/freebsd/contrib/telnet/libtelnet/ |
H A D | rsaencpwd.c | 103 static int challenge_len; variable 219 challenge_len, r_passwd); 253 challenge_len = strlen(challenge); 256 challenge_len = 8; 281 chalkey_len = 1+NumEncodeLengthOctets(i)+i+1+NumEncodeLengthOctets(challenge_len)+challenge_len; 285 *ptr++ = challenge_len; 286 memmove(ptr, challenge, challenge_len); 287 ptr += challenge_len; 344 challenge_len = DecodeValueLength(ptr); 345 ptr += NumEncodeLengthOctets(challenge_len); [all …]
|
/freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 112 static int challenge_len; variable 227 challenge_len, r_passwd); 261 challenge_len = strlen(challenge); 264 challenge_len = 8; 289 chalkey_len = 1+NumEncodeLengthOctets(i)+i+1+NumEncodeLengthOctets(challenge_len)+challenge_len; 293 *ptr++ = challenge_len; 294 memmove(ptr, challenge, challenge_len); 295 ptr += challenge_len; 352 challenge_len = DecodeValueLength(ptr); 353 ptr += NumEncodeLengthOctets(challenge_len); [all …]
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; in eap_md5_process() local 58 challenge_len = *pos++; in eap_md5_process() 59 if (challenge_len == 0 || challenge_len > len - 1) { in eap_md5_process() 62 (unsigned long) challenge_len, (unsigned long) len); in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
H A D | eap_leap.c | 66 u8 challenge_len, *rpos; in eap_leap_process_request() local 94 challenge_len = *pos++; in eap_leap_process_request() 95 if (challenge_len != LEAP_CHALLENGE_LEN || challenge_len > len - 3) { in eap_leap_process_request() 98 challenge_len, (unsigned long) wpabuf_len(reqData)); in eap_leap_process_request()
|
H A D | eap_mschapv2.c | 248 size_t len, challenge_len; in eap_mschapv2_challenge() local 263 challenge_len = *pos++; in eap_mschapv2_challenge() 265 if (challenge_len != MSCHAPV2_CHAL_LEN) { in eap_mschapv2_challenge() 267 "%lu", (unsigned long) challenge_len); in eap_mschapv2_challenge() 272 if (len < challenge_len) { in eap_mschapv2_challenge() 275 (unsigned long) len, (unsigned long) challenge_len); in eap_mschapv2_challenge() 286 pos += challenge_len; in eap_mschapv2_challenge() 287 len -= challenge_len; in eap_mschapv2_challenge()
|
/freebsd/lib/libiscsiutil/ |
H A D | chap.c | 42 const void *challenge, size_t challenge_len, void *response, in chap_compute_md5() argument 52 MD5Update(&ctx, challenge, challenge_len); in chap_compute_md5() 344 const void *challenge, size_t challenge_len) in rchap_receive_bin() argument 348 rchap->rchap_challenge = calloc(challenge_len, 1); in rchap_receive_bin() 351 memcpy(rchap->rchap_challenge, challenge, challenge_len); in rchap_receive_bin() 352 rchap->rchap_challenge_len = challenge_len; in rchap_receive_bin()
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | chap.c | 16 size_t challenge_len, u8 *response) in chap_md5() argument 26 len[2] = challenge_len; in chap_md5()
|
H A D | chap.h | 15 size_t challenge_len, u8 *response);
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_ttls.c | 559 size_t challenge_len, in eap_ttls_process_phase2_chap() argument 566 challenge_len != EAP_TTLS_CHAP_CHALLENGE_LEN || in eap_ttls_process_phase2_chap() 570 (unsigned long) challenge_len, in eap_ttls_process_phase2_chap() 605 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap() 621 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() argument 627 challenge_len != EAP_TTLS_MSCHAP_CHALLENGE_LEN || in eap_ttls_process_phase2_mschap() 631 (unsigned long) challenge_len, in eap_ttls_process_phase2_mschap() 697 size_t challenge_len, in eap_ttls_process_phase2_mschapv2() argument 705 challenge_len != EAP_TTLS_MSCHAPV2_CHALLENGE_LEN || in eap_ttls_process_phase2_mschapv2() 709 (unsigned long) challenge_len, in eap_ttls_process_phase2_mschapv2()
|
/freebsd/crypto/openssh/ |
H A D | ssh-sk.c | 67 size_t challenge_len, const char *application, uint8_t flags, 85 size_t challenge_len, const char *application, uint8_t flags, 487 size_t challenge_len; in sshsk_enroll() local 534 challenge_len = sizeof(randchall); in sshsk_enroll() 541 challenge_len = sshbuf_len(challenge_buf); in sshsk_enroll() 542 debug3_f("using explicit challenge len=%zd", challenge_len); in sshsk_enroll() 550 if ((r = skp->sk_enroll(alg, challenge, challenge_len, application, in sshsk_enroll()
|
H A D | sk-api.h | 89 int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len,
|
H A D | sk-usbhid.c | 122 int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len, 833 sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len, in sk_enroll() argument 906 challenge, challenge_len)) != FIDO_OK) { in sk_enroll()
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_srvr.c | 1459 unsigned int ciphersuite_len, session_id_len, challenge_len; in tls_process_client_hello() local 1464 || !PACKET_get_net_2(pkt, &challenge_len)) { in tls_process_client_hello() 1477 || !PACKET_get_sub_packet(pkt, &challenge, challenge_len) in tls_process_client_hello() 1490 challenge_len = challenge_len > SSL3_RANDOM_SIZE in tls_process_client_hello() 1491 ? SSL3_RANDOM_SIZE : challenge_len; in tls_process_client_hello() 1495 challenge_len, challenge_len) in tls_process_client_hello()
|
/freebsd/contrib/wpa/src/common/ |
H A D | ieee802_11_common.h | 122 u8 challenge_len; member
|
H A D | ieee802_11_common.c | 462 elems->challenge_len = elen; in __ieee802_11_parse_elems() 727 elems->challenge_len = 0; in ieee802_11_elems_clear_ids()
|
/freebsd/crypto/openssh/regress/misc/sk-dummy/ |
H A D | sk-dummy.c | 234 sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len, in sk_enroll() argument
|