/titanic_41/usr/src/cmd/ssh/sshd/ |
H A D | auth-bsdauth.c | 45 char *challenge = NULL; in bsdauth_query() local 49 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query() 50 if (challenge == NULL) { in bsdauth_query() 56 if (challenge == NULL) { in bsdauth_query() 61 authctxt->style, "auth-ssh", &challenge); in bsdauth_query() 63 challenge = NULL; in bsdauth_query() 64 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query() 67 if (challenge == NULL) in bsdauth_query() 76 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
|
H A D | auth-rsa.c | 61 BIGNUM *challenge; in auth_rsa_generate_challenge() local 64 if ((challenge = BN_new()) == NULL) in auth_rsa_generate_challenge() 67 BN_rand(challenge, 256, 0, 0); in auth_rsa_generate_challenge() 70 BN_mod(challenge, challenge, key->rsa->n, ctx); in auth_rsa_generate_challenge() 73 return challenge; in auth_rsa_generate_challenge() 77 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) in auth_rsa_verify_response() argument 91 len = BN_num_bytes(challenge); in auth_rsa_verify_response() 95 BN_bn2bin(challenge, buf + 32 - len); in auth_rsa_verify_response() 119 BIGNUM *challenge, *encrypted_challenge; in auth_rsa_challenge_dialog() local 126 challenge = auth_rsa_generate_challenge(key); in auth_rsa_challenge_dialog() [all …]
|
H A D | auth-skey.c | 47 char challenge[1024], *p; in skey_query() local 51 if (skeychallenge(&skey, authctxt->user, challenge) == -1) in skey_query() 61 len = strlen(challenge) + strlen(SKEY_PROMPT) + 1; in skey_query() 63 strlcpy(p, challenge, len); in skey_query()
|
H A D | auth-chall.c | 42 char *challenge, *name, *info, **prompts; in get_challenge() local 59 challenge = xstrdup(prompts[0]); in get_challenge() 67 return (challenge); in get_challenge()
|
H A D | auth1.c | 288 char *challenge = get_challenge(authctxt); in do_authloop() local 289 if (challenge != NULL) { in do_authloop() 290 debug("sending challenge '%s'", challenge); in do_authloop() 292 packet_put_cstring(challenge); in do_authloop() 293 xfree(challenge); in do_authloop()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | mschap_test.c | 42 u_char challenge[8]; local 43 int challengeInt[sizeof(challenge)]; 57 for (i = 0; i < sizeof(challenge); i++) 58 challenge[i] = (u_char)challengeInt[i]; 61 ChapMS(&cstate, challenge, sizeof(challenge), argv[2], strlen(argv[2])); 68 cstate.chal_len = sizeof(challenge); 69 BCOPY(challenge, cstate.challenge, cstate.chal_len); 83 ChapMSv2(&cstate, cstate.challenge, 16, argv[2], strlen(argv[2]));
|
H A D | chap_ms.c | 124 ChallengeResponse(challenge, pwHash, response) in ChallengeResponse() argument 125 u_char *challenge; /* IN 8 octets */ in ChallengeResponse() 139 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); 140 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); 141 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); 409 ChapMS_NT(cstate->challenge, secret, secret_len, &ckresp); 415 ChapMS_LANMan(cstate->challenge, secret, secret_len, &ckresp); 426 ChallengeHash(peerchallenge, authenticatorchallenge, username, challenge) in ChallengeHash() argument 427 u_char *peerchallenge, *authenticatorchallenge, *challenge; in ChallengeHash() 448 BCOPY(digest, challenge, 8); [all …]
|
/titanic_41/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 72 struct berval *challenge = NULL; in ldap_sasl_cram_md5_bind_s() local 83 …((res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, NULL, serverctrls, clientctrls, &challenge)) in ldap_sasl_cram_md5_bind_s() 87 if (challenge == NULL){ in ldap_sasl_cram_md5_bind_s() 91 LDAPDebug (LDAP_DEBUG_TRACE, "SASL challenge: %s\n", challenge->bv_val, 0, 0); in ldap_sasl_cram_md5_bind_s() 93 hmac_md5((unsigned char *)challenge->bv_val, challenge->bv_len, in ldap_sasl_cram_md5_bind_s() 95 ber_bvfree(challenge); in ldap_sasl_cram_md5_bind_s() 96 challenge = NULL; in ldap_sasl_cram_md5_bind_s() 112 res = ldap_sasl_bind_s(ld, NULL, LDAP_SASL_CRAM_MD5, &resp, serverctrls, clientctrls, &challenge); in ldap_sasl_cram_md5_bind_s()
|
H A D | digest_md5.c | 598 const char *challenge, in ldap_digest_md5_encode() argument 611 if (challenge == NULL || username == NULL || passwd == NULL) { in ldap_digest_md5_encode() 617 ret = digest_parse(challenge, 0, &attrs); in ldap_digest_md5_encode() 635 outlen = strlen(challenge) + DIGEST_CLIENT_EXTRA + 1; in ldap_digest_md5_encode() 667 struct berval *challenge = NULL; in ldap_x_sasl_digest_md5_bind_s() local 683 NULL, serverctrls, clientctrls, &challenge); in ldap_x_sasl_digest_md5_bind_s() 686 if (challenge != NULL) { in ldap_x_sasl_digest_md5_bind_s() 689 challenge->bv_val, 0, 0); in ldap_x_sasl_digest_md5_bind_s() 690 errnum = ldap_digest_md5_encode(challenge->bv_val, in ldap_x_sasl_digest_md5_bind_s() 692 ber_bvfree(challenge); in ldap_x_sasl_digest_md5_bind_s() [all …]
|
/titanic_41/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_auth.c | 120 unsigned char *challenge, int clen, in smb_auth_lm_response() argument 134 challenge, clen)); in smb_auth_lm_response() 177 unsigned char *challenge, int clen, in smb_auth_ntlm_response() argument 185 S21, 21, challenge, clen) == SMBAUTH_FAILURE) in smb_auth_ntlm_response() 310 unsigned char *challenge, in smb_lm_password_ok() argument 318 rc = smb_auth_lm_response(lm_hash, challenge, clen, lm_resp); in smb_lm_password_ok() 327 unsigned char *challenge, in smb_ntlm_password_ok() argument 337 rc = smb_auth_ntlm_response(ntlm_hash, challenge, clen, ntlm_resp); in smb_ntlm_password_ok() 352 unsigned char *challenge, in smb_ntlmv2_password_ok() argument 406 if (smb_auth_v2_response(ntlmv2_hash, challenge, in smb_ntlmv2_password_ok() [all …]
|
/titanic_41/usr/src/cmd/ssh/ssh/ |
H A D | sshconnect1.c | 78 BIGNUM *challenge; in try_agent_authentication() local 85 if ((challenge = BN_new()) == NULL) in try_agent_authentication() 117 packet_get_bignum(challenge); in try_agent_authentication() 123 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) { in try_agent_authentication() 148 BN_clear_free(challenge); in try_agent_authentication() 158 BN_clear_free(challenge); in try_agent_authentication() 168 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) in respond_to_rsa_challenge() argument 176 if (rsa_private_decrypt(challenge, challenge, prv) <= 0) in respond_to_rsa_challenge() 182 len = BN_num_bytes(challenge); in respond_to_rsa_challenge() 188 BN_bn2bin(challenge, buf + sizeof(buf) - len); in respond_to_rsa_challenge() [all …]
|
/titanic_41/usr/src/uts/common/io/comstar/port/iscsit/ |
H A D | iscsit_radiusauth.c | 47 uint8_t *challenge, 57 uint8_t *challenge, in iscsit_radius_chap_validate() argument 91 challenge, in iscsit_radius_chap_validate() 159 uint8_t *challenge, in set_radius_attrs() argument 176 bcopy(challenge, in set_radius_attrs()
|
H A D | radius_auth.h | 58 uint8_t *challenge,
|
/titanic_41/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | radius_auth.c | 51 uint8_t *challenge, 61 uint8_t *challenge, in radius_chap_validate() argument 95 challenge, in radius_chap_validate() 160 uint8_t *challenge, in set_radius_attrs() argument 177 bcopy(challenge, in set_radius_attrs()
|
H A D | chap.c | 35 uint8_t *challenge, in chap_validate_tgt() argument 54 challenge, in chap_validate_tgt()
|
H A D | radius_auth.h | 61 uint8_t *challenge,
|
H A D | chap.h | 86 uint8_t *challenge,
|
/titanic_41/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 109 char *challenge; member 115 const char *challenge __attribute__((unused)), in crammd5_server_mech_new() argument 222 text->challenge = sparams->utils->malloc(200 + 1); in crammd5_server_mech_step1() 223 if (text->challenge == NULL) { in crammd5_server_mech_step1() 229 snprintf(text->challenge, 200, "<%s.%s@%s>", randdigits, time, in crammd5_server_mech_step1() 232 *serverout = text->challenge; in crammd5_server_mech_step1() 233 *serveroutlen = strlen(text->challenge); in crammd5_server_mech_step1() 371 (const unsigned char *) text->challenge, in crammd5_server_mech_step2() 372 strlen(text->challenge)); in crammd5_server_mech_step2() 476 if (text->challenge) _plug_free_string(utils,&(text->challenge)); in crammd5_server_mech_dispose()
|
/titanic_41/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 511 const char *challenge, const char *promptstr, argument 541 challenge, promptstr, NULL, result, NULL); 643 (prompts)->challenge = convert_prompt(utils, h, 646 (prompts)->challenge = "Authorization Name"; 657 (prompts)->challenge = convert_prompt(utils, h, 660 (prompts)->challenge = "Authentication Name"; 671 (prompts)->challenge = convert_prompt(utils, h, gettext("Password")); 673 (prompts)->challenge = "Password"; 683 (prompts)->challenge = echo_chal; 692 (prompts)->challenge = realm_chal; [all …]
|
/titanic_41/usr/src/lib/libsasl/include/ |
H A D | sasl.h | 571 const char *challenge, 841 const char *challenge; /* presented to user (e.g. OTP challenge) */ member 1101 const char *challenge, unsigned challen,
|
/titanic_41/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 265 const char *challenge, in _sasl_auxprop_verify_apop() argument 282 if (!conn || !userstr || !challenge || !response) in _sasl_auxprop_verify_apop() 311 _sasl_MD5Update(&ctx, challenge, strlen(challenge)); in _sasl_auxprop_verify_apop()
|
/titanic_41/usr/src/cmd/ssh/ssh-agent/ |
H A D | ssh-agent.c | 227 BIGNUM *challenge; in process_authentication_challenge1() local 236 if ((challenge = BN_new()) == NULL) in process_authentication_challenge1() 242 buffer_get_bignum(&e->request, challenge); in process_authentication_challenge1() 256 if (rsa_private_decrypt(challenge, challenge, private->rsa) <= 0) in process_authentication_challenge1() 260 len = BN_num_bytes(challenge); in process_authentication_challenge1() 266 BN_bn2bin(challenge, buf + 32 - len); in process_authentication_challenge1() 286 BN_clear_free(challenge); in process_authentication_challenge1()
|
/titanic_41/usr/src/uts/common/sys/iscsit/ |
H A D | chap.h | 84 uint8_t *challenge,
|
/titanic_41/usr/src/cmd/ldap/common/ |
H A D | ldaptool-sasl.c | 149 if (interact->challenge) 150 fprintf(stderr, gettext("Challenge:%s\n"), interact->challenge);
|
/titanic_41/usr/src/uts/common/io/net80211/ |
H A D | net80211_input.c | 615 uint8_t *challenge; in ieee80211_auth_shared() local 630 challenge = NULL; in ieee80211_auth_shared() 645 challenge = frm; in ieee80211_auth_shared() 651 if (challenge == NULL) { in ieee80211_auth_shared() 656 if (challenge[1] != IEEE80211_CHALLENGE_LEN) { in ieee80211_auth_shared() 659 challenge[1]); in ieee80211_auth_shared() 693 bcopy(&challenge[2], in->in_challenge, challenge[1]); in ieee80211_auth_shared()
|