Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 95) sorted by relevance

1234

/freebsd/crypto/openssh/
H A Dauth-bsdauth.c55 char *challenge = NULL; in bsdauth_query() local
64 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query()
65 if (challenge == NULL) { in bsdauth_query()
71 if (challenge == NULL) { in bsdauth_query()
76 authctxt->style, "auth-ssh", &challenge); in bsdauth_query()
78 challenge = NULL; in bsdauth_query()
79 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
82 if (challenge == NULL) in bsdauth_query()
90 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
H A Dssh-sk-helper.c155 struct sshbuf *challenge, *attest, *kbuf, *resp; in process_enroll() local
169 (r = sshbuf_froms(req, &challenge)) != 0) in process_enroll()
176 if (sshbuf_len(challenge) == 0) { in process_enroll()
177 sshbuf_free(challenge); in process_enroll()
178 challenge = NULL; in process_enroll()
185 flags, pin, challenge, &key, attest)) != 0) { in process_enroll()
203 sshbuf_free(challenge); in process_enroll()
/freebsd/contrib/wpa/src/crypto/
H A Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
97 os_memcpy(challenge, hash, 8); in challenge_hash()
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
180 username_len, challenge) || in generate_nt_response()
182 challenge_response(challenge, password_hash, response)) in generate_nt_response()
204 u8 challenge[8]; in generate_nt_response_pwhash() local
[all …]
H A Dms_funcs.h31 int nt_challenge_response(const u8 *challenge, const u8 *password,
34 int challenge_response(const u8 *challenge, const u8 *password_hash,
37 const u8 *username, size_t username_len, u8 *challenge);
/freebsd/contrib/telnet/libtelnet/
H A Dkerberos.c87 static Block challenge = { 0 }; variable
204 DES_ecb_encrypt(&session_key, &challenge, sched, 0); in kerberos4_send()
211 x = (unsigned int)challenge[i] + 1; in kerberos4_send()
212 challenge[i] = x; /* ignore overflow */ in kerberos4_send()
216 DES_ecb_encrypt(&challenge, &challenge, sched, 1); in kerberos4_send()
309 DES_ecb_encrypt(&datablock, &challenge, sched, 0); in kerberos4_is()
312 t = (unsigned int)challenge[r] + 1; in kerberos4_is()
313 challenge[r] = t; /* ignore overflow */ in kerberos4_is()
317 DES_ecb_encrypt(&challenge, &challenge, sched, 1); in kerberos4_is()
318 Data(ap, KRB_RESPONSE, challenge, sizeof(challenge)); in kerberos4_is()
[all …]
H A Drsaencpwd.c102 static char challenge[CHAL_SZ]; variable
218 r = accept_rsa_encpwd(&auth, key, challenge,
252 sprintf(challenge, "%x", now);
253 challenge_len = strlen(challenge);
255 strcpy(challenge, "randchal");
286 memmove(ptr, challenge, challenge_len);
346 memmove(challenge, ptr, challenge_len);
358 Challenge = challenge;
359 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
H A Dkrb4encpwd.c107 static char challenge[REALM_SZ]; variable
210 …if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r…
235 memmove((void *)challenge, (void *)data, sizeof(Block));
253 sprintf(challenge, "%x", now);
254 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge));
301 memmove((void *)challenge, (void *)data, cnt);
305 Challenge = challenge;
/freebsd/usr.sbin/ppp/
H A Dchap.c125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge in chap_BuildAnswer() argument
152 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */ in chap_BuildAnswer()
175 mschap_NT(digest, challenge + 1); in chap_BuildAnswer()
215 GenerateNTResponse(challenge + 1, peerchallenge + 1, name, in chap_BuildAnswer()
223 peerchallenge + 1, challenge + 1, name, in chap_BuildAnswer()
241 MD5Update(&MD5context, challenge + 1, *challenge); in chap_BuildAnswer()
332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer); in chap_StartChild()
361 *chap->challenge.local = *chap->challenge.peer = '\0'; in chap_Cleanup()
376 ans = chap_BuildAnswer(name, key, chap->auth.id, chap->challenge.peer in chap_Respond()
378 , type, chap->challenge.local, chap->authresponse, lm in chap_Respond()
[all …]
H A Dchap_ms.c121 ChallengeResponse(u_char *challenge, u_char *pwHash, u_char *response) in ChallengeResponse() argument
128 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse()
129 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse()
130 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse()
389 mschap_NT(char *passwordHash, char *challenge) in mschap_NT() argument
393 ChallengeResponse(challenge, passwordHash, response); in mschap_NT()
399 mschap_LANMan(char *digest, char *challenge, char *secret) in mschap_LANMan() argument
414 ChallengeResponse(challenge, hash, digest); in mschap_LANMan()
/freebsd/crypto/openssl/crypto/ec/curve448/
H A Deddsa.c232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local
240 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign()
243 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign()
244 sizeof(challenge)); in ossl_c448_ed448_sign()
245 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign()
331 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local
339 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) { in ossl_c448_ed448_verify()
345 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_verify()
346 sizeof(challenge)); in ossl_c448_ed448_verify()
347 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_verify()
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A Drsaencpwd.c111 static char challenge[CHAL_SZ]; variable
226 r = accept_rsa_encpwd(&auth, key, challenge,
260 snprintf(challenge, sizeof(challenge), "%x", now);
261 challenge_len = strlen(challenge);
263 strlcpy(challenge, "randchal", sizeof(challenge));
294 memmove(ptr, challenge, challenge_len);
354 memmove(challenge, ptr, challenge_len);
366 Challenge = challenge;
367 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
/freebsd/crypto/openssl/apps/
H A Dspkac.c66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
114 challenge = opt_arg(); in spkac_main()
156 if (challenge != NULL) in spkac_main()
157 ASN1_STRING_set(spki->spkac->challenge, in spkac_main()
158 challenge, (int)strlen(challenge)); in spkac_main()
/freebsd/lib/libiscsiutil/
H A Dchap.c42 const void *challenge, size_t challenge_len, void *response, in chap_compute_md5() argument
52 MD5Update(&ctx, challenge, challenge_len); in chap_compute_md5()
344 const void *challenge, size_t challenge_len) in rchap_receive_bin() argument
351 memcpy(rchap->rchap_challenge, challenge, challenge_len); in rchap_receive_bin()
356 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) in rchap_receive() argument
366 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len); in rchap_receive()
369 challenge); in rchap_receive()
/freebsd/crypto/heimdal/kuser/
H A Dkdigest.c276 unsigned char md[SHA_DIGEST_LENGTH], challenge[SHA_DIGEST_LENGTH]; in client_mschapv2() local
328 EVP_DigestFinal_ex(ctx, challenge, NULL); in client_mschapv2()
332 EVP_DigestUpdate(ctx, challenge, 8); in client_mschapv2()
436 krb5_data challenge, opaque; in ntlm_server_init() local
461 ret = krb5_ntlm_init_get_challange(context, ntlm, &challenge); in ntlm_server_init()
465 if (challenge.length != sizeof(type2.challenge)) in ntlm_server_init()
467 memcpy(type2.challenge, challenge.data, sizeof(type2.challenge)); in ntlm_server_init()
468 krb5_data_free(&challenge); in ntlm_server_init()
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
67 challenge = pos; in eap_md5_process()
69 challenge, challenge_len); in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
H A Deap_ttls.c541 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2()
566 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2()
568 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2()
577 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2()
583 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2()
587 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
598 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2()
601 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
610 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
635 u8 *buf, *pos, *challenge; in eap_ttls_phase2_request_mschap()
[all …]
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
102 challenge = pos; in eap_leap_process_request()
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
105 challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request()
120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq()
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq()
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq()
123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
H A Deap_server_ttls.c558 const u8 *challenge, in eap_ttls_process_phase2_chap() argument
565 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap()
593 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap()
605 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap()
621 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() argument
626 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap()
657 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap()
660 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_mschap()
671 challenge_response(challenge, sm->user->password, nt_response)) || in eap_ttls_process_phase2_mschap()
673 nt_challenge_response(challenge, sm->user->password, in eap_ttls_process_phase2_mschap()
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-spkac.pod.in22 [B<-challenge> I<string>]
32 This command processes Netscape signed public key and challenge
75 =item B<-challenge> I<string>
77 Specifies the challenge string if an SPKAC is being created.
120 Create an SPKAC using the challenge string "hello":
122 openssl spkac -key key.pem -challenge hello -out spkac.cnf
142 The challenge string permits a primitive form of proof of possession
143 of private key. By checking the SPKAC signature and a random challenge
/freebsd/crypto/heimdal/lib/ntlm/
H A Dtest_ntlm.c87 memset(type2.challenge, 0x7f, sizeof(type2.challenge)); in test_parse()
121 type2.challenge, in test_parse()
160 memset(type2.challenge, 0x7f, sizeof(type2.challenge)); in test_parse()
/freebsd/contrib/wpa/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
25 addr[2] = challenge; in chap_md5()
/freebsd/contrib/libfido2/src/
H A Du2f.c149 unsigned char challenge[SHA256_DIGEST_LENGTH]; in send_dummy_register() local
154 memset(&challenge, 0xff, sizeof(challenge)); in send_dummy_register()
159 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 || in send_dummy_register()
205 unsigned char challenge[SHA256_DIGEST_LENGTH]; in key_lookup() local
217 memset(&challenge, 0xff, sizeof(challenge)); in key_lookup()
231 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 || in key_lookup()
/freebsd/share/examples/ppp/
H A Dchap-auth43 set challenge [gets stdin];
81 mkframe c "Challenge:" $challenge 0;
/freebsd/sys/contrib/device-tree/Bindings/i2c/
H A Di2c-arb-gpio-challenge.txt3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
43 - compatible: i2c-arb-gpio-challenge
64 compatible = "i2c-arb-gpio-challenge";

1234