Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 53) sorted by relevance

123

/openbsd/usr.bin/ssh/
H A Dauth-bsdauth.c52 char *challenge = NULL; in bsdauth_query() local
61 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query()
62 if (challenge == NULL) { in bsdauth_query()
68 if (challenge == NULL) { in bsdauth_query()
73 authctxt->style, "auth-ssh", &challenge); in bsdauth_query()
75 challenge = NULL; in bsdauth_query()
76 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
79 if (challenge == NULL) in bsdauth_query()
87 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
H A Dssh-sk-helper.c152 struct sshbuf *challenge, *attest, *kbuf, *resp; in process_enroll() local
166 (r = sshbuf_froms(req, &challenge)) != 0) in process_enroll()
173 if (sshbuf_len(challenge) == 0) { in process_enroll()
174 sshbuf_free(challenge); in process_enroll()
175 challenge = NULL; in process_enroll()
182 flags, pin, challenge, &key, attest)) != 0) { in process_enroll()
200 sshbuf_free(challenge); in process_enroll()
H A Dssh-sk.c50 int (*sk_enroll)(int alg, const uint8_t *challenge,
68 int ssh_sk_enroll(int alg, const uint8_t *challenge,
452 const u_char *challenge; in sshsk_enroll() local
499 challenge = randchall; in sshsk_enroll()
506 challenge = sshbuf_ptr(challenge_buf); in sshsk_enroll()
516 if ((r = skp->sk_enroll(alg, challenge, challenge_len, application, in sshsk_enroll()
/openbsd/libexec/login_radius/
H A Dlogin_radius.c89 char challenge[1024]; in main() local
162 memset(challenge, 0, sizeof(challenge)); in main()
167 while (++c < sizeof(challenge) && in main()
168 read(3, &challenge[c], 1) == 1) { in main()
169 if (challenge[c] == '\0' && ++n == 2) in main()
171 if (challenge[c] == '\0' && n == 1) in main()
172 password = challenge + c + 1; in main()
183 strcmp(service, "login") ? challenge : NULL, password, &emsg); in main()
186 if (*challenge == '\0') { in main()
190 char *val = auth_mkvalue(challenge); in main()
H A Draddauth.c164 pwstate = password ? challenge : _pwstate; in raddauth()
182 if (challenge == NULL) { in raddauth()
292 switch (i = rad_recv(_pwstate, challenge, vector)) { in raddauth()
297 if (challenge) in raddauth()
298 *challenge = '\0'; in raddauth()
314 if (challenge) { in raddauth()
315 if (strcmp(challenge, _pwstate) != 0) in raddauth()
484 parse_challenge(&auth, state, challenge); in rad_recv()
612 if (challenge) { in parse_challenge()
613 memcpy(challenge, ptr, attribute_len); in parse_challenge()
[all …]
H A Dlogin_radius.h20 raddauth(char *username, char *class, char *style, char *challenge,
/openbsd/libexec/login_token/
H A Dlogin_token.c61 char challenge[1024]; in main() local
138 while (++c < sizeof(challenge) && in main()
139 read(3, &challenge[c], 1) == 1) { in main()
140 if (challenge[c] == '\0' && ++mode == 2) in main()
142 if (challenge[c] == '\0' && mode == 1) in main()
143 pp = challenge + c + 1; in main()
151 tokenchallenge(username, challenge, sizeof(challenge), in main()
155 char *val = auth_mkvalue(challenge); in main()
167 pp = readpassphrase(challenge, response, sizeof(response), 0); in main()
182 if (tokenverify(username, challenge, pp) == 0) { in main()
H A Dtoken.c105 tokenchallenge(char *user, char *challenge, int size, char *card_type) in tokenchallenge() argument
151 snprintf(challenge, size, "%s Challenge \"%s\"\r\n%s Response: ", in tokenchallenge()
161 tokenverify(char *username, char *challenge, char *response) in tokenverify() argument
177 (void)strtok(challenge, "\""); in tokenverify()
/openbsd/libexec/login_skey/
H A Dlogin_skey.c59 char challenge[SKEY_MAX_CHALLENGE+17], response[SKEY_MAX_PW_LEN+1]; in main() local
133 haskey = (skeychallenge2(fd, &skey, user, challenge) == 0); in main()
134 strlcat(challenge, "\nS/Key Password:", sizeof(challenge)); in main()
140 if (!readpassphrase(challenge, response, sizeof(response), 0)) in main()
158 haskey = (skeychallenge2(fd, &skey, user, challenge) == 0); in main()
159 strlcat(challenge, "\nS/Key Password:", sizeof(challenge)); in main()
160 cp = auth_mkvalue(challenge); in main()
179 cp = challenge; in main()
180 ep = challenge + sizeof(challenge); in main()
213 haskey = (skeychallenge2(fd, &skey, user, challenge) == 0); in main()
/openbsd/usr.sbin/npppd/npppd/
H A Dchap_ms.c129 mschap_des_encrypt(challenge, padpwhash + 0, response + 0); in mschap_challenge_response()
130 mschap_des_encrypt(challenge, padpwhash + 7, response + 8); in mschap_challenge_response()
131 mschap_des_encrypt(challenge, padpwhash + 14, response + 16); in mschap_challenge_response()
149 u_int8_t *username, int usernamelen, u_int8_t *challenge) in mschap_challenge_hash() argument
169 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ); in mschap_challenge_hash()
177 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_nt_response() local
181 username, usernamelen, challenge); in mschap_nt_response()
184 mschap_challenge_response(challenge, password_hash, response); in mschap_nt_response()
195 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_auth_response() local
225 username, usernamelen, challenge); in mschap_auth_response()
[all …]
H A Dchap.c565 MD5Update(&md5ctx, challenge, lchallenge); in md5chap_authenticate()
583 u_char *pkt, *challenge; in chap_send_error() local
586 challenge = _this->chall; in chap_send_error()
603 u_char *pkt, *challenge; in mschapv2_send_error() local
606 challenge = _this->chall; in mschapv2_send_error()
619 challenge[0], challenge[1], challenge[2], challenge[3], in mschapv2_send_error()
620 challenge[4], challenge[5], challenge[6], challenge[7], in mschapv2_send_error()
621 challenge[8], challenge[9], challenge[10], challenge[11], in mschapv2_send_error()
622 challenge[12], challenge[13], challenge[14], challenge[15] in mschapv2_send_error()
717 u_char *challenge, int lchallenge, u_char *response) in chap_radius_authenticate() argument
[all …]
/openbsd/sbin/iked/
H A Dchap_ms.c124 mschap_challenge_response(uint8_t *challenge, uint8_t *pwhash, in mschap_challenge_response() argument
132 mschap_des_encrypt(challenge, padpwhash + 0, response + 0); in mschap_challenge_response()
133 mschap_des_encrypt(challenge, padpwhash + 7, response + 8); in mschap_challenge_response()
134 mschap_des_encrypt(challenge, padpwhash + 14, response + 16); in mschap_challenge_response()
154 uint8_t *username, int usernamelen, uint8_t *challenge) in mschap_challenge_hash() argument
176 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ); in mschap_challenge_hash()
184 uint8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_nt_response() local
188 username, usernamelen, challenge); in mschap_nt_response()
202 uint8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_auth_response() local
234 username, usernamelen, challenge); in mschap_auth_response()
[all …]
/openbsd/usr.sbin/radiusctl/
H A Dchap_ms.c129 mschap_des_encrypt(challenge, padpwhash + 0, response + 0); in mschap_challenge_response()
130 mschap_des_encrypt(challenge, padpwhash + 7, response + 8); in mschap_challenge_response()
131 mschap_des_encrypt(challenge, padpwhash + 14, response + 16); in mschap_challenge_response()
149 u_int8_t *username, int usernamelen, u_int8_t *challenge) in mschap_challenge_hash() argument
169 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ); in mschap_challenge_hash()
177 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_nt_response() local
181 username, usernamelen, challenge); in mschap_nt_response()
184 mschap_challenge_response(challenge, password_hash, response); in mschap_nt_response()
195 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_auth_response() local
225 username, usernamelen, challenge); in mschap_auth_response()
[all …]
/openbsd/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/
H A DClient.pm117 for my $challenge (@$auth_list) {
118 $challenge =~ tr/,/;/; # "," is used to separate auth-params!!
119 ($challenge) = $self->split_header_words($challenge);
120 my $scheme = shift(@$challenge);
121 shift(@$challenge); # no value
122 $challenge = { @$challenge }; # make rest into a hash
129 return ($scheme, $challenge);
/openbsd/usr.bin/openssl/
H A Dspkac.c77 char *challenge; member
95 .opt.arg = &cfg.challenge,
211 if (cfg.challenge) in spkac_main()
212 ASN1_STRING_set(spki->spkac->challenge, in spkac_main()
213 cfg.challenge, in spkac_main()
214 (int) strlen(cfg.challenge)); in spkac_main()
/openbsd/sys/dev/ic/
H A Dif_wi_hostap.c289 if (sta->challenge) in wihap_shutdown()
435 if (sta->challenge) in wihap_sta_delete()
548 u_int32_t challenge[32]; in wihap_auth_req() local
569 sizeof(challenge)); in wihap_auth_req()
573 IEEE80211_ELEMID_CHALLENGE, challenge, sizeof(challenge))) < 0) { in wihap_auth_req()
635 if (!sta->challenge) { in wihap_auth_req()
637 if (!sta->challenge) in wihap_auth_req()
641 challenge[i] = sta->challenge[i] = in wihap_auth_req()
646 challenge[0], challenge[1]); in wihap_auth_req()
657 if (sta->challenge[i] != challenge[i]) { in wihap_auth_req()
[all …]
/openbsd/lib/libssl/
H A Dssl_packet.c74 CBS cbs, challenge, cipher_specs, session; in ssl_convert_sslv2_client_hello() local
150 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
165 if ((len = CBS_len(&challenge)) > SSL3_RANDOM_SIZE) in ssl_convert_sslv2_client_hello()
171 if (!CBB_add_bytes(&cbb, CBS_data(&challenge), len)) in ssl_convert_sslv2_client_hello()
/openbsd/lib/libfido2/src/
H A Du2f.c146 unsigned char challenge[SHA256_DIGEST_LENGTH]; in send_dummy_register() local
152 memset(&challenge, 0xff, sizeof(challenge)); in send_dummy_register()
157 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 || in send_dummy_register()
195 unsigned char challenge[SHA256_DIGEST_LENGTH]; in key_lookup() local
208 memset(&challenge, 0xff, sizeof(challenge)); in key_lookup()
222 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 || in key_lookup()
/openbsd/lib/libc/gen/
H A Dauth_subr.c97 char *challenge; /* last challenge issued */ member
287 free(as->challenge); in auth_close()
317 free(as->challenge); in auth_challenge()
318 as->challenge = NULL; in auth_challenge()
323 as->challenge = auth_getvalue(as, "challenge"); in auth_challenge()
326 return (as->challenge); in auth_challenge()
418 return (as->challenge); in auth_getitem()
460 if (value == as->challenge) in auth_setitem()
464 free(as->challenge); in auth_setitem()
465 as->challenge = value; in auth_setitem()
H A Dauthenticate.c453 char *style, *name, *challenge, *class; in auth_userresponse() local
476 challenge = auth_getitem(as, AUTHV_CHALLENGE); in auth_userresponse()
479 if (challenge) in auth_userresponse()
480 auth_setdata(as, challenge, strlen(challenge) + 1); in auth_userresponse()
/openbsd/usr.bin/doas/
H A Ddoas.c208 char *challenge = NULL, *response, rbuf[1024], cbuf[128]; in authuser_checkpass() local
212 &challenge))) { in authuser_checkpass()
216 if (!challenge) { in authuser_checkpass()
223 challenge = cbuf; in authuser_checkpass()
225 response = readpassphrase(challenge, rbuf, sizeof(rbuf), in authuser_checkpass()
/openbsd/regress/sys/net/pf_state/
H A DREADME9 The run-regress-challenge-ack subtest checks that the pf firewall
10 sends TCP a challenge Ack if the sequence number is out of range.
H A DMakefile116 REGRESS_TARGETS += run-challenge-ack
117 run-challenge-ack: challenge_ack.py addr.py
/openbsd/lib/libcrypto/
H A Dopenssl.cnf22 challengePassword = A challenge password
/openbsd/usr.sbin/pppd/
H A Dchap.h86 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member

123