Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 49) sorted by relevance

12

/titanic_41/usr/src/cmd/ssh/sshd/
H A Dauth-bsdauth.c45 char *challenge = NULL; in bsdauth_query() local
49 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query()
50 if (challenge == NULL) { in bsdauth_query()
56 if (challenge == NULL) { in bsdauth_query()
61 authctxt->style, "auth-ssh", &challenge); in bsdauth_query()
63 challenge = NULL; in bsdauth_query()
64 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
67 if (challenge == NULL) in bsdauth_query()
76 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
H A Dauth-rsa.c61 BIGNUM *challenge; in auth_rsa_generate_challenge() local
64 if ((challenge = BN_new()) == NULL) in auth_rsa_generate_challenge()
67 BN_rand(challenge, 256, 0, 0); in auth_rsa_generate_challenge()
70 BN_mod(challenge, challenge, key->rsa->n, ctx); in auth_rsa_generate_challenge()
73 return challenge; in auth_rsa_generate_challenge()
77 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) in auth_rsa_verify_response() argument
91 len = BN_num_bytes(challenge); in auth_rsa_verify_response()
95 BN_bn2bin(challenge, buf + 32 - len); in auth_rsa_verify_response()
119 BIGNUM *challenge, *encrypted_challenge; in auth_rsa_challenge_dialog() local
126 challenge = auth_rsa_generate_challenge(key); in auth_rsa_challenge_dialog()
[all …]
H A Dauth-skey.c47 char challenge[1024], *p; in skey_query() local
51 if (skeychallenge(&skey, authctxt->user, challenge) == -1) in skey_query()
61 len = strlen(challenge) + strlen(SKEY_PROMPT) + 1; in skey_query()
63 strlcpy(p, challenge, len); in skey_query()
H A Dauth-chall.c42 char *challenge, *name, *info, **prompts; in get_challenge() local
59 challenge = xstrdup(prompts[0]); in get_challenge()
67 return (challenge); in get_challenge()
H A Dauth1.c288 char *challenge = get_challenge(authctxt); in do_authloop() local
289 if (challenge != NULL) { in do_authloop()
290 debug("sending challenge '%s'", challenge); in do_authloop()
292 packet_put_cstring(challenge); in do_authloop()
293 xfree(challenge); in do_authloop()
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dmschap_test.c42 u_char challenge[8]; local
43 int challengeInt[sizeof(challenge)];
57 for (i = 0; i < sizeof(challenge); i++)
58 challenge[i] = (u_char)challengeInt[i];
61 ChapMS(&cstate, challenge, sizeof(challenge), argv[2], strlen(argv[2]));
68 cstate.chal_len = sizeof(challenge);
69 BCOPY(challenge, cstate.challenge, cstate.chal_len);
83 ChapMSv2(&cstate, cstate.challenge, 16, argv[2], strlen(argv[2]));
H A Dchap_ms.c124 ChallengeResponse(challenge, pwHash, response) in ChallengeResponse() argument
125 u_char *challenge; /* IN 8 octets */ in ChallengeResponse()
139 DesEncrypt(challenge, ZPasswordHash + 0, response + 0);
140 DesEncrypt(challenge, ZPasswordHash + 7, response + 8);
141 DesEncrypt(challenge, ZPasswordHash + 14, response + 16);
409 ChapMS_NT(cstate->challenge, secret, secret_len, &ckresp);
415 ChapMS_LANMan(cstate->challenge, secret, secret_len, &ckresp);
426 ChallengeHash(peerchallenge, authenticatorchallenge, username, challenge) in ChallengeHash() argument
427 u_char *peerchallenge, *authenticatorchallenge, *challenge; in ChallengeHash()
448 BCOPY(digest, challenge, 8);
[all …]
/titanic_41/usr/src/lib/libldap5/sources/ldap/common/
H A Dcram_md5.c72 struct berval *challenge = NULL; in ldap_sasl_cram_md5_bind_s() local
83 …((res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, NULL, serverctrls, clientctrls, &challenge)) in ldap_sasl_cram_md5_bind_s()
87 if (challenge == NULL){ in ldap_sasl_cram_md5_bind_s()
91 LDAPDebug (LDAP_DEBUG_TRACE, "SASL challenge: %s\n", challenge->bv_val, 0, 0); in ldap_sasl_cram_md5_bind_s()
93 hmac_md5((unsigned char *)challenge->bv_val, challenge->bv_len, in ldap_sasl_cram_md5_bind_s()
95 ber_bvfree(challenge); in ldap_sasl_cram_md5_bind_s()
96 challenge = NULL; in ldap_sasl_cram_md5_bind_s()
112 res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, &resp, serverctrls, clientctrls, &challenge); in ldap_sasl_cram_md5_bind_s()
H A Ddigest_md5.c598 const char *challenge, in ldap_digest_md5_encode() argument
611 if (challenge == NULL || username == NULL || passwd == NULL) { in ldap_digest_md5_encode()
617 ret = digest_parse(challenge, 0, &attrs); in ldap_digest_md5_encode()
635 outlen = strlen(challenge) + DIGEST_CLIENT_EXTRA + 1; in ldap_digest_md5_encode()
667 struct berval *challenge = NULL; in ldap_x_sasl_digest_md5_bind_s() local
683 NULL, serverctrls, clientctrls, &challenge); in ldap_x_sasl_digest_md5_bind_s()
686 if (challenge != NULL) { in ldap_x_sasl_digest_md5_bind_s()
689 challenge->bv_val, 0, 0); in ldap_x_sasl_digest_md5_bind_s()
690 errnum = ldap_digest_md5_encode(challenge->bv_val, in ldap_x_sasl_digest_md5_bind_s()
692 ber_bvfree(challenge); in ldap_x_sasl_digest_md5_bind_s()
[all …]
/titanic_41/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_auth.c120 unsigned char *challenge, int clen, in smb_auth_lm_response() argument
134 challenge, clen)); in smb_auth_lm_response()
177 unsigned char *challenge, int clen, in smb_auth_ntlm_response() argument
185 S21, 21, challenge, clen) == SMBAUTH_FAILURE) in smb_auth_ntlm_response()
310 unsigned char *challenge, in smb_lm_password_ok() argument
318 rc = smb_auth_lm_response(lm_hash, challenge, clen, lm_resp); in smb_lm_password_ok()
327 unsigned char *challenge, in smb_ntlm_password_ok() argument
337 rc = smb_auth_ntlm_response(ntlm_hash, challenge, clen, ntlm_resp); in smb_ntlm_password_ok()
352 unsigned char *challenge, in smb_ntlmv2_password_ok() argument
406 if (smb_auth_v2_response(ntlmv2_hash, challenge, in smb_ntlmv2_password_ok()
[all …]
/titanic_41/usr/src/cmd/ssh/ssh/
H A Dsshconnect1.c78 BIGNUM *challenge; in try_agent_authentication() local
85 if ((challenge = BN_new()) == NULL) in try_agent_authentication()
117 packet_get_bignum(challenge); in try_agent_authentication()
123 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) { in try_agent_authentication()
148 BN_clear_free(challenge); in try_agent_authentication()
158 BN_clear_free(challenge); in try_agent_authentication()
168 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) in respond_to_rsa_challenge() argument
176 if (rsa_private_decrypt(challenge, challenge, prv) <= 0) in respond_to_rsa_challenge()
182 len = BN_num_bytes(challenge); in respond_to_rsa_challenge()
188 BN_bn2bin(challenge, buf + sizeof(buf) - len); in respond_to_rsa_challenge()
[all …]
/titanic_41/usr/src/uts/common/io/comstar/port/iscsit/
H A Discsit_radiusauth.c47 uint8_t *challenge,
57 uint8_t *challenge, in iscsit_radius_chap_validate() argument
91 challenge, in iscsit_radius_chap_validate()
159 uint8_t *challenge, in set_radius_attrs() argument
176 bcopy(challenge, in set_radius_attrs()
H A Dradius_auth.h58 uint8_t *challenge,
/titanic_41/usr/src/uts/common/io/scsi/adapters/iscsi/
H A Dradius_auth.c51 uint8_t *challenge,
61 uint8_t *challenge, in radius_chap_validate() argument
95 challenge, in radius_chap_validate()
160 uint8_t *challenge, in set_radius_attrs() argument
177 bcopy(challenge, in set_radius_attrs()
H A Dchap.c35 uint8_t *challenge, in chap_validate_tgt() argument
54 challenge, in chap_validate_tgt()
H A Dradius_auth.h61 uint8_t *challenge,
H A Dchap.h86 uint8_t *challenge,
/titanic_41/usr/src/lib/sasl_plugins/cram/
H A Dcram.c109 char *challenge; member
115 const char *challenge __attribute__((unused)), in crammd5_server_mech_new() argument
222 text->challenge = sparams->utils->malloc(200 + 1); in crammd5_server_mech_step1()
223 if (text->challenge == NULL) { in crammd5_server_mech_step1()
229 snprintf(text->challenge, 200, "<%s.%s@%s>", randdigits, time, in crammd5_server_mech_step1()
232 *serverout = text->challenge; in crammd5_server_mech_step1()
233 *serveroutlen = strlen(text->challenge); in crammd5_server_mech_step1()
371 (const unsigned char *) text->challenge, in crammd5_server_mech_step2()
372 strlen(text->challenge)); in crammd5_server_mech_step2()
476 if (text->challenge) _plug_free_string(utils,&(text->challenge)); in crammd5_server_mech_dispose()
/titanic_41/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c511 const char *challenge, const char *promptstr, argument
541 challenge, promptstr, NULL, result, NULL);
643 (prompts)->challenge = convert_prompt(utils, h,
646 (prompts)->challenge = "Authorization Name";
657 (prompts)->challenge = convert_prompt(utils, h,
660 (prompts)->challenge = "Authentication Name";
671 (prompts)->challenge = convert_prompt(utils, h, gettext("Password"));
673 (prompts)->challenge = "Password";
683 (prompts)->challenge = echo_chal;
692 (prompts)->challenge = realm_chal;
[all …]
/titanic_41/usr/src/lib/libsasl/include/
H A Dsasl.h571 const char *challenge,
841 const char *challenge; /* presented to user (e.g. OTP challenge) */ member
1101 const char *challenge, unsigned challen,
/titanic_41/usr/src/lib/libsasl/lib/
H A Dcheckpw.c265 const char *challenge, in _sasl_auxprop_verify_apop() argument
282 if (!conn || !userstr || !challenge || !response) in _sasl_auxprop_verify_apop()
311 _sasl_MD5Update(&ctx, challenge, strlen(challenge)); in _sasl_auxprop_verify_apop()
/titanic_41/usr/src/cmd/ssh/ssh-agent/
H A Dssh-agent.c227 BIGNUM *challenge; in process_authentication_challenge1() local
236 if ((challenge = BN_new()) == NULL) in process_authentication_challenge1()
242 buffer_get_bignum(&e->request, challenge); in process_authentication_challenge1()
256 if (rsa_private_decrypt(challenge, challenge, private->rsa) <= 0) in process_authentication_challenge1()
260 len = BN_num_bytes(challenge); in process_authentication_challenge1()
266 BN_bn2bin(challenge, buf + 32 - len); in process_authentication_challenge1()
286 BN_clear_free(challenge); in process_authentication_challenge1()
/titanic_41/usr/src/uts/common/sys/iscsit/
H A Dchap.h84 uint8_t *challenge,
/titanic_41/usr/src/cmd/ldap/common/
H A Dldaptool-sasl.c149 if (interact->challenge)
150 fprintf(stderr, gettext("Challenge:%s\n"), interact->challenge);
/titanic_41/usr/src/uts/common/io/net80211/
H A Dnet80211_input.c615 uint8_t *challenge; in ieee80211_auth_shared() local
630 challenge = NULL; in ieee80211_auth_shared()
645 challenge = frm; in ieee80211_auth_shared()
651 if (challenge == NULL) { in ieee80211_auth_shared()
656 if (challenge[1] != IEEE80211_CHALLENGE_LEN) { in ieee80211_auth_shared()
659 challenge[1]); in ieee80211_auth_shared()
693 bcopy(&challenge[2], in->in_challenge, challenge[1]); in ieee80211_auth_shared()

12