| /src/crypto/openssh/ |
| H A D | auth-bsdauth.c | 55 char *challenge = NULL; in bsdauth_query() local 64 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query() 65 if (challenge == NULL) { in bsdauth_query() 71 if (challenge == NULL) { in bsdauth_query() 76 authctxt->style, "auth-ssh", &challenge); in bsdauth_query() 78 challenge = NULL; in bsdauth_query() 79 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query() 82 if (challenge == NULL) in bsdauth_query() 90 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
|
| H A D | ssh-sk-helper.c | 155 struct sshbuf *challenge, *attest, *kbuf, *resp; in process_enroll() local 169 (r = sshbuf_froms(req, &challenge)) != 0) in process_enroll() 176 if (sshbuf_len(challenge) == 0) { in process_enroll() 177 sshbuf_free(challenge); in process_enroll() 178 challenge = NULL; in process_enroll() 185 flags, pin, challenge, &key, attest)) != 0) { in process_enroll() 203 sshbuf_free(challenge); in process_enroll()
|
| /src/contrib/wpa/src/crypto/ |
| H A D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 97 os_memcpy(challenge, hash, 8); in challenge_hash() 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 180 username_len, challenge) || in generate_nt_response() 182 challenge_response(challenge, password_hash, response)) in generate_nt_response() 204 u8 challenge[8]; in generate_nt_response_pwhash() local [all …]
|
| H A D | ms_funcs.h | 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 34 int challenge_response(const u8 *challenge, const u8 *password_hash, 37 const u8 *username, size_t username_len, u8 *challenge);
|
| /src/contrib/telnet/libtelnet/ |
| H A D | kerberos.c | 87 static Block challenge = { 0 }; variable 204 DES_ecb_encrypt(&session_key, &challenge, sched, 0); in kerberos4_send() 211 x = (unsigned int)challenge[i] + 1; in kerberos4_send() 212 challenge[i] = x; /* ignore overflow */ in kerberos4_send() 216 DES_ecb_encrypt(&challenge, &challenge, sched, 1); in kerberos4_send() 309 DES_ecb_encrypt(&datablock, &challenge, sched, 0); in kerberos4_is() 312 t = (unsigned int)challenge[r] + 1; in kerberos4_is() 313 challenge[r] = t; /* ignore overflow */ in kerberos4_is() 317 DES_ecb_encrypt(&challenge, &challenge, sched, 1); in kerberos4_is() 318 Data(ap, KRB_RESPONSE, challenge, sizeof(challenge)); in kerberos4_is() [all …]
|
| H A D | rsaencpwd.c | 102 static char challenge[CHAL_SZ]; variable 218 r = accept_rsa_encpwd(&auth, key, challenge, 252 sprintf(challenge, "%x", now); 253 challenge_len = strlen(challenge); 255 strcpy(challenge, "randchal"); 286 memmove(ptr, challenge, challenge_len); 346 memmove(challenge, ptr, challenge_len); 358 Challenge = challenge; 359 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
|
| H A D | krb4encpwd.c | 107 static char challenge[REALM_SZ]; variable 210 …if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r… 235 memmove((void *)challenge, (void *)data, sizeof(Block)); 253 sprintf(challenge, "%x", now); 254 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge)); 301 memmove((void *)challenge, (void *)data, cnt); 305 Challenge = challenge;
|
| /src/usr.sbin/ppp/ |
| H A D | chap.c | 125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge in chap_BuildAnswer() argument 152 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */ in chap_BuildAnswer() 175 mschap_NT(digest, challenge + 1); in chap_BuildAnswer() 215 GenerateNTResponse(challenge + 1, peerchallenge + 1, name, in chap_BuildAnswer() 223 peerchallenge + 1, challenge + 1, name, in chap_BuildAnswer() 241 MD5Update(&MD5context, challenge + 1, *challenge); in chap_BuildAnswer() 332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer); in chap_StartChild() 361 *chap->challenge.local = *chap->challenge.peer = '\0'; in chap_Cleanup() 376 ans = chap_BuildAnswer(name, key, chap->auth.id, chap->challenge.peer in chap_Respond() 378 , type, chap->challenge.local, chap->authresponse, lm in chap_Respond() [all …]
|
| H A D | chap_ms.c | 121 ChallengeResponse(u_char *challenge, u_char *pwHash, u_char *response) in ChallengeResponse() argument 128 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse() 129 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse() 130 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse() 389 mschap_NT(char *passwordHash, char *challenge) in mschap_NT() argument 393 ChallengeResponse(challenge, passwordHash, response); in mschap_NT() 399 mschap_LANMan(char *digest, char *challenge, char *secret) in mschap_LANMan() argument 414 ChallengeResponse(challenge, hash, digest); in mschap_LANMan()
|
| /src/crypto/openssl/crypto/ec/curve448/ |
| H A D | eddsa.c | 228 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local 236 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign() 239 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign() 240 sizeof(challenge)); in ossl_c448_ed448_sign() 241 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign() 336 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_verify() local 344 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) { in ossl_c448_ed448_verify() 350 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_verify() 351 sizeof(challenge)); in ossl_c448_ed448_verify() 352 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_verify()
|
| /src/crypto/heimdal/appl/telnet/libtelnet/ |
| H A D | rsaencpwd.c | 111 static char challenge[CHAL_SZ]; variable 226 r = accept_rsa_encpwd(&auth, key, challenge, 260 snprintf(challenge, sizeof(challenge), "%x", now); 261 challenge_len = strlen(challenge); 263 strlcpy(challenge, "randchal", sizeof(challenge)); 294 memmove(ptr, challenge, challenge_len); 354 memmove(challenge, ptr, challenge_len); 366 Challenge = challenge; 367 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
|
| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | response_items.c | 109 const char *challenge) in push_question() argument 143 if (challenge != NULL) { in push_question() 144 ri->challenges[ri->count] = strdup(challenge); in push_question() 158 const char *challenge) in k5_response_items_ask_question() argument 165 return push_question(ri, question, challenge); in k5_response_items_ask_question() 167 if (challenge != NULL) { in k5_response_items_ask_question() 168 tmp = strdup(challenge); in k5_response_items_ask_question()
|
| H A D | preauth_otp.c | 50 free(ti->challenge); in free_tokeninfo() 177 retval = codec_data_to_value(&ti->challenge, obj, "challenge"); in codec_encode_tokeninfo() 282 retval = codec_value_to_string(obj, "challenge", &ti->challenge); in codec_decode_tokeninfo() 552 make_challenge(const krb5_otp_tokeninfo *ti, char **challenge) in make_challenge() argument 554 if (challenge == NULL) in make_challenge() 557 *challenge = NULL; in make_challenge() 559 if (ti == NULL || ti->challenge.data == NULL) in make_challenge() 562 if (asprintf(challenge, "%s %.*s\n", in make_challenge() 564 ti->challenge.length, in make_challenge() 565 ti->challenge.data) < 0) in make_challenge() [all …]
|
| H A D | preauth_pkinit.c | 82 const char *challenge; in krb5_responder_pkinit_get_challenge() local 90 challenge = krb5_responder_get_challenge(ctx, rctx, in krb5_responder_pkinit_get_challenge() 92 if (challenge == NULL) in krb5_responder_pkinit_get_challenge() 95 ret = k5_json_decode(challenge, &j); in krb5_responder_pkinit_get_challenge()
|
| /src/crypto/openssl/apps/ |
| H A D | spkac.c | 76 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 124 challenge = opt_arg(); in spkac_main() 165 if (challenge != NULL in spkac_main() 166 && !ASN1_STRING_set(spki->spkac->challenge, in spkac_main() 167 challenge, (int)strlen(challenge))) in spkac_main()
|
| /src/lib/libiscsiutil/ |
| H A D | chap.c | 42 const void *challenge, size_t challenge_len, void *response, in chap_compute_md5() argument 52 MD5Update(&ctx, challenge, challenge_len); in chap_compute_md5() 344 const void *challenge, size_t challenge_len) in rchap_receive_bin() argument 351 memcpy(rchap->rchap_challenge, challenge, challenge_len); in rchap_receive_bin() 356 rchap_receive(struct rchap *rchap, const char *id, const char *challenge) in rchap_receive() argument 366 error = chap_hex2bin(challenge, &challenge_bin, &challenge_bin_len); in rchap_receive() 369 challenge); in rchap_receive()
|
| /src/contrib/wpa/src/eap_peer/ |
| H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local 67 challenge = pos; in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
| H A D | eap_ttls.c | 541 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2() 566 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2() 568 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2() 577 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2() 583 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2() 587 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 598 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() 601 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 610 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 635 u8 *buf, *pos, *challenge; in eap_ttls_phase2_request_mschap() [all …]
|
| H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 102 challenge = pos; in eap_leap_process_request() 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 105 challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
|
| /src/contrib/wpa/src/eap_server/ |
| H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq() 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq() 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq() 123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
|
| /src/crypto/heimdal/kuser/ |
| H A D | kdigest.c | 276 unsigned char md[SHA_DIGEST_LENGTH], challenge[SHA_DIGEST_LENGTH]; in client_mschapv2() local 328 EVP_DigestFinal_ex(ctx, challenge, NULL); in client_mschapv2() 332 EVP_DigestUpdate(ctx, challenge, 8); in client_mschapv2() 436 krb5_data challenge, opaque; in ntlm_server_init() local 461 ret = krb5_ntlm_init_get_challange(context, ntlm, &challenge); in ntlm_server_init() 465 if (challenge.length != sizeof(type2.challenge)) in ntlm_server_init() 467 memcpy(type2.challenge, challenge.data, sizeof(type2.challenge)); in ntlm_server_init() 468 krb5_data_free(&challenge); in ntlm_server_init()
|
| /src/crypto/openssl/doc/man1/ |
| H A D | openssl-spkac.pod.in | 22 [B<-challenge> I<string>] 32 This command processes Netscape signed public key and challenge 75 =item B<-challenge> I<string> 77 Specifies the challenge string if an SPKAC is being created. 120 Create an SPKAC using the challenge string "hello": 122 openssl spkac -key key.pem -challenge hello -out spkac.cnf 142 The challenge string permits a primitive form of proof of possession 143 of private key. By checking the SPKAC signature and a random challenge
|
| /src/crypto/krb5/src/plugins/preauth/spake/ |
| H A D | t_vectors.c | 51 const char *challenge; member 386 krb5_data *w, *x, *y, *T, *S, *K, *support, *challenge, *thash; in run_test() local 398 challenge = decode_data(t->challenge); in run_test() 424 check(update_thash(ctx, gstate, t->group, &hash, support, challenge)); in run_test() 457 krb5_free_data(ctx, challenge); in run_test()
|
| /src/crypto/openssh/regress/misc/ssh-verify-attestation/ |
| H A D | ssh-verify-attestation.c | 80 const char *rp_id, struct sshbuf *b, const struct sshbuf *challenge, in prepare_fido_cred() argument 110 sshbuf_len(sig), sshbuf_len(authdata), sshbuf_len(challenge)); in prepare_fido_cred() 114 fido_cred_set_clientdata(cred, sshbuf_ptr(challenge), in prepare_fido_cred() 115 sshbuf_len(challenge)); in prepare_fido_cred() 332 struct sshbuf *attestation = NULL, *challenge = NULL; in main() local 381 if ((r = sshbuf_load_file(argv[1], &challenge)) != 0) in main() 406 attestation, challenge, &attestation_cert)) != 0) in main()
|
| /src/crypto/heimdal/lib/ntlm/ |
| H A D | test_ntlm.c | 87 memset(type2.challenge, 0x7f, sizeof(type2.challenge)); in test_parse() 121 type2.challenge, in test_parse() 160 memset(type2.challenge, 0x7f, sizeof(type2.challenge)); in test_parse()
|