Home
last modified time | relevance | path

Searched refs:challenge_len (Results 1 – 16 of 16) sorted by relevance

/freebsd/contrib/telnet/libtelnet/
H A Drsaencpwd.c103 static int challenge_len; variable
219 challenge_len, r_passwd);
253 challenge_len = strlen(challenge);
256 challenge_len = 8;
281 chalkey_len = 1+NumEncodeLengthOctets(i)+i+1+NumEncodeLengthOctets(challenge_len)+challenge_len;
285 *ptr++ = challenge_len;
286 memmove(ptr, challenge, challenge_len);
287 ptr += challenge_len;
344 challenge_len = DecodeValueLength(ptr);
345 ptr += NumEncodeLengthOctets(challenge_len);
[all …]
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A Drsaencpwd.c112 static int challenge_len; variable
227 challenge_len, r_passwd);
261 challenge_len = strlen(challenge);
264 challenge_len = 8;
289 chalkey_len = 1+NumEncodeLengthOctets(i)+i+1+NumEncodeLengthOctets(challenge_len)+challenge_len;
293 *ptr++ = challenge_len;
294 memmove(ptr, challenge, challenge_len);
295 ptr += challenge_len;
352 challenge_len = DecodeValueLength(ptr);
353 ptr += NumEncodeLengthOctets(challenge_len);
[all …]
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_md5.c36 size_t len, challenge_len, password_len; in eap_md5_process() local
58 challenge_len = *pos++; in eap_md5_process()
59 if (challenge_len == 0 || challenge_len > len - 1) { in eap_md5_process()
62 (unsigned long) challenge_len, (unsigned long) len); in eap_md5_process()
69 challenge, challenge_len); in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
H A Deap_leap.c66 u8 challenge_len, *rpos; in eap_leap_process_request() local
94 challenge_len = *pos++; in eap_leap_process_request()
95 if (challenge_len != LEAP_CHALLENGE_LEN || challenge_len > len - 3) { in eap_leap_process_request()
98 challenge_len, (unsigned long) wpabuf_len(reqData)); in eap_leap_process_request()
H A Deap_mschapv2.c248 size_t len, challenge_len; in eap_mschapv2_challenge() local
263 challenge_len = *pos++; in eap_mschapv2_challenge()
265 if (challenge_len != MSCHAPV2_CHAL_LEN) { in eap_mschapv2_challenge()
267 "%lu", (unsigned long) challenge_len); in eap_mschapv2_challenge()
272 if (len < challenge_len) { in eap_mschapv2_challenge()
275 (unsigned long) len, (unsigned long) challenge_len); in eap_mschapv2_challenge()
286 pos += challenge_len; in eap_mschapv2_challenge()
287 len -= challenge_len; in eap_mschapv2_challenge()
/freebsd/lib/libiscsiutil/
H A Dchap.c42 const void *challenge, size_t challenge_len, void *response, in chap_compute_md5() argument
52 MD5Update(&ctx, challenge, challenge_len); in chap_compute_md5()
344 const void *challenge, size_t challenge_len) in rchap_receive_bin() argument
348 rchap->rchap_challenge = calloc(challenge_len, 1); in rchap_receive_bin()
351 memcpy(rchap->rchap_challenge, challenge, challenge_len); in rchap_receive_bin()
352 rchap->rchap_challenge_len = challenge_len; in rchap_receive_bin()
/freebsd/contrib/wpa/src/eap_common/
H A Dchap.c16 size_t challenge_len, u8 *response) in chap_md5() argument
26 len[2] = challenge_len; in chap_md5()
H A Dchap.h15 size_t challenge_len, u8 *response);
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_ttls.c559 size_t challenge_len, in eap_ttls_process_phase2_chap() argument
566 challenge_len != EAP_TTLS_CHAP_CHALLENGE_LEN || in eap_ttls_process_phase2_chap()
570 (unsigned long) challenge_len, in eap_ttls_process_phase2_chap()
605 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap()
621 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() argument
627 challenge_len != EAP_TTLS_MSCHAP_CHALLENGE_LEN || in eap_ttls_process_phase2_mschap()
631 (unsigned long) challenge_len, in eap_ttls_process_phase2_mschap()
697 size_t challenge_len, in eap_ttls_process_phase2_mschapv2() argument
705 challenge_len != EAP_TTLS_MSCHAPV2_CHALLENGE_LEN || in eap_ttls_process_phase2_mschapv2()
709 (unsigned long) challenge_len, in eap_ttls_process_phase2_mschapv2()
/freebsd/crypto/openssh/
H A Dssh-sk.c67 size_t challenge_len, const char *application, uint8_t flags,
85 size_t challenge_len, const char *application, uint8_t flags,
487 size_t challenge_len; in sshsk_enroll() local
534 challenge_len = sizeof(randchall); in sshsk_enroll()
541 challenge_len = sshbuf_len(challenge_buf); in sshsk_enroll()
542 debug3_f("using explicit challenge len=%zd", challenge_len); in sshsk_enroll()
550 if ((r = skp->sk_enroll(alg, challenge, challenge_len, application, in sshsk_enroll()
H A Dsk-api.h89 int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len,
H A Dsk-usbhid.c122 int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len,
833 sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len, in sk_enroll() argument
906 challenge, challenge_len)) != FIDO_OK) { in sk_enroll()
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_srvr.c1459 unsigned int ciphersuite_len, session_id_len, challenge_len; in tls_process_client_hello() local
1464 || !PACKET_get_net_2(pkt, &challenge_len)) { in tls_process_client_hello()
1477 || !PACKET_get_sub_packet(pkt, &challenge, challenge_len) in tls_process_client_hello()
1490 challenge_len = challenge_len > SSL3_RANDOM_SIZE in tls_process_client_hello()
1491 ? SSL3_RANDOM_SIZE : challenge_len; in tls_process_client_hello()
1495 challenge_len, challenge_len) in tls_process_client_hello()
/freebsd/contrib/wpa/src/common/
H A Dieee802_11_common.h122 u8 challenge_len; member
H A Dieee802_11_common.c462 elems->challenge_len = elen; in __ieee802_11_parse_elems()
727 elems->challenge_len = 0; in ieee802_11_elems_clear_ids()
/freebsd/crypto/openssh/regress/misc/sk-dummy/
H A Dsk-dummy.c234 sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len, in sk_enroll() argument