/openbsd-current/libexec/login_radius/ |
H A D | login_radius.h | 20 raddauth(char *username, char *class, char *style, char *challenge,
|
H A D | login_radius.c | 89 char challenge[1024]; local 114 strcmp(service, "challenge") != 0 && 162 memset(challenge, 0, sizeof(challenge)); 167 while (++c < sizeof(challenge) && 168 read(3, &challenge[c], 1) == 1) { 169 if (challenge[c] == '\0' && ++n == 2) 171 if (challenge[c] == '\0' && n == 1) 172 password = challenge + c + 1; 183 strcmp(service, "login") ? challenge [all...] |
H A D | raddauth.c | 142 * challenge -- NULL for interactive service 143 * password -- NULL for interactive service and when requesting a challenge 146 raddauth(char *username, char *class, char *style, char *challenge, argument 164 pwstate = password ? challenge : _pwstate; 182 if (challenge == NULL) { 184 v = login_getcapstr(lc, "radius-challenge-styles", 292 switch (i = rad_recv(_pwstate, challenge, vector)) { 295 * Make sure we don't think a challenge was issued. 297 if (challenge) 298 *challenge 447 rad_recv(char *state, char *challenge, u_char *req_vector) argument 593 parse_challenge(auth_hdr_t *authhdr, char *state, char *challenge) argument [all...] |
/openbsd-current/usr.bin/ssh/ |
H A D | auth-bsdauth.c | 52 char *challenge = NULL; local 61 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 62 if (challenge == NULL) { 68 if (challenge == NULL) { 73 authctxt->style, "auth-ssh", &challenge); 75 challenge = NULL; 76 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 79 if (challenge == NULL) 87 (*prompts)[0] = xstrdup(challenge); [all...] |
H A D | ssh-sk-helper.c | 152 struct sshbuf *challenge, *attest, *kbuf, *resp; local 166 (r = sshbuf_froms(req, &challenge)) != 0) 173 if (sshbuf_len(challenge) == 0) { 174 sshbuf_free(challenge); 175 challenge = NULL; 182 flags, pin, challenge, &key, attest)) != 0) { 200 sshbuf_free(challenge);
|
H A D | sk-api.h | 87 int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len, 91 /* Sign a challenge */
|
/openbsd-current/libexec/login_token/ |
H A D | login_token.c | 61 char challenge[1024]; local 106 else if (strcmp(optarg, "challenge") == 0) 138 while (++c < sizeof(challenge) && 139 read(3, &challenge[c], 1) == 1) { 140 if (challenge[c] == '\0' && ++mode == 2) 142 if (challenge[c] == '\0' && mode == 1) 143 pp = challenge + c + 1; 151 tokenchallenge(username, challenge, sizeof(challenge), 155 char *val = auth_mkvalue(challenge); [all...] |
H A D | token.c | 71 * Static definition of random number challenge for token. 100 * Send a random challenge string to the token. The challenge 105 tokenchallenge(char *user, char *challenge, int size, char *card_type) argument 151 snprintf(challenge, size, "%s Challenge \"%s\"\r\n%s Response: ", 157 * of the random number challenge. 161 tokenverify(char *username, char *challenge, char *response) argument 177 (void)strtok(challenge, "\"");
|
/openbsd-current/libexec/login_skey/ |
H A D | login_skey.c | 59 char challenge[SKEY_MAX_CHALLENGE+17], response[SKEY_MAX_PW_LEN+1]; local 84 else if (strcmp(optarg, "challenge") == 0) 128 * Note: our skeychallenge2() will always fill in the challenge, 133 haskey = (skeychallenge2(fd, &skey, user, challenge) == 0); 134 strlcat(challenge, "\nS/Key Password:", sizeof(challenge)); 140 if (!readpassphrase(challenge, response, sizeof(response), 0)) 158 haskey = (skeychallenge2(fd, &skey, user, challenge) == 0); 159 strlcat(challenge, "\nS/Key Password:", sizeof(challenge)); [all...] |
/openbsd-current/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/ |
H A D | Client.pm | 71 # C<_${mode}_params> will be the challenge parameters from the 401/407 headers 109 # Extract challenge type and parameters for a challenge list 117 for my $challenge (@$auth_list) { 118 $challenge =~ tr/,/;/; # "," is used to separate auth-params!! 119 ($challenge) = $self->split_header_words($challenge); 120 my $scheme = shift(@$challenge); 121 shift(@$challenge); # no value 122 $challenge [all...] |
/openbsd-current/usr.sbin/npppd/npppd/ |
H A D | chap.c | 152 /** Start CHAP as a authenticator. Send a challenge */ 204 /* Generate a challenge packet and send it */ 296 "Received challenge response has unknown id."); 312 "Received challenge response has invalid Value-Size " 320 "Received challenge response has invalid Name " 463 /** Generate a challenge */ 534 md5chap_authenticate(chap *_this, int id, char *username, u_char *challenge, argument 565 MD5Update(&md5ctx, challenge, lchallenge); 583 u_char *pkt, *challenge; local 586 challenge 603 u_char *pkt, *challenge; local 630 mschapv2_authenticate(chap *_this, int id, char *username, u_char *challenge, int lchallenge, u_char *response) argument 716 chap_radius_authenticate(chap *_this, int id, char *username, u_char *challenge, int lchallenge, u_char *response) argument [all...] |
H A D | chap_ms.c | 121 mschap_challenge_response(u_int8_t *challenge, u_int8_t *pwhash, argument 129 mschap_des_encrypt(challenge, padpwhash + 0, response + 0); 130 mschap_des_encrypt(challenge, padpwhash + 7, response + 8); 131 mschap_des_encrypt(challenge, padpwhash + 14, response + 16); 149 u_int8_t *username, int usernamelen, u_int8_t *challenge) 169 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ); 177 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; local 181 username, usernamelen, challenge); 184 mschap_challenge_response(challenge, password_hash, response); 195 u_int8_t challenge[MSCHAP_CHALLENGE_S local 148 mschap_challenge_hash(u_int8_t *peer_challenge, u_int8_t *auth_challenge, u_int8_t *username, int usernamelen, u_int8_t *challenge) argument [all...] |
/openbsd-current/usr.sbin/pppd/ |
H A D | chap.h | 86 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state 87 u_char chal_len; /* challenge length */ 88 u_char chal_id; /* ID of last challenge */ 91 char *chal_name; /* Our name to use with challenge */ 92 int chal_interval; /* Time until we challenge peer again */ 94 int max_transmits; /* Maximum # of challenge transmissions */ 95 int chal_transmits; /* Number of transmissions of challenge */ 111 #define CHAPCS_LISTEN 3 /* Listening for a challenge */ 121 #define CHAPSS_INITIAL_CHAL 3 /* We've sent the first challenge */ [all...] |
/openbsd-current/usr.bin/openssl/ |
H A D | spkac.c | 77 char *challenge; member in struct:__anon198 91 .name = "challenge", 93 .desc = "Specify challenge string if SPKAC is generated", 95 .opt.arg = &cfg.challenge, 165 "usage: spkac [-challenge string] [-in file] " 211 if (cfg.challenge) 212 ASN1_STRING_set(spki->spkac->challenge, 213 cfg.challenge, 214 (int) strlen(cfg.challenge));
|
/openbsd-current/sbin/iked/ |
H A D | chap_ms.c | 124 mschap_challenge_response(uint8_t *challenge, uint8_t *pwhash, argument 132 mschap_des_encrypt(challenge, padpwhash + 0, response + 0); 133 mschap_des_encrypt(challenge, padpwhash + 7, response + 8); 134 mschap_des_encrypt(challenge, padpwhash + 14, response + 16); 154 uint8_t *username, int usernamelen, uint8_t *challenge) 176 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ); 184 uint8_t challenge[MSCHAP_CHALLENGE_SZ]; local 188 username, usernamelen, challenge); 191 mschap_challenge_response(challenge, password_hash, response); 202 uint8_t challenge[MSCHAP_CHALLENGE_S local 153 mschap_challenge_hash(uint8_t *peer_challenge, uint8_t *auth_challenge, uint8_t *username, int usernamelen, uint8_t *challenge) argument [all...] |
/openbsd-current/usr.sbin/radiusctl/ |
H A D | chap_ms.c | 121 mschap_challenge_response(u_int8_t *challenge, u_int8_t *pwhash, argument 129 mschap_des_encrypt(challenge, padpwhash + 0, response + 0); 130 mschap_des_encrypt(challenge, padpwhash + 7, response + 8); 131 mschap_des_encrypt(challenge, padpwhash + 14, response + 16); 149 u_int8_t *username, int usernamelen, u_int8_t *challenge) 169 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ); 177 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; local 181 username, usernamelen, challenge); 184 mschap_challenge_response(challenge, password_hash, response); 195 u_int8_t challenge[MSCHAP_CHALLENGE_S local 148 mschap_challenge_hash(u_int8_t *peer_challenge, u_int8_t *auth_challenge, u_int8_t *username, int usernamelen, u_int8_t *challenge) argument [all...] |
/openbsd-current/sys/dev/ic/ |
H A D | if_wi_hostap.c | 289 if (sta->challenge) 290 free(sta->challenge, M_TEMP, 0); 435 if (sta->challenge) 436 free(sta->challenge, M_TEMP, 0); 548 u_int32_t challenge[32]; local 568 (void)take_tlv(&pkt, &len, IEEE80211_ELEMID_VENDOR, challenge, 569 sizeof(challenge)); 573 IEEE80211_ELEMID_CHALLENGE, challenge, sizeof(challenge))) < 0) { 634 /* Create a challenge fram [all...] |
H A D | if_wi_hostap.h | 94 u_int32_t *challenge; member in struct:wihap_sta_info
|
/openbsd-current/lib/libssl/ |
H A D | ssl_packet.c | 74 CBS cbs, challenge, cipher_specs, session; local 150 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) 158 * Convert SSLv2 challenge to SSLv3/TLS client random, by truncating or 165 if ((len = CBS_len(&challenge)) > SSL3_RANDOM_SIZE) 171 if (!CBB_add_bytes(&cbb, CBS_data(&challenge), len))
|
/openbsd-current/lib/libcrypto/asn1/ |
H A D | t_spki.c | 97 chal = spki->spkac->challenge;
|
H A D | x_spki.c | 75 .offset = offsetof(NETSCAPE_SPKAC, challenge), 76 .field_name = "challenge",
|
/openbsd-current/lib/libc/gen/ |
H A D | authenticate.c | 453 char *style, *name, *challenge, *class; local 476 challenge = auth_getitem(as, AUTHV_CHALLENGE); 479 if (challenge) 480 auth_setdata(as, challenge, strlen(challenge) + 1);
|
H A D | auth_subr.c | 97 char *challenge; /* last challenge issued */ member in struct:auth_session_t 287 free(as->challenge); 298 * Request a challenge for the session. 317 free(as->challenge); 318 as->challenge = NULL; 320 auth_call(as, path, as->style, "-s", "challenge", "--", as->name, 323 as->challenge = auth_getvalue(as, "challenge"); 326 return (as->challenge); [all...] |
/openbsd-current/usr.bin/doas/ |
H A D | doas.c | 208 char *challenge = NULL, *response, rbuf[1024], cbuf[128]; local 212 &challenge))) { 216 if (!challenge) { 223 challenge = cbuf; 225 response = readpassphrase(challenge, rbuf, sizeof(rbuf),
|
/openbsd-current/lib/libfido2/src/ |
H A D | u2f.c | 146 unsigned char challenge[SHA256_DIGEST_LENGTH]; local 151 /* dummy challenge & application */ 152 memset(&challenge, 0xff, sizeof(challenge)); 157 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 || 195 unsigned char challenge[SHA256_DIGEST_LENGTH]; local 208 memset(&challenge, 0xff, sizeof(challenge)); 222 iso7816_add(apdu, &challenge, sizeo [all...] |