerator.c13 previously released test code. Renamed buffer to challenge.
18 challenge for extended response support and don't send
20 indicated in the challenge.
137 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response)
152 if (!(challenge = strstr(challenge, "otp-")))
155 challenge += 4;
157 if (__opieparsechallenge(challenge, &algorithm, &sequence, &seed, &exts))
H A DMakefile.in17 OBJS=md4c.o md5c.o atob8.o btoa8.o btoh.o challenge.o getsequence.o hash.o hashlen.o keycrunch.o lock.o lookup.o newseed.o parsechallenge.o passcheck.o passwd.o randomchallenge.o readpass.o unlock.o verify.o version.o btoe.o accessfile.o generator.o insecure.o getutmpentry.o readrec.o writerec.o login.o open.o logwtmp.o # sha.o
/freebsd-11-stable/crypto/openssl/apps/
H A Dspkac.c93 char *challenge = NULL, *keyfile = NULL; local
127 } else if (strcmp(*argv, "-challenge") == 0) {
130 challenge = *(++argv);
169 BIO_printf(bio_err, " -challenge arg challenge string\n");
197 if (challenge != NULL)
198 ASN1_STRING_set(spki->spkac->challenge,
199 challenge, (int)strlen(challenge));
/freebsd-11-stable/crypto/heimdal/lib/ntlm/
H A Dtest_ntlm.c87 memset(type2.challenge, 0x7f, sizeof(type2.challenge));
121 type2.challenge,
160 memset(type2.challenge, 0x7f, sizeof(type2.challenge));

Completed in 145 milliseconds

123