Home
last modified time | relevance | path

Searched full:challenge (Results 1 – 25 of 278) sorted by relevance

12345678910>>...12

/freebsd/contrib/wpa/wpa_supplicant/
H A Deap_testing.txt142 - EAP-MD5-Challenge
148 - EAP-PEAPv0 / MD5-Challenge
150 - EAP-TTLS / EAP-MD5-Challenge
180 - EAP-TTLS / EAP-MD5-Challenge (using FreeRADIUS as inner auth srv)
185 - EAP-MD5-Challenge
188 - EAP-PEAP / MD5-Challenge
192 - EAP-MD5-Challenge
207 - EAP-TTLS / EAP-MD5-Challenge
212 - EAP-MD5-Challenge
219 - EAP-PEAPv0 / MD5-Challenge
[all …]
/freebsd/contrib/telnet/libtelnet/
H A Dkerberos.c78 #define KRB_CHALLENGE 3 /* Challenge for mutual auth. */
87 static Block challenge = { 0 }; variable
196 * the challenge, and verify it when the response comes back. in kerberos4_send()
204 DES_ecb_encrypt(&session_key, &challenge, sched, 0); in kerberos4_send()
206 * Increment the challenge by 1, and encrypt it for in kerberos4_send()
211 x = (unsigned int)challenge[i] + 1; in kerberos4_send()
212 challenge[i] = x; /* ignore overflow */ in kerberos4_send()
216 DES_ecb_encrypt(&challenge, &challenge, sched, 1); in kerberos4_send()
296 * Take the received encrypted challenge, and encrypt in kerberos4_is()
306 * Now decrypt the received encrypted challenge, in kerberos4_is()
[all …]
H A Dkrb4encpwd.c95 #define KRB4_ENCPWD_CHALLENGE 3 /* Challenge for mutual auth. */
107 static char challenge[REALM_SZ]; variable
210 …if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r…
232 * Take the received random challenge text and save
235 memmove((void *)challenge, (void *)data, sizeof(Block));
241 * Receive ack, if mutual then send random challenge
246 * the challenge, and verify it when the response comes back.
253 sprintf(challenge, "%x", now);
254 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge));
296 * Verify that the response to the challenge is correct.
[all …]
H A Drsaencpwd.c91 #define RSA_ENCPWD_CHALLENGEKEY 3 /* Challenge and public key */
102 static char challenge[CHAL_SZ]; variable
218 r = accept_rsa_encpwd(&auth, key, challenge,
244 * the challenge, and verify it when the response comes back.
252 sprintf(challenge, "%x", now);
253 challenge_len = strlen(challenge);
255 strcpy(challenge, "randchal");
286 memmove(ptr, challenge, challenge_len);
334 * Verify that the response to the challenge is correct.
346 memmove(challenge, ptr, challenge_len);
[all …]
/freebsd/usr.sbin/ppp/
H A Dchap.c95 "???", "CHALLENGE", "RESPONSE", "SUCCESS", "FAILURE"
125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge in chap_BuildAnswer() argument
152 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */ in chap_BuildAnswer()
175 mschap_NT(digest, challenge + 1); in chap_BuildAnswer()
199 /* Copy our challenge */ in chap_BuildAnswer()
214 /* Generate NTRESPONSE to respond on challenge call */ in chap_BuildAnswer()
215 GenerateNTResponse(challenge + 1, peerchallenge + 1, name, in chap_BuildAnswer()
223 peerchallenge + 1, challenge + 1, name, in chap_BuildAnswer()
241 MD5Update(&MD5context, challenge + 1, *challenge); in chap_BuildAnswer()
332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer); in chap_StartChild()
[all …]
H A Dchap_ms.c121 ChallengeResponse(u_char *challenge, u_char *pwHash, u_char *response) in ChallengeResponse() argument
128 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse()
129 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse()
130 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse()
155 char *UserName, char *Challenge) in ChallengeHash() argument
174 memcpy(Challenge, Digest, 8); in ChallengeHash()
182 char Challenge[8]; in GenerateNTResponse() local
185 ChallengeHash(PeerChallenge, AuthenticatorChallenge, UserName, Challenge); in GenerateNTResponse()
187 ChallengeResponse(Challenge, PasswordHash, Response); in GenerateNTResponse()
222 char Challenge[8]; in GenerateAuthenticatorResponse() local
[all …]
/freebsd/crypto/openssh/
H A Dauth-bsdauth.c55 char *challenge = NULL; in bsdauth_query() local
64 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query()
65 if (challenge == NULL) { in bsdauth_query()
71 if (challenge == NULL) { in bsdauth_query()
76 authctxt->style, "auth-ssh", &challenge); in bsdauth_query()
78 challenge = NULL; in bsdauth_query()
79 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
82 if (challenge == NULL) in bsdauth_query()
90 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
55 * CHAP Challenge: in eap_md5_process()
56 * Value-Size (1 octet) | Value(Challenge) | Name(optional) in eap_md5_process()
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " in eap_md5_process()
67 challenge = pos; in eap_md5_process()
68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", in eap_md5_process()
69 challenge, challenge_len); in eap_md5_process()
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
H A Deap_ttls.c344 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge()
541 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2()
565 /* MS-CHAP-Challenge */ in eap_ttls_phase2_request_mschapv2()
566 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2()
568 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2()
571 "implicit challenge"); in eap_ttls_phase2_request_mschapv2()
577 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2()
583 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2()
587 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
590 "random data for peer challenge"); in eap_ttls_phase2_request_mschapv2()
[all …]
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " in eap_leap_process_request()
102 challenge = pos; in eap_leap_process_request()
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", in eap_leap_process_request()
105 challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); in eap_leap_process_request()
118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request()
120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
171 "for challenge"); in eap_leap_process_success()
[all …]
H A Deap_mschapv2.c87 /* Optional challenge values generated in EAP-FAST Phase 1 negotiation
164 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); in eap_mschapv2_challenge_reply()
233 * eap_mschapv2_process - Process an EAP-MSCHAPv2 challenge message
249 const u8 *pos, *challenge; in eap_mschapv2_challenge() local
255 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); in eap_mschapv2_challenge()
257 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " in eap_mschapv2_challenge()
266 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " in eap_mschapv2_challenge()
273 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" in eap_mschapv2_challenge()
281 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " in eap_mschapv2_challenge()
283 challenge = data->passwd_change_challenge; in eap_mschapv2_challenge()
[all …]
/freebsd/crypto/openssl/crypto/ec/curve448/
H A Deddsa.c228 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local
230 /* Compute the challenge */ in ossl_c448_ed448_sign()
236 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign()
239 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign()
240 sizeof(challenge)); in ossl_c448_ed448_sign()
241 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign()
336 /* Compute the challenge */ in ossl_c448_ed448_verify()
338 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local
346 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) { in ossl_c448_ed448_verify()
352 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_verify()
[all …]
/freebsd/crypto/krb5/src/plugins/preauth/spake/
H A Dt_vectors.c51 const char *challenge; member
68 /* support, challenge, thash, body */
93 /* support, challenge, thash, body */
118 /* support, challenge, thash, body */
142 /* support, challenge, thash, body */
168 /* support, challenge, thash, body */
199 /* support, challenge, thash, body */
238 /* support, challenge, thash, body */
257 /* Successful optimistic challenge (no support message in transcript) */
267 /* support, challenge, thash, body */
[all …]
H A Dspake_kdc.c58 * sent with a challenge message. stage is n>0 if the cookie was sent with an
60 * in the SPAKE challenge. The SPAKE value is the KDC private key for a
64 * hash after updating with the support and challenge messages for a stage-0
208 * Generate a SPAKE challenge message for the specified group. Use cb and rock
241 /* Encode the challenge. When second factor support is implemented, we in send_challenge()
248 msg.u.challenge.group = group; in send_challenge()
249 msg.u.challenge.pubkey = kdcpub; in send_challenge()
250 msg.u.challenge.factors = flist; in send_challenge()
256 * we received one) and challenge message. */ in send_challenge()
297 * optimistic challenge if configured to do so. */
[all …]
/freebsd/contrib/wpa/src/crypto/
H A Dms_funcs.c78 * @challenge: 8-octet Challenge (OUT)
82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
97 os_memcpy(challenge, hash, 8); in challenge_hash()
140 * @challenge: 8-octet Challenge (IN)
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
180 username_len, challenge) || in generate_nt_response()
[all …]
/freebsd/crypto/openssh/regress/misc/ssh-verify-attestation/
H A Dssh-verify-attestation.c21 * the attestation object and challenge used when creating the key be
26 * $ # Generate a random challenge.
27 * $ dd if=/dev/urandom of=key_ecdsa_sk.challenge bs=32 count=1
30 * -Ochallenge=key_ecdsa_sk.challenge \
32 * $ # Validate the challenge (-A = print attestation CA cert)
33 * $ ./obj/ssh-verify-attestation -A key_ecdsa_sk key_ecdsa_sk.challenge \
80 const char *rp_id, struct sshbuf *b, const struct sshbuf *challenge, in prepare_fido_cred() argument
109 "authdata len=%zu challenge len=%zu", sshbuf_len(attestation_cert), in prepare_fido_cred()
110 sshbuf_len(sig), sshbuf_len(authdata), sshbuf_len(challenge)); in prepare_fido_cred()
114 fido_cred_set_clientdata(cred, sshbuf_ptr(challenge), in prepare_fido_cred()
[all …]
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-spkac.175 [\fB\-challenge\fR \fIstring\fR]
88 This command processes Netscape signed public key and challenge
121 .IP "\fB\-challenge\fR \fIstring\fR" 4
122 .IX Item "-challenge string"
123 Specifies the challenge string if an SPKAC is being created.
173 Create an SPKAC using the challenge string "hello":
176 \& openssl spkac \-key key.pem \-challenge hello \-out spkac.cnf
198 The challenge string permits a primitive form of proof of possession
199 of private key. By checking the SPKAC signature and a random challenge
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-spkac.pod.in22 [B<-challenge> I<string>]
32 This command processes Netscape signed public key and challenge
75 =item B<-challenge> I<string>
77 Specifies the challenge string if an SPKAC is being created.
120 Create an SPKAC using the challenge string "hello":
122 openssl spkac -key key.pem -challenge hello -out spkac.cnf
142 The challenge string permits a primitive form of proof of possession
143 of private key. By checking the SPKAC signature and a random challenge
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A Drsaencpwd.c100 #define RSA_ENCPWD_CHALLENGEKEY 3 /* Challenge and public key */
111 static char challenge[CHAL_SZ]; variable
226 r = accept_rsa_encpwd(&auth, key, challenge,
252 * the challenge, and verify it when the response comes back.
260 snprintf(challenge, sizeof(challenge), "%x", now);
261 challenge_len = strlen(challenge);
263 strlcpy(challenge, "randchal", sizeof(challenge));
294 memmove(ptr, challenge, challenge_len);
342 * Verify that the response to the challenge is correct.
354 memmove(challenge, ptr, challenge_len);
[all …]
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dpreauth_otp.c50 free(ti->challenge); in free_tokeninfo()
177 retval = codec_data_to_value(&ti->challenge, obj, "challenge"); in codec_encode_tokeninfo()
282 retval = codec_value_to_string(obj, "challenge", &ti->challenge); in codec_decode_tokeninfo()
424 /* Takes the nonce from the challenge and encrypts it into the request. */
550 /* Builds a challenge string from the given tokeninfo. */
552 make_challenge(const krb5_otp_tokeninfo *ti, char **challenge) in make_challenge() argument
554 if (challenge == NULL) in make_challenge()
557 *challenge = NULL; in make_challenge()
559 if (ti == NULL || ti->challenge.data == NULL) in make_challenge()
562 if (asprintf(challenge, "%s %.*s\n", in make_challenge()
[all …]
H A Dresponse_items.c109 const char *challenge) in push_question() argument
143 if (challenge != NULL) { in push_question()
144 ri->challenges[ri->count] = strdup(challenge); in push_question()
158 const char *challenge) in k5_response_items_ask_question() argument
165 return push_question(ri, question, challenge); in k5_response_items_ask_question()
167 if (challenge != NULL) { in k5_response_items_ask_question()
168 tmp = strdup(challenge); in k5_response_items_ask_question()
/freebsd/crypto/openssl/apps/
H A Dspkac.c45 {"challenge", OPT_CHALLENGE, 's', "Challenge string"},
66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
114 challenge = opt_arg(); in spkac_main()
155 if (challenge != NULL in spkac_main()
156 && !ASN1_STRING_set(spki->spkac->challenge, in spkac_main()
157 challenge, (int)strlen(challenge))) in spkac_main()
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_ttls.c274 "EAP-TTLS: CHAP-Challenge (CHAP)", in eap_ttls_avp_parse()
288 "EAP-TTLS: MS-CHAP-Challenge", in eap_ttls_avp_parse()
334 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge()
558 const u8 *challenge, in eap_ttls_process_phase2_chap() argument
565 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap()
569 "(challenge len %lu password len %lu)", in eap_ttls_process_phase2_chap()
588 "challenge from TLS data"); in eap_ttls_process_phase2_chap()
593 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap()
596 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Challenge mismatch"); in eap_ttls_process_phase2_chap()
603 /* MD5(Ident + Password + Challenge) */ in eap_ttls_process_phase2_chap()
[all …]
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq()
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq()
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq()
123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
/freebsd/lib/libiscsiutil/
H A Dchap.c42 const void *challenge, size_t challenge_len, void *response, in chap_compute_md5() argument
52 MD5Update(&ctx, challenge, challenge_len); in chap_compute_md5()
237 * Generate the challenge. in chap_new()
344 const void *challenge, size_t challenge_len) in rchap_receive_bin() argument
351 memcpy(rchap->rchap_challenge, challenge, challenge_len); in rchap_receive_bin()
356 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) in rchap_receive() argument
366 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len); in rchap_receive()
368 log_debugx("got incorrectly encoded CHAP challenge \"%s\"", in rchap_receive()
369 challenge); in rchap_receive()

12345678910>>...12