Searched refs:challenge (Results 1 - 25 of 35) sorted by relevance

12

/openbsd-current/libexec/login_radius/
H A Dlogin_radius.h20 raddauth(char *username, char *class, char *style, char *challenge,
H A Dlogin_radius.c89 char challenge[1024]; local
114 strcmp(service, "challenge") != 0 &&
162 memset(challenge, 0, sizeof(challenge));
167 while (++c < sizeof(challenge) &&
168 read(3, &challenge[c], 1) == 1) {
169 if (challenge[c] == '\0' && ++n == 2)
171 if (challenge[c] == '\0' && n == 1)
172 password = challenge + c + 1;
183 strcmp(service, "login") ? challenge
[all...]
H A Draddauth.c142 * challenge -- NULL for interactive service
143 * password -- NULL for interactive service and when requesting a challenge
146 raddauth(char *username, char *class, char *style, char *challenge, argument
164 pwstate = password ? challenge : _pwstate;
182 if (challenge == NULL) {
184 v = login_getcapstr(lc, "radius-challenge-styles",
292 switch (i = rad_recv(_pwstate, challenge, vector)) {
295 * Make sure we don't think a challenge was issued.
297 if (challenge)
298 *challenge
447 rad_recv(char *state, char *challenge, u_char *req_vector) argument
593 parse_challenge(auth_hdr_t *authhdr, char *state, char *challenge) argument
[all...]
/openbsd-current/usr.bin/ssh/
H A Dauth-bsdauth.c52 char *challenge = NULL; local
61 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
62 if (challenge == NULL) {
68 if (challenge == NULL) {
73 authctxt->style, "auth-ssh", &challenge);
75 challenge = NULL;
76 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
79 if (challenge == NULL)
87 (*prompts)[0] = xstrdup(challenge);
[all...]
H A Dssh-sk-helper.c152 struct sshbuf *challenge, *attest, *kbuf, *resp; local
166 (r = sshbuf_froms(req, &challenge)) != 0)
173 if (sshbuf_len(challenge) == 0) {
174 sshbuf_free(challenge);
175 challenge = NULL;
182 flags, pin, challenge, &key, attest)) != 0) {
200 sshbuf_free(challenge);
H A Dsk-api.h87 int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len,
91 /* Sign a challenge */
/openbsd-current/libexec/login_token/
H A Dlogin_token.c61 char challenge[1024]; local
106 else if (strcmp(optarg, "challenge") == 0)
138 while (++c < sizeof(challenge) &&
139 read(3, &challenge[c], 1) == 1) {
140 if (challenge[c] == '\0' && ++mode == 2)
142 if (challenge[c] == '\0' && mode == 1)
143 pp = challenge + c + 1;
151 tokenchallenge(username, challenge, sizeof(challenge),
155 char *val = auth_mkvalue(challenge);
[all...]
H A Dtoken.c71 * Static definition of random number challenge for token.
100 * Send a random challenge string to the token. The challenge
105 tokenchallenge(char *user, char *challenge, int size, char *card_type) argument
151 snprintf(challenge, size, "%s Challenge \"%s\"\r\n%s Response: ",
157 * of the random number challenge.
161 tokenverify(char *username, char *challenge, char *response) argument
177 (void)strtok(challenge, "\"");
/openbsd-current/libexec/login_skey/
H A Dlogin_skey.c59 char challenge[SKEY_MAX_CHALLENGE+17], response[SKEY_MAX_PW_LEN+1]; local
84 else if (strcmp(optarg, "challenge") == 0)
128 * Note: our skeychallenge2() will always fill in the challenge,
133 haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
134 strlcat(challenge, "\nS/Key Password:", sizeof(challenge));
140 if (!readpassphrase(challenge, response, sizeof(response), 0))
158 haskey = (skeychallenge2(fd, &skey, user, challenge) == 0);
159 strlcat(challenge, "\nS/Key Password:", sizeof(challenge));
[all...]
/openbsd-current/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/
H A DClient.pm71 # C<_${mode}_params> will be the challenge parameters from the 401/407 headers
109 # Extract challenge type and parameters for a challenge list
117 for my $challenge (@$auth_list) {
118 $challenge =~ tr/,/;/; # "," is used to separate auth-params!!
119 ($challenge) = $self->split_header_words($challenge);
120 my $scheme = shift(@$challenge);
121 shift(@$challenge); # no value
122 $challenge
[all...]
/openbsd-current/usr.sbin/npppd/npppd/
H A Dchap.c152 /** Start CHAP as a authenticator. Send a challenge */
204 /* Generate a challenge packet and send it */
296 "Received challenge response has unknown id.");
312 "Received challenge response has invalid Value-Size "
320 "Received challenge response has invalid Name "
463 /** Generate a challenge */
534 md5chap_authenticate(chap *_this, int id, char *username, u_char *challenge, argument
565 MD5Update(&md5ctx, challenge, lchallenge);
583 u_char *pkt, *challenge; local
586 challenge
603 u_char *pkt, *challenge; local
630 mschapv2_authenticate(chap *_this, int id, char *username, u_char *challenge, int lchallenge, u_char *response) argument
716 chap_radius_authenticate(chap *_this, int id, char *username, u_char *challenge, int lchallenge, u_char *response) argument
[all...]
H A Dchap_ms.c121 mschap_challenge_response(u_int8_t *challenge, u_int8_t *pwhash, argument
129 mschap_des_encrypt(challenge, padpwhash + 0, response + 0);
130 mschap_des_encrypt(challenge, padpwhash + 7, response + 8);
131 mschap_des_encrypt(challenge, padpwhash + 14, response + 16);
149 u_int8_t *username, int usernamelen, u_int8_t *challenge)
169 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ);
177 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; local
181 username, usernamelen, challenge);
184 mschap_challenge_response(challenge, password_hash, response);
195 u_int8_t challenge[MSCHAP_CHALLENGE_S local
148 mschap_challenge_hash(u_int8_t *peer_challenge, u_int8_t *auth_challenge, u_int8_t *username, int usernamelen, u_int8_t *challenge) argument
[all...]
/openbsd-current/usr.sbin/pppd/
H A Dchap.h86 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member in struct:chap_state
87 u_char chal_len; /* challenge length */
88 u_char chal_id; /* ID of last challenge */
91 char *chal_name; /* Our name to use with challenge */
92 int chal_interval; /* Time until we challenge peer again */
94 int max_transmits; /* Maximum # of challenge transmissions */
95 int chal_transmits; /* Number of transmissions of challenge */
111 #define CHAPCS_LISTEN 3 /* Listening for a challenge */
121 #define CHAPSS_INITIAL_CHAL 3 /* We've sent the first challenge */
[all...]
/openbsd-current/usr.bin/openssl/
H A Dspkac.c77 char *challenge; member in struct:__anon198
91 .name = "challenge",
93 .desc = "Specify challenge string if SPKAC is generated",
95 .opt.arg = &cfg.challenge,
165 "usage: spkac [-challenge string] [-in file] "
211 if (cfg.challenge)
212 ASN1_STRING_set(spki->spkac->challenge,
213 cfg.challenge,
214 (int) strlen(cfg.challenge));
/openbsd-current/sbin/iked/
H A Dchap_ms.c124 mschap_challenge_response(uint8_t *challenge, uint8_t *pwhash, argument
132 mschap_des_encrypt(challenge, padpwhash + 0, response + 0);
133 mschap_des_encrypt(challenge, padpwhash + 7, response + 8);
134 mschap_des_encrypt(challenge, padpwhash + 14, response + 16);
154 uint8_t *username, int usernamelen, uint8_t *challenge)
176 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ);
184 uint8_t challenge[MSCHAP_CHALLENGE_SZ]; local
188 username, usernamelen, challenge);
191 mschap_challenge_response(challenge, password_hash, response);
202 uint8_t challenge[MSCHAP_CHALLENGE_S local
153 mschap_challenge_hash(uint8_t *peer_challenge, uint8_t *auth_challenge, uint8_t *username, int usernamelen, uint8_t *challenge) argument
[all...]
/openbsd-current/usr.sbin/radiusctl/
H A Dchap_ms.c121 mschap_challenge_response(u_int8_t *challenge, u_int8_t *pwhash, argument
129 mschap_des_encrypt(challenge, padpwhash + 0, response + 0);
130 mschap_des_encrypt(challenge, padpwhash + 7, response + 8);
131 mschap_des_encrypt(challenge, padpwhash + 14, response + 16);
149 u_int8_t *username, int usernamelen, u_int8_t *challenge)
169 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ);
177 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; local
181 username, usernamelen, challenge);
184 mschap_challenge_response(challenge, password_hash, response);
195 u_int8_t challenge[MSCHAP_CHALLENGE_S local
148 mschap_challenge_hash(u_int8_t *peer_challenge, u_int8_t *auth_challenge, u_int8_t *username, int usernamelen, u_int8_t *challenge) argument
[all...]
/openbsd-current/sys/dev/ic/
H A Dif_wi_hostap.c289 if (sta->challenge)
290 free(sta->challenge, M_TEMP, 0);
435 if (sta->challenge)
436 free(sta->challenge, M_TEMP, 0);
548 u_int32_t challenge[32]; local
568 (void)take_tlv(&pkt, &len, IEEE80211_ELEMID_VENDOR, challenge,
569 sizeof(challenge));
573 IEEE80211_ELEMID_CHALLENGE, challenge, sizeof(challenge))) < 0) {
634 /* Create a challenge fram
[all...]
H A Dif_wi_hostap.h94 u_int32_t *challenge; member in struct:wihap_sta_info
/openbsd-current/lib/libssl/
H A Dssl_packet.c74 CBS cbs, challenge, cipher_specs, session; local
150 if (!CBS_get_bytes(&cbs, &challenge, challenge_length))
158 * Convert SSLv2 challenge to SSLv3/TLS client random, by truncating or
165 if ((len = CBS_len(&challenge)) > SSL3_RANDOM_SIZE)
171 if (!CBB_add_bytes(&cbb, CBS_data(&challenge), len))
/openbsd-current/lib/libcrypto/asn1/
H A Dt_spki.c97 chal = spki->spkac->challenge;
H A Dx_spki.c75 .offset = offsetof(NETSCAPE_SPKAC, challenge),
76 .field_name = "challenge",
/openbsd-current/lib/libc/gen/
H A Dauthenticate.c453 char *style, *name, *challenge, *class; local
476 challenge = auth_getitem(as, AUTHV_CHALLENGE);
479 if (challenge)
480 auth_setdata(as, challenge, strlen(challenge) + 1);
H A Dauth_subr.c97 char *challenge; /* last challenge issued */ member in struct:auth_session_t
287 free(as->challenge);
298 * Request a challenge for the session.
317 free(as->challenge);
318 as->challenge = NULL;
320 auth_call(as, path, as->style, "-s", "challenge", "--", as->name,
323 as->challenge = auth_getvalue(as, "challenge");
326 return (as->challenge);
[all...]
/openbsd-current/usr.bin/doas/
H A Ddoas.c208 char *challenge = NULL, *response, rbuf[1024], cbuf[128]; local
212 &challenge))) {
216 if (!challenge) {
223 challenge = cbuf;
225 response = readpassphrase(challenge, rbuf, sizeof(rbuf),
/openbsd-current/lib/libfido2/src/
H A Du2f.c146 unsigned char challenge[SHA256_DIGEST_LENGTH]; local
151 /* dummy challenge & application */
152 memset(&challenge, 0xff, sizeof(challenge));
157 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 ||
195 unsigned char challenge[SHA256_DIGEST_LENGTH]; local
208 memset(&challenge, 0xff, sizeof(challenge));
222 iso7816_add(apdu, &challenge, sizeo
[all...]

Completed in 214 milliseconds

12