| /freebsd/contrib/wpa/wpa_supplicant/ |
| H A D | eap_testing.txt | 142 - EAP-MD5-Challenge 148 - EAP-PEAPv0 / MD5-Challenge 150 - EAP-TTLS / EAP-MD5-Challenge 180 - EAP-TTLS / EAP-MD5-Challenge (using FreeRADIUS as inner auth srv) 185 - EAP-MD5-Challenge 188 - EAP-PEAP / MD5-Challenge 192 - EAP-MD5-Challenge 207 - EAP-TTLS / EAP-MD5-Challenge 212 - EAP-MD5-Challenge 219 - EAP-PEAPv0 / MD5-Challenge [all …]
|
| /freebsd/contrib/telnet/libtelnet/ |
| H A D | kerberos.c | 78 #define KRB_CHALLENGE 3 /* Challenge for mutual auth. */ 87 static Block challenge = { 0 }; variable 196 * the challenge, and verify it when the response comes back. in kerberos4_send() 204 DES_ecb_encrypt(&session_key, &challenge, sched, 0); in kerberos4_send() 206 * Increment the challenge by 1, and encrypt it for in kerberos4_send() 211 x = (unsigned int)challenge[i] + 1; in kerberos4_send() 212 challenge[i] = x; /* ignore overflow */ in kerberos4_send() 216 DES_ecb_encrypt(&challenge, &challenge, sched, 1); in kerberos4_send() 296 * Take the received encrypted challenge, and encrypt in kerberos4_is() 306 * Now decrypt the received encrypted challenge, in kerberos4_is() [all …]
|
| H A D | krb4encpwd.c | 95 #define KRB4_ENCPWD_CHALLENGE 3 /* Challenge for mutual auth. */ 107 static char challenge[REALM_SZ]; variable 210 …if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r… 232 * Take the received random challenge text and save 235 memmove((void *)challenge, (void *)data, sizeof(Block)); 241 * Receive ack, if mutual then send random challenge 246 * the challenge, and verify it when the response comes back. 253 sprintf(challenge, "%x", now); 254 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge)); 296 * Verify that the response to the challenge is correct. [all …]
|
| H A D | rsaencpwd.c | 91 #define RSA_ENCPWD_CHALLENGEKEY 3 /* Challenge and public key */ 102 static char challenge[CHAL_SZ]; variable 218 r = accept_rsa_encpwd(&auth, key, challenge, 244 * the challenge, and verify it when the response comes back. 252 sprintf(challenge, "%x", now); 253 challenge_len = strlen(challenge); 255 strcpy(challenge, "randchal"); 286 memmove(ptr, challenge, challenge_len); 334 * Verify that the response to the challenge is correct. 346 memmove(challenge, ptr, challenge_len); [all …]
|
| /freebsd/usr.sbin/ppp/ |
| H A D | chap.c | 95 "???", "CHALLENGE", "RESPONSE", "SUCCESS", "FAILURE" 125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge in chap_BuildAnswer() argument 152 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */ in chap_BuildAnswer() 175 mschap_NT(digest, challenge + 1); in chap_BuildAnswer() 199 /* Copy our challenge */ in chap_BuildAnswer() 214 /* Generate NTRESPONSE to respond on challenge call */ in chap_BuildAnswer() 215 GenerateNTResponse(challenge + 1, peerchallenge + 1, name, in chap_BuildAnswer() 223 peerchallenge + 1, challenge + 1, name, in chap_BuildAnswer() 241 MD5Update(&MD5context, challenge + 1, *challenge); in chap_BuildAnswer() 332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer); in chap_StartChild() [all …]
|
| H A D | chap_ms.c | 121 ChallengeResponse(u_char *challenge, u_char *pwHash, u_char *response) in ChallengeResponse() argument 128 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse() 129 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse() 130 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse() 155 char *UserName, char *Challenge) in ChallengeHash() argument 174 memcpy(Challenge, Digest, 8); in ChallengeHash() 182 char Challenge[8]; in GenerateNTResponse() local 185 ChallengeHash(PeerChallenge, AuthenticatorChallenge, UserName, Challenge); in GenerateNTResponse() 187 ChallengeResponse(Challenge, PasswordHash, Response); in GenerateNTResponse() 222 char Challenge[8]; in GenerateAuthenticatorResponse() local [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | auth-bsdauth.c | 55 char *challenge = NULL; in bsdauth_query() local 64 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query() 65 if (challenge == NULL) { in bsdauth_query() 71 if (challenge == NULL) { in bsdauth_query() 76 authctxt->style, "auth-ssh", &challenge); in bsdauth_query() 78 challenge = NULL; in bsdauth_query() 79 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query() 82 if (challenge == NULL) in bsdauth_query() 90 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
|
| /freebsd/contrib/wpa/src/eap_peer/ |
| H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local 55 * CHAP Challenge: in eap_md5_process() 56 * Value-Size (1 octet) | Value(Challenge) | Name(optional) in eap_md5_process() 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " in eap_md5_process() 67 challenge = pos; in eap_md5_process() 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
| H A D | eap_ttls.c | 344 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge() 541 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2() 565 /* MS-CHAP-Challenge */ in eap_ttls_phase2_request_mschapv2() 566 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2() 568 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2() 571 "implicit challenge"); in eap_ttls_phase2_request_mschapv2() 577 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2() 583 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2() 587 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 590 "random data for peer challenge"); in eap_ttls_phase2_request_mschapv2() [all …]
|
| H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " in eap_leap_process_request() 102 challenge = pos; in eap_leap_process_request() 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", in eap_leap_process_request() 105 challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); in eap_leap_process_request() 118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request() 171 "for challenge"); in eap_leap_process_success() [all …]
|
| H A D | eap_mschapv2.c | 87 /* Optional challenge values generated in EAP-FAST Phase 1 negotiation 164 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); in eap_mschapv2_challenge_reply() 233 * eap_mschapv2_process - Process an EAP-MSCHAPv2 challenge message 249 const u8 *pos, *challenge; in eap_mschapv2_challenge() local 255 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); in eap_mschapv2_challenge() 257 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " in eap_mschapv2_challenge() 266 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " in eap_mschapv2_challenge() 273 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" in eap_mschapv2_challenge() 281 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " in eap_mschapv2_challenge() 283 challenge = data->passwd_change_challenge; in eap_mschapv2_challenge() [all …]
|
| /freebsd/crypto/openssl/crypto/ec/curve448/ |
| H A D | eddsa.c | 228 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local 230 /* Compute the challenge */ in ossl_c448_ed448_sign() 236 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign() 239 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign() 240 sizeof(challenge)); in ossl_c448_ed448_sign() 241 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign() 336 /* Compute the challenge */ in ossl_c448_ed448_verify() 338 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local 346 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) { in ossl_c448_ed448_verify() 352 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_verify() [all …]
|
| /freebsd/crypto/krb5/src/plugins/preauth/spake/ |
| H A D | t_vectors.c | 51 const char *challenge; member 68 /* support, challenge, thash, body */ 93 /* support, challenge, thash, body */ 118 /* support, challenge, thash, body */ 142 /* support, challenge, thash, body */ 168 /* support, challenge, thash, body */ 199 /* support, challenge, thash, body */ 238 /* support, challenge, thash, body */ 257 /* Successful optimistic challenge (no support message in transcript) */ 267 /* support, challenge, thash, body */ [all …]
|
| H A D | spake_kdc.c | 58 * sent with a challenge message. stage is n>0 if the cookie was sent with an 60 * in the SPAKE challenge. The SPAKE value is the KDC private key for a 64 * hash after updating with the support and challenge messages for a stage-0 208 * Generate a SPAKE challenge message for the specified group. Use cb and rock 241 /* Encode the challenge. When second factor support is implemented, we in send_challenge() 248 msg.u.challenge.group = group; in send_challenge() 249 msg.u.challenge.pubkey = kdcpub; in send_challenge() 250 msg.u.challenge.factors = flist; in send_challenge() 256 * we received one) and challenge message. */ in send_challenge() 297 * optimistic challenge if configured to do so. */ [all …]
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | ms_funcs.c | 78 * @challenge: 8-octet Challenge (OUT) 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 97 os_memcpy(challenge, hash, 8); in challenge_hash() 140 * @challenge: 8-octet Challenge (IN) 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 180 username_len, challenge) || in generate_nt_response() [all …]
|
| /freebsd/crypto/openssh/regress/misc/ssh-verify-attestation/ |
| H A D | ssh-verify-attestation.c | 21 * the attestation object and challenge used when creating the key be 26 * $ # Generate a random challenge. 27 * $ dd if=/dev/urandom of=key_ecdsa_sk.challenge bs=32 count=1 30 * -Ochallenge=key_ecdsa_sk.challenge \ 32 * $ # Validate the challenge (-A = print attestation CA cert) 33 * $ ./obj/ssh-verify-attestation -A key_ecdsa_sk key_ecdsa_sk.challenge \ 80 const char *rp_id, struct sshbuf *b, const struct sshbuf *challenge, in prepare_fido_cred() argument 109 "authdata len=%zu challenge len=%zu", sshbuf_len(attestation_cert), in prepare_fido_cred() 110 sshbuf_len(sig), sshbuf_len(authdata), sshbuf_len(challenge)); in prepare_fido_cred() 114 fido_cred_set_clientdata(cred, sshbuf_ptr(challenge), in prepare_fido_cred() [all …]
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-spkac.1 | 75 [\fB\-challenge\fR \fIstring\fR] 88 This command processes Netscape signed public key and challenge 121 .IP "\fB\-challenge\fR \fIstring\fR" 4 122 .IX Item "-challenge string" 123 Specifies the challenge string if an SPKAC is being created. 173 Create an SPKAC using the challenge string "hello": 176 \& openssl spkac \-key key.pem \-challenge hello \-out spkac.cnf 198 The challenge string permits a primitive form of proof of possession 199 of private key. By checking the SPKAC signature and a random challenge
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-spkac.pod.in | 22 [B<-challenge> I<string>] 32 This command processes Netscape signed public key and challenge 75 =item B<-challenge> I<string> 77 Specifies the challenge string if an SPKAC is being created. 120 Create an SPKAC using the challenge string "hello": 122 openssl spkac -key key.pem -challenge hello -out spkac.cnf 142 The challenge string permits a primitive form of proof of possession 143 of private key. By checking the SPKAC signature and a random challenge
|
| /freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
| H A D | rsaencpwd.c | 100 #define RSA_ENCPWD_CHALLENGEKEY 3 /* Challenge and public key */ 111 static char challenge[CHAL_SZ]; variable 226 r = accept_rsa_encpwd(&auth, key, challenge, 252 * the challenge, and verify it when the response comes back. 260 snprintf(challenge, sizeof(challenge), "%x", now); 261 challenge_len = strlen(challenge); 263 strlcpy(challenge, "randchal", sizeof(challenge)); 294 memmove(ptr, challenge, challenge_len); 342 * Verify that the response to the challenge is correct. 354 memmove(challenge, ptr, challenge_len); [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | preauth_otp.c | 50 free(ti->challenge); in free_tokeninfo() 177 retval = codec_data_to_value(&ti->challenge, obj, "challenge"); in codec_encode_tokeninfo() 282 retval = codec_value_to_string(obj, "challenge", &ti->challenge); in codec_decode_tokeninfo() 424 /* Takes the nonce from the challenge and encrypts it into the request. */ 550 /* Builds a challenge string from the given tokeninfo. */ 552 make_challenge(const krb5_otp_tokeninfo *ti, char **challenge) in make_challenge() argument 554 if (challenge == NULL) in make_challenge() 557 *challenge = NULL; in make_challenge() 559 if (ti == NULL || ti->challenge.data == NULL) in make_challenge() 562 if (asprintf(challenge, "%s %.*s\n", in make_challenge() [all …]
|
| H A D | response_items.c | 109 const char *challenge) in push_question() argument 143 if (challenge != NULL) { in push_question() 144 ri->challenges[ri->count] = strdup(challenge); in push_question() 158 const char *challenge) in k5_response_items_ask_question() argument 165 return push_question(ri, question, challenge); in k5_response_items_ask_question() 167 if (challenge != NULL) { in k5_response_items_ask_question() 168 tmp = strdup(challenge); in k5_response_items_ask_question()
|
| /freebsd/crypto/openssl/apps/ |
| H A D | spkac.c | 45 {"challenge", OPT_CHALLENGE, 's', "Challenge string"}, 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 114 challenge = opt_arg(); in spkac_main() 155 if (challenge != NULL in spkac_main() 156 && !ASN1_STRING_set(spki->spkac->challenge, in spkac_main() 157 challenge, (int)strlen(challenge))) in spkac_main()
|
| /freebsd/contrib/wpa/src/eap_server/ |
| H A D | eap_server_ttls.c | 274 "EAP-TTLS: CHAP-Challenge (CHAP)", in eap_ttls_avp_parse() 288 "EAP-TTLS: MS-CHAP-Challenge", in eap_ttls_avp_parse() 334 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge() 558 const u8 *challenge, in eap_ttls_process_phase2_chap() argument 565 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap() 569 "(challenge len %lu password len %lu)", in eap_ttls_process_phase2_chap() 588 "challenge from TLS data"); in eap_ttls_process_phase2_chap() 593 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap() 596 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Challenge mismatch"); in eap_ttls_process_phase2_chap() 603 /* MD5(Ident + Password + Challenge) */ in eap_ttls_process_phase2_chap() [all …]
|
| H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq() 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq() 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq() 123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
|
| /freebsd/lib/libiscsiutil/ |
| H A D | chap.c | 42 const void *challenge, size_t challenge_len, void *response, in chap_compute_md5() argument 52 MD5Update(&ctx, challenge, challenge_len); in chap_compute_md5() 237 * Generate the challenge. in chap_new() 344 const void *challenge, size_t challenge_len) in rchap_receive_bin() argument 351 memcpy(rchap->rchap_challenge, challenge, challenge_len); in rchap_receive_bin() 356 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) in rchap_receive() argument 366 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len); in rchap_receive() 368 log_debugx("got incorrectly encoded CHAP challenge \"%s\"", in rchap_receive() 369 challenge); in rchap_receive()
|