/dflybsd-src/crypto/openssh/ |
H A D | auth-bsdauth.c | 55 char *challenge = NULL; in bsdauth_query() local 64 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query() 65 if (challenge == NULL) { in bsdauth_query() 71 if (challenge == NULL) { in bsdauth_query() 76 authctxt->style, "auth-ssh", &challenge); in bsdauth_query() 78 challenge = NULL; in bsdauth_query() 79 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query() 82 if (challenge == NULL) in bsdauth_query() 90 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
|
/dflybsd-src/contrib/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 97 os_memcpy(challenge, hash, 8); in challenge_hash() 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 180 username_len, challenge) || in generate_nt_response() 182 challenge_response(challenge, password_hash, response)) in generate_nt_response() 204 u8 challenge[8]; in generate_nt_response_pwhash() local [all …]
|
H A D | ms_funcs.h | 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 34 int challenge_response(const u8 *challenge, const u8 *password_hash, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/dflybsd-src/usr.sbin/ppp/ |
H A D | chap.c | 125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge in chap_BuildAnswer() argument 152 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */ in chap_BuildAnswer() 175 mschap_NT(digest, challenge + 1); in chap_BuildAnswer() 215 GenerateNTResponse(challenge + 1, peerchallenge + 1, name, in chap_BuildAnswer() 223 peerchallenge + 1, challenge + 1, name, in chap_BuildAnswer() 241 MD5_Update(&MD5context, challenge + 1, *challenge); in chap_BuildAnswer() 332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer); in chap_StartChild() 361 *chap->challenge.local = *chap->challenge.peer = '\0'; in chap_Cleanup() 376 ans = chap_BuildAnswer(name, key, chap->auth.id, chap->challenge.peer in chap_Respond() 378 , type, chap->challenge.local, chap->authresponse, lm in chap_Respond() [all …]
|
H A D | chap_ms.c | 116 ChallengeResponse(u_char *challenge, u_char *pwHash, u_char *response) in ChallengeResponse() argument 123 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse() 124 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse() 125 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse() 382 mschap_NT(char *passwordHash, char *challenge) in mschap_NT() argument 386 ChallengeResponse(challenge, passwordHash, response); in mschap_NT() 392 mschap_LANMan(char *digest, char *challenge, char *secret) in mschap_LANMan() argument 407 ChallengeResponse(challenge, hash, digest); in mschap_LANMan()
|
H A D | chap.h | 53 } challenge; member
|
/dflybsd-src/lib/libtelnet/ |
H A D | krb4encpwd.c | 105 static char challenge[REALM_SZ]; variable 206 …if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r… 231 memmove((void *)challenge, (void *)data, sizeof(Block)); 247 sprintf(challenge, "%x", now); 248 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge)); 292 memmove((void *)challenge, (void *)data, cnt); 296 Challenge = challenge;
|
H A D | rsaencpwd.c | 100 static char challenge[CHAL_SZ]; variable 214 r = accept_rsa_encpwd(&auth, key, challenge, 248 sprintf(challenge, "%x", now); 249 challenge_len = strlen(challenge); 251 strcpy(challenge, "randchal"); 282 memmove(ptr, challenge, challenge_len); 339 memmove(challenge, ptr, challenge_len); 351 Challenge = challenge; 352 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
|
/dflybsd-src/crypto/libressl/apps/openssl/ |
H A D | spkac.c | 77 char *challenge; member 95 .opt.arg = &spkac_config.challenge, 213 if (spkac_config.challenge) in spkac_main() 214 ASN1_STRING_set(spki->spkac->challenge, in spkac_main() 215 spkac_config.challenge, in spkac_main() 216 (int) strlen(spkac_config.challenge)); in spkac_main()
|
/dflybsd-src/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_ttls.c | 487 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2() 512 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2() 514 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2() 523 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2() 529 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2() 533 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 544 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() 547 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 556 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 581 u8 *buf, *pos, *challenge; in eap_ttls_phase2_request_mschap() [all …]
|
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local 67 challenge = pos; in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 102 challenge = pos; in eap_leap_process_request() 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 105 challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
|
H A D | eap_mschapv2.c | 243 const u8 *pos, *challenge; in eap_mschapv2_challenge() local 277 challenge = data->passwd_change_challenge; in eap_mschapv2_challenge() 279 challenge = pos; in eap_mschapv2_challenge() 291 challenge); in eap_mschapv2_challenge()
|
/dflybsd-src/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq() 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq() 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq() 123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
|
H A D | eap_server_ttls.c | 556 const u8 *challenge, in eap_ttls_process_phase2_chap() argument 563 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap() 591 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap() 603 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap() 619 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() argument 624 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap() 655 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap() 658 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_mschap() 669 challenge_response(challenge, sm->user->password, nt_response)) || in eap_ttls_process_phase2_mschap() 671 nt_challenge_response(challenge, sm->user->password, in eap_ttls_process_phase2_mschap() [all …]
|
H A D | eap_server_mschapv2.c | 364 u8 challenge[8]; in eap_mschapv2_process_response() local 367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response() 370 challenge, nt_response); in eap_mschapv2_process_response()
|
/dflybsd-src/contrib/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 25 addr[2] = challenge; in chap_md5()
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/dflybsd-src/crypto/libressl/ssl/ |
H A D | ssl_packet.c | 74 CBS cbs, challenge, cipher_specs, session; in ssl_convert_sslv2_client_hello() local 150 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello() 165 if ((len = CBS_len(&challenge)) > SSL3_RANDOM_SIZE) in ssl_convert_sslv2_client_hello() 171 if (!CBB_add_bytes(&cbb, CBS_data(&challenge), len)) in ssl_convert_sslv2_client_hello()
|
/dflybsd-src/share/examples/ppp/ |
H A D | chap-auth | 45 set challenge [gets stdin]; 83 mkframe c "Challenge:" $challenge 0;
|
/dflybsd-src/contrib/tcpdump/ |
H A D | print-802_11.c | 283 struct challenge_t challenge; member 1143 struct challenge_t challenge; in parse_elements() local 1197 memcpy(&challenge, p + offset, 2); in parse_elements() 1200 if (challenge.length != 0) { in parse_elements() 1201 if (challenge.length > in parse_elements() 1202 sizeof(challenge.text) - 1) in parse_elements() 1204 memcpy(&challenge.text, p + offset, in parse_elements() 1205 challenge.length); in parse_elements() 1206 offset += challenge.length; in parse_elements() 1207 length -= challenge.length; in parse_elements() [all …]
|
/dflybsd-src/sys/netproto/802_11/wlan/ |
H A D | ieee80211_sta.c | 984 uint8_t *challenge; in sta_auth_shared() local 1017 challenge = NULL; in sta_auth_shared() 1029 challenge = frm; in sta_auth_shared() 1035 if (challenge == NULL) { in sta_auth_shared() 1043 if (challenge[1] != IEEE80211_CHALLENGE_LEN) { in sta_auth_shared() 1046 "bad challenge len %d", challenge[1]); in sta_auth_shared() 1076 memcpy(ni->ni_challenge, &challenge[2], challenge[1]); in sta_auth_shared()
|
/dflybsd-src/crypto/libressl/ |
H A D | openssl.cnf | 22 challengePassword = A challenge password
|
/dflybsd-src/games/boggle/boggle/ |
H A D | bog.c | 80 int challenge; variable 107 challenge = 1; in main() 621 if (challenge) { in newgame()
|
/dflybsd-src/crypto/libressl/crypto/asn1/ |
H A D | t_spki.c | 97 chal = spki->spkac->challenge; in NETSCAPE_SPKI_print()
|