/freebsd/contrib/wpa/src/crypto/ |
H A D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 204 u8 challenge[8]; in generate_nt_response_pwhash() local 247 u8 password_hash_hash[16], challenge[8]; in generate_authenticator_response_pwhash() local 306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response()
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5()
|
/freebsd/lib/libiscsiutil/ |
H A D | chap.c | 42 const void *challenge, size_t challenge_len, void *response, in chap_compute_md5() 344 const void *challenge, size_t challenge_len) in rchap_receive_bin() 356 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) in rchap_receive()
|
/freebsd/usr.sbin/ppp/ |
H A D | chap_ms.c | 121 ChallengeResponse(u_char *challenge, u_char *pwHash, u_char *response) in ChallengeResponse() 389 mschap_NT(char *passwordHash, char *challenge) in mschap_NT() 399 mschap_LANMan(char *digest, char *challenge, char *secret) in mschap_LANMan()
|
H A D | chap.h | 53 } challenge; member
|
H A D | chap.c | 125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge in chap_BuildAnswer()
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
|
/freebsd/crypto/openssh/ |
H A D | auth-bsdauth.c | 55 char *challenge = NULL; in bsdauth_query() local
|
H A D | ssh-sk-helper.c | 155 struct sshbuf *challenge, *attest, *kbuf, *resp; in process_enroll() local
|
H A D | ssh-sk.c | 471 const u_char *challenge; in sshsk_enroll() local
|
/freebsd/crypto/heimdal/kuser/ |
H A D | kdigest.c | 276 unsigned char md[SHA_DIGEST_LENGTH], challenge[SHA_DIGEST_LENGTH]; in client_mschapv2() local 436 krb5_data challenge, opaque; in ntlm_server_init() local
|
/freebsd/crypto/openssl/apps/ |
H A D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member
|
H A D | eap_server_ttls.c | 558 const u8 *challenge, in eap_ttls_process_phase2_chap() 621 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() 696 u8 *challenge, in eap_ttls_process_phase2_mschapv2()
|
H A D | eap_server_mschapv2.c | 370 u8 challenge[8]; in eap_mschapv2_process_response() local
|
/freebsd/crypto/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local 331 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local
|
/freebsd/contrib/libfido2/src/ |
H A D | u2f.c | 149 unsigned char challenge[SHA256_DIGEST_LENGTH]; in send_dummy_register() local 205 unsigned char challenge[SHA256_DIGEST_LENGTH]; in key_lookup() local
|
/freebsd/contrib/telnet/libtelnet/ |
H A D | kerberos.c | 87 static Block challenge = { 0 }; variable
|
H A D | krb4encpwd.c | 107 static char challenge[REALM_SZ]; variable
|
H A D | rsaencpwd.c | 102 static char challenge[CHAL_SZ]; variable
|
/freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 111 static char challenge[CHAL_SZ]; variable
|
H A D | spx.c | 104 static des_cblock challenge = { 0 }; variable
|
/freebsd/crypto/heimdal/lib/ntlm/ |
H A D | heimntlm.h | 132 unsigned char challenge[8]; /**< */ member
|
/freebsd/crypto/openssh/regress/misc/sk-dummy/ |
H A D | sk-dummy.c | 234 sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len, in sk_enroll()
|