/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/freebsd-11-stable/crypto/openssh/ |
H A D | auth-bsdauth.c | 57 char *challenge = NULL; local 66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 67 if (challenge == NULL) { 73 if (challenge == NULL) { 78 authctxt->style, "auth-ssh", &challenge); 80 challenge = NULL; 81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 84 if (challenge == NULL) 92 (*prompts)[0] = xstrdup(challenge); [all...] |
H A D | auth-skey.c | 56 char challenge[1024]; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 60 sizeof(challenge)) == -1) 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
|
H A D | sshconnect1.c | 72 BIGNUM *challenge; local 83 if ((challenge = BN_new()) == NULL) 113 /* Otherwise it should have sent a challenge. */ 118 packet_get_bignum(challenge); 121 debug("Received RSA challenge from server."); 123 /* Ask the agent to decrypt the challenge. */ 125 challenge, session_id, response)) != 0) { 132 "challenge: %s", ssh_err(r)); 135 debug("Sending response to RSA challenge."); 137 /* Send the decrypted challenge bac 173 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) argument 222 BIGNUM *challenge; local 350 BIGNUM *challenge; local 412 char *challenge, *response; local [all...] |
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | x_spki.c | 71 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/freebsd-11-stable/contrib/opie/ |
H A D | opieserv.c | 27 char challenge[OPIE_CHALLENGE_MAX+1]; local 43 switch (result = opiechallenge(&opie, principal, challenge)) { 60 fputs(challenge, stdout);
|
/freebsd-11-stable/contrib/telnet/libtelnet/ |
H A D | kerberos.c | 91 static Block challenge = { 0 }; variable 200 * the challenge, and verify it when the response comes back. 208 des_ecb_encrypt(&session_key, &challenge, sched, 0); 210 * Increment the challenge by 1, and encrypt it for 215 x = (unsigned int)challenge[i] + 1; 216 challenge[i] = x; /* ignore overflow */ 220 des_ecb_encrypt(&challenge, &challenge, sched, 1); 300 * Take the received encrypted challenge, and encrypt 310 * Now decrypt the received encrypted challenge, [all...] |
H A D | krb4encpwd.c | 111 static char challenge[REALM_SZ]; variable 214 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) { 236 * Take the received random challenge text and save 239 memmove((void *)challenge, (void *)data, sizeof(Block)); 245 * Receive ack, if mutual then send random challenge 250 * the challenge, and verify it when the response comes back. 257 sprintf(challenge, "%x", now); 258 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge)); 300 * Verify that the response to the challenge i [all...] |
H A D | rsaencpwd.c | 106 static char challenge[CHAL_SZ]; variable 222 r = accept_rsa_encpwd(&auth, key, challenge, 248 * the challenge, and verify it when the response comes back. 256 sprintf(challenge, "%x", now); 257 challenge_len = strlen(challenge); 259 strcpy(challenge, "randchal"); 290 memmove(ptr, challenge, challenge_len); 338 * Verify that the response to the challenge is correct. 350 memmove(challenge, ptr, challenge_len); 362 Challenge = challenge; [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | ms_funcs.c | 78 * @challenge: 8-octet Challenge (OUT) 82 const u8 *username, size_t username_len, u8 *challenge) 97 os_memcpy(challenge, hash, 8); 140 * @challenge: 8-octet Challenge (IN) 145 int challenge_response(const u8 *challenge, const u8 *password_hash, argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) 156 return des_encrypt(challenge, zpwd, response + 16); 176 u8 challenge[8]; local 180 username_len, challenge) || 81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument 204 u8 challenge[8]; local 247 u8 password_hash_hash[16], challenge[8]; local 306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
H A D | ms_funcs.h | 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 34 int challenge_response(const u8 *challenge, const u8 *password_hash, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/freebsd-11-stable/lib/libpam/modules/pam_opie/ |
H A D | pam_opie.c | 65 char challenge[OPIE_CHALLENGE_MAX + 1]; local 103 * user with a bogus OPIE challenge. 105 if (opiechallenge(&opie, principal, challenge) != 0 && 111 * typed in, since we haven't presented the challenge to the user 119 promptstr[i], challenge); 125 PAM_LOG("Completed challenge %d: %s", i, response);
|
/freebsd-11-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 111 static char challenge[CHAL_SZ]; variable 226 r = accept_rsa_encpwd(&auth, key, challenge, 252 * the challenge, and verify it when the response comes back. 260 snprintf(challenge, sizeof(challenge), "%x", now); 261 challenge_len = strlen(challenge); 263 strlcpy(challenge, "randchal", sizeof(challenge)); 294 memmove(ptr, challenge, challenge_len); 342 * Verify that the response to the challenge i [all...] |
/freebsd-11-stable/usr.sbin/ppp/ |
H A D | chap.c | 127 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge 154 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */ 177 mschap_NT(digest, challenge + 1); 201 /* Copy our challenge */ 216 /* Generate NTRESPONSE to respond on challenge call */ 217 GenerateNTResponse(challenge + 1, peerchallenge + 1, name, 225 peerchallenge + 1, challenge + 1, name, 243 MD5Update(&MD5context, challenge + 1, *challenge); 334 write(in[1], chap->challenge [all...] |
H A D | chap.h | 55 } challenge; member in struct:chap
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/freebsd-11-stable/usr.sbin/ctld/ |
H A D | chap.c | 47 const void *challenge, size_t challenge_len, void *response, 57 MD5Update(&ctx, challenge, challenge_len); 242 * Generate the challenge. 349 const void *challenge, size_t challenge_len) 356 memcpy(rchap->rchap_challenge, challenge, challenge_len); 361 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) argument 371 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len); 373 log_debugx("got incorrectly encoded CHAP challenge \"%s\"", 374 challenge); 46 chap_compute_md5(const char id, const char *secret, const void *challenge, size_t challenge_len, void *response, size_t response_len) argument 348 rchap_receive_bin(struct rchap *rchap, const unsigned char id, const void *challenge, size_t challenge_len) argument
|
/freebsd-11-stable/usr.sbin/iscsid/ |
H A D | chap.c | 47 const void *challenge, size_t challenge_len, void *response, 57 MD5Update(&ctx, challenge, challenge_len); 242 * Generate the challenge. 349 const void *challenge, size_t challenge_len) 356 memcpy(rchap->rchap_challenge, challenge, challenge_len); 361 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) argument 371 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len); 373 log_debugx("got incorrectly encoded CHAP challenge \"%s\"", 374 challenge); 46 chap_compute_md5(const char id, const char *secret, const void *challenge, size_t challenge_len, void *response, size_t response_len) argument 348 rchap_receive_bin(struct rchap *rchap, const unsigned char id, const void *challenge, size_t challenge_len) argument
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cram.c | 83 static void compute_digest(unsigned char *digest, const char *challenge, 97 /* Compute MD5(secret XOR opad, MD5(secret XOR ipad, challenge)), 103 apr_md5_update(&ctx, challenge, strlen(challenge)); 143 const char *challenge, *sep, *password; 149 /* Send a challenge. */ 155 challenge = apr_psprintf(pool, 158 SVN_ERR(svn_ra_svn__write_tuple(conn, pool, "w(c)", "step", challenge)); 175 compute_digest(sdigest, challenge, password); 191 /* Read the server challenge 82 compute_digest(unsigned char *digest, const char *challenge, const char *password) argument 142 const char *challenge, *sep, *password; local [all...] |
/freebsd-11-stable/contrib/opie/libopie/ |
H A D | generator.c | 13 previously released test code. Renamed buffer to challenge. 18 challenge for extended response support and don't send 20 indicated in the challenge. 137 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response) 152 if (!(challenge = strstr(challenge, "otp-"))) 155 challenge += 4; 157 if (__opieparsechallenge(challenge, &algorithm, &sequence, &seed, &exts))
|
H A D | Makefile.in | 17 OBJS=md4c.o md5c.o atob8.o btoa8.o btoh.o challenge.o getsequence.o hash.o hashlen.o keycrunch.o lock.o lookup.o newseed.o parsechallenge.o passcheck.o passwd.o randomchallenge.o readpass.o unlock.o verify.o version.o btoe.o accessfile.o generator.o insecure.o getutmpentry.o readrec.o writerec.o login.o open.o logwtmp.o # sha.o
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | spkac.c | 93 char *challenge = NULL, *keyfile = NULL; local 127 } else if (strcmp(*argv, "-challenge") == 0) { 130 challenge = *(++argv); 169 BIO_printf(bio_err, " -challenge arg challenge string\n"); 197 if (challenge != NULL) 198 ASN1_STRING_set(spki->spkac->challenge, 199 challenge, (int)strlen(challenge));
|
/freebsd-11-stable/crypto/heimdal/lib/ntlm/ |
H A D | test_ntlm.c | 87 memset(type2.challenge, 0x7f, sizeof(type2.challenge)); 121 type2.challenge, 160 memset(type2.challenge, 0x7f, sizeof(type2.challenge));
|