Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 50) sorted by relevance

12

/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
97 os_memcpy(challenge, hash, 8); in challenge_hash()
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
180 username_len, challenge) || in generate_nt_response()
204 u8 challenge[8]; in generate_nt_response_pwhash() local
208 challenge) || in generate_nt_response_pwhash()
247 u8 password_hash_hash[16], challenge[8]; in generate_authenticator_response_pwhash() local
258 addr2[1] = challenge; in generate_authenticator_response_pwhash()
[all …]
H A Dms_funcs.h31 int nt_challenge_response(const u8 *challenge, const u8 *password,
34 int challenge_response(const u8 *challenge, const u8 *password_hash,
37 const u8 *username, size_t username_len, u8 *challenge);
/dragonfly/usr.sbin/ppp/
H A Dchap.c241 MD5_Update(&MD5context, challenge + 1, *challenge); in chap_BuildAnswer()
332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer); in chap_StartChild()
361 *chap->challenge.local = *chap->challenge.peer = '\0'; in chap_Cleanup()
495 if (!*chap->challenge.local) { in chap_ChallengeInit()
497 cp = chap->challenge.local; in chap_ChallengeInit()
535 if (!*chap->challenge.local) in chap_Challenge()
541 chap->challenge.local, 1 + *chap->challenge.local, NULL); in chap_Challenge()
545 chap->challenge.local, 1 + *chap->challenge.local + len, NULL); in chap_Challenge()
654 *chap->challenge.local = '\0'; in chap_HaveAnotherGo()
674 *chap->challenge.local = *chap->challenge.peer = '\0'; in chap_Init()
[all …]
H A Dchap_ms.c116 ChallengeResponse(u_char *challenge, u_char *pwHash, u_char *response) in ChallengeResponse() argument
123 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse()
124 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse()
125 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse()
382 mschap_NT(char *passwordHash, char *challenge) in mschap_NT() argument
386 ChallengeResponse(challenge, passwordHash, response); in mschap_NT()
392 mschap_LANMan(char *digest, char *challenge, char *secret) in mschap_LANMan() argument
407 ChallengeResponse(challenge, hash, digest); in mschap_LANMan()
H A Dchap.h53 } challenge; member
/dragonfly/lib/libtelnet/
H A Dkrb4encpwd.c105 static char challenge[REALM_SZ]; variable
206 …if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r…
231 memmove((void *)challenge, (void *)data, sizeof(Block));
247 sprintf(challenge, "%x", now);
248 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge));
292 memmove((void *)challenge, (void *)data, cnt);
296 Challenge = challenge;
H A Drsaencpwd.c100 static char challenge[CHAL_SZ]; variable
214 r = accept_rsa_encpwd(&auth, key, challenge,
248 sprintf(challenge, "%x", now);
249 challenge_len = strlen(challenge);
251 strcpy(challenge, "randchal");
282 memmove(ptr, challenge, challenge_len);
339 memmove(challenge, ptr, challenge_len);
351 Challenge = challenge;
352 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
/dragonfly/crypto/libressl/apps/openssl/
H A Dspkac.c77 char *challenge; member
95 .opt.arg = &spkac_config.challenge,
213 if (spkac_config.challenge) in spkac_main()
214 ASN1_STRING_set(spki->spkac->challenge, in spkac_main()
215 spkac_config.challenge, in spkac_main()
216 (int) strlen(spkac_config.challenge)); in spkac_main()
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap_ttls.c514 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2()
533 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
547 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
556 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
581 u8 *buf, *pos, *challenge; in eap_ttls_phase2_request_mschap()
608 if (challenge == NULL) { in eap_ttls_phase2_request_mschap()
634 os_free(challenge); in eap_ttls_phase2_request_mschap()
647 os_free(challenge); in eap_ttls_phase2_request_mschap()
658 os_free(challenge); in eap_ttls_phase2_request_mschap()
764 if (challenge == NULL) { in eap_ttls_phase2_request_chap()
[all …]
H A Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
67 challenge = pos; in eap_md5_process()
69 challenge, challenge_len); in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
102 challenge = pos; in eap_leap_process_request()
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
105 challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request()
120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
H A Deap_mschapv2.c243 const u8 *pos, *challenge; in eap_mschapv2_challenge() local
277 challenge = data->passwd_change_challenge; in eap_mschapv2_challenge()
279 challenge = pos; in eap_mschapv2_challenge()
291 challenge); in eap_mschapv2_challenge()
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq()
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq()
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq()
123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
H A Deap_server_ttls.c556 const u8 *challenge, in eap_ttls_process_phase2_chap() argument
563 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap()
591 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap()
603 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap()
619 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() argument
624 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap()
655 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap()
671 nt_challenge_response(challenge, sm->user->password, in eap_ttls_process_phase2_mschap()
694 u8 *challenge, in eap_ttls_process_phase2_mschapv2() argument
702 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschapv2()
[all …]
H A Deap_server_mschapv2.c364 u8 challenge[8]; in eap_mschapv2_process_response() local
367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response()
370 challenge, nt_response); in eap_mschapv2_process_response()
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
25 addr[2] = challenge; in chap_md5()
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/dragonfly/crypto/libressl/ssl/
H A Dssl_packet.c74 CBS cbs, challenge, cipher_specs, session; in ssl_convert_sslv2_client_hello() local
150 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
165 if ((len = CBS_len(&challenge)) > SSL3_RANDOM_SIZE) in ssl_convert_sslv2_client_hello()
171 if (!CBB_add_bytes(&cbb, CBS_data(&challenge), len)) in ssl_convert_sslv2_client_hello()
/dragonfly/share/examples/ppp/
H A Dchap-auth45 set challenge [gets stdin];
83 mkframe c "Challenge:" $challenge 0;
/dragonfly/contrib/tcpdump/
H A Dprint-802_11.c283 struct challenge_t challenge; member
1143 struct challenge_t challenge; in parse_elements() local
1197 memcpy(&challenge, p + offset, 2); in parse_elements()
1200 if (challenge.length != 0) { in parse_elements()
1201 if (challenge.length > in parse_elements()
1202 sizeof(challenge.text) - 1) in parse_elements()
1205 challenge.length); in parse_elements()
1206 offset += challenge.length; in parse_elements()
1207 length -= challenge.length; in parse_elements()
1209 challenge.text[challenge.length] = '\0'; in parse_elements()
[all …]
/dragonfly/sys/netproto/802_11/wlan/
H A Dieee80211_sta.c984 uint8_t *challenge; in sta_auth_shared() local
1017 challenge = NULL; in sta_auth_shared()
1029 challenge = frm; in sta_auth_shared()
1035 if (challenge == NULL) { in sta_auth_shared()
1043 if (challenge[1] != IEEE80211_CHALLENGE_LEN) { in sta_auth_shared()
1046 "bad challenge len %d", challenge[1]); in sta_auth_shared()
1076 memcpy(ni->ni_challenge, &challenge[2], challenge[1]); in sta_auth_shared()
/dragonfly/crypto/libressl/
H A Dopenssl.cnf22 challengePassword = A challenge password
/dragonfly/games/boggle/boggle/
H A Dbog.c80 int challenge; variable
107 challenge = 1; in main()
621 if (challenge) { in newgame()
/dragonfly/crypto/libressl/crypto/asn1/
H A Dt_spki.c97 chal = spki->spkac->challenge; in NETSCAPE_SPKI_print()
/dragonfly/crypto/openssh/
H A Dsk-api.h89 int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len,

12