/openbsd/usr.bin/ssh/ |
H A D | auth-bsdauth.c | 52 char *challenge = NULL; in bsdauth_query() local 61 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query() 62 if (challenge == NULL) { in bsdauth_query() 68 if (challenge == NULL) { in bsdauth_query() 73 authctxt->style, "auth-ssh", &challenge); in bsdauth_query() 75 challenge = NULL; in bsdauth_query() 76 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query() 79 if (challenge == NULL) in bsdauth_query() 87 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
|
H A D | ssh-sk-helper.c | 152 struct sshbuf *challenge, *attest, *kbuf, *resp; in process_enroll() local 166 (r = sshbuf_froms(req, &challenge)) != 0) in process_enroll() 173 if (sshbuf_len(challenge) == 0) { in process_enroll() 174 sshbuf_free(challenge); in process_enroll() 175 challenge = NULL; in process_enroll() 182 flags, pin, challenge, &key, attest)) != 0) { in process_enroll() 200 sshbuf_free(challenge); in process_enroll()
|
H A D | ssh-sk.c | 50 int (*sk_enroll)(int alg, const uint8_t *challenge, 68 int ssh_sk_enroll(int alg, const uint8_t *challenge, 452 const u_char *challenge; in sshsk_enroll() local 499 challenge = randchall; in sshsk_enroll() 506 challenge = sshbuf_ptr(challenge_buf); in sshsk_enroll() 516 if ((r = skp->sk_enroll(alg, challenge, challenge_len, application, in sshsk_enroll()
|
/openbsd/libexec/login_radius/ |
H A D | login_radius.c | 89 char challenge[1024]; in main() local 162 memset(challenge, 0, sizeof(challenge)); in main() 167 while (++c < sizeof(challenge) && in main() 168 read(3, &challenge[c], 1) == 1) { in main() 169 if (challenge[c] == '\0' && ++n == 2) in main() 171 if (challenge[c] == '\0' && n == 1) in main() 172 password = challenge + c + 1; in main() 183 strcmp(service, "login") ? challenge : NULL, password, &emsg); in main() 186 if (*challenge == '\0') { in main() 190 char *val = auth_mkvalue(challenge); in main()
|
H A D | raddauth.c | 164 pwstate = password ? challenge : _pwstate; in raddauth() 182 if (challenge == NULL) { in raddauth() 292 switch (i = rad_recv(_pwstate, challenge, vector)) { in raddauth() 297 if (challenge) in raddauth() 298 *challenge = '\0'; in raddauth() 314 if (challenge) { in raddauth() 315 if (strcmp(challenge, _pwstate) != 0) in raddauth() 484 parse_challenge(&auth, state, challenge); in rad_recv() 612 if (challenge) { in parse_challenge() 613 memcpy(challenge, ptr, attribute_len); in parse_challenge() [all …]
|
H A D | login_radius.h | 20 raddauth(char *username, char *class, char *style, char *challenge,
|
/openbsd/libexec/login_token/ |
H A D | login_token.c | 61 char challenge[1024]; in main() local 138 while (++c < sizeof(challenge) && in main() 139 read(3, &challenge[c], 1) == 1) { in main() 140 if (challenge[c] == '\0' && ++mode == 2) in main() 142 if (challenge[c] == '\0' && mode == 1) in main() 143 pp = challenge + c + 1; in main() 151 tokenchallenge(username, challenge, sizeof(challenge), in main() 155 char *val = auth_mkvalue(challenge); in main() 167 pp = readpassphrase(challenge, response, sizeof(response), 0); in main() 182 if (tokenverify(username, challenge, pp) == 0) { in main()
|
H A D | token.c | 105 tokenchallenge(char *user, char *challenge, int size, char *card_type) in tokenchallenge() argument 151 snprintf(challenge, size, "%s Challenge \"%s\"\r\n%s Response: ", in tokenchallenge() 161 tokenverify(char *username, char *challenge, char *response) in tokenverify() argument 177 (void)strtok(challenge, "\""); in tokenverify()
|
/openbsd/libexec/login_skey/ |
H A D | login_skey.c | 59 char challenge[SKEY_MAX_CHALLENGE+17], response[SKEY_MAX_PW_LEN+1]; in main() local 133 haskey = (skeychallenge2(fd, &skey, user, challenge) == 0); in main() 134 strlcat(challenge, "\nS/Key Password:", sizeof(challenge)); in main() 140 if (!readpassphrase(challenge, response, sizeof(response), 0)) in main() 158 haskey = (skeychallenge2(fd, &skey, user, challenge) == 0); in main() 159 strlcat(challenge, "\nS/Key Password:", sizeof(challenge)); in main() 160 cp = auth_mkvalue(challenge); in main() 179 cp = challenge; in main() 180 ep = challenge + sizeof(challenge); in main() 213 haskey = (skeychallenge2(fd, &skey, user, challenge) == 0); in main()
|
/openbsd/usr.sbin/npppd/npppd/ |
H A D | chap_ms.c | 129 mschap_des_encrypt(challenge, padpwhash + 0, response + 0); in mschap_challenge_response() 130 mschap_des_encrypt(challenge, padpwhash + 7, response + 8); in mschap_challenge_response() 131 mschap_des_encrypt(challenge, padpwhash + 14, response + 16); in mschap_challenge_response() 149 u_int8_t *username, int usernamelen, u_int8_t *challenge) in mschap_challenge_hash() argument 169 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ); in mschap_challenge_hash() 177 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_nt_response() local 181 username, usernamelen, challenge); in mschap_nt_response() 184 mschap_challenge_response(challenge, password_hash, response); in mschap_nt_response() 195 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_auth_response() local 225 username, usernamelen, challenge); in mschap_auth_response() [all …]
|
H A D | chap.c | 565 MD5Update(&md5ctx, challenge, lchallenge); in md5chap_authenticate() 583 u_char *pkt, *challenge; in chap_send_error() local 586 challenge = _this->chall; in chap_send_error() 603 u_char *pkt, *challenge; in mschapv2_send_error() local 606 challenge = _this->chall; in mschapv2_send_error() 619 challenge[0], challenge[1], challenge[2], challenge[3], in mschapv2_send_error() 620 challenge[4], challenge[5], challenge[6], challenge[7], in mschapv2_send_error() 621 challenge[8], challenge[9], challenge[10], challenge[11], in mschapv2_send_error() 622 challenge[12], challenge[13], challenge[14], challenge[15] in mschapv2_send_error() 717 u_char *challenge, int lchallenge, u_char *response) in chap_radius_authenticate() argument [all …]
|
/openbsd/sbin/iked/ |
H A D | chap_ms.c | 124 mschap_challenge_response(uint8_t *challenge, uint8_t *pwhash, in mschap_challenge_response() argument 132 mschap_des_encrypt(challenge, padpwhash + 0, response + 0); in mschap_challenge_response() 133 mschap_des_encrypt(challenge, padpwhash + 7, response + 8); in mschap_challenge_response() 134 mschap_des_encrypt(challenge, padpwhash + 14, response + 16); in mschap_challenge_response() 154 uint8_t *username, int usernamelen, uint8_t *challenge) in mschap_challenge_hash() argument 176 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ); in mschap_challenge_hash() 184 uint8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_nt_response() local 188 username, usernamelen, challenge); in mschap_nt_response() 202 uint8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_auth_response() local 234 username, usernamelen, challenge); in mschap_auth_response() [all …]
|
/openbsd/usr.sbin/radiusctl/ |
H A D | chap_ms.c | 129 mschap_des_encrypt(challenge, padpwhash + 0, response + 0); in mschap_challenge_response() 130 mschap_des_encrypt(challenge, padpwhash + 7, response + 8); in mschap_challenge_response() 131 mschap_des_encrypt(challenge, padpwhash + 14, response + 16); in mschap_challenge_response() 149 u_int8_t *username, int usernamelen, u_int8_t *challenge) in mschap_challenge_hash() argument 169 memcpy(challenge, md, MSCHAP_CHALLENGE_SZ); in mschap_challenge_hash() 177 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_nt_response() local 181 username, usernamelen, challenge); in mschap_nt_response() 184 mschap_challenge_response(challenge, password_hash, response); in mschap_nt_response() 195 u_int8_t challenge[MSCHAP_CHALLENGE_SZ]; in mschap_auth_response() local 225 username, usernamelen, challenge); in mschap_auth_response() [all …]
|
/openbsd/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/ |
H A D | Client.pm | 117 for my $challenge (@$auth_list) { 118 $challenge =~ tr/,/;/; # "," is used to separate auth-params!! 119 ($challenge) = $self->split_header_words($challenge); 120 my $scheme = shift(@$challenge); 121 shift(@$challenge); # no value 122 $challenge = { @$challenge }; # make rest into a hash 129 return ($scheme, $challenge);
|
/openbsd/usr.bin/openssl/ |
H A D | spkac.c | 77 char *challenge; member 95 .opt.arg = &cfg.challenge, 211 if (cfg.challenge) in spkac_main() 212 ASN1_STRING_set(spki->spkac->challenge, in spkac_main() 213 cfg.challenge, in spkac_main() 214 (int) strlen(cfg.challenge)); in spkac_main()
|
/openbsd/sys/dev/ic/ |
H A D | if_wi_hostap.c | 289 if (sta->challenge) in wihap_shutdown() 435 if (sta->challenge) in wihap_sta_delete() 548 u_int32_t challenge[32]; in wihap_auth_req() local 569 sizeof(challenge)); in wihap_auth_req() 573 IEEE80211_ELEMID_CHALLENGE, challenge, sizeof(challenge))) < 0) { in wihap_auth_req() 635 if (!sta->challenge) { in wihap_auth_req() 637 if (!sta->challenge) in wihap_auth_req() 641 challenge[i] = sta->challenge[i] = in wihap_auth_req() 646 challenge[0], challenge[1]); in wihap_auth_req() 657 if (sta->challenge[i] != challenge[i]) { in wihap_auth_req() [all …]
|
/openbsd/lib/libssl/ |
H A D | ssl_packet.c | 74 CBS cbs, challenge, cipher_specs, session; in ssl_convert_sslv2_client_hello() local 150 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello() 165 if ((len = CBS_len(&challenge)) > SSL3_RANDOM_SIZE) in ssl_convert_sslv2_client_hello() 171 if (!CBB_add_bytes(&cbb, CBS_data(&challenge), len)) in ssl_convert_sslv2_client_hello()
|
/openbsd/lib/libfido2/src/ |
H A D | u2f.c | 146 unsigned char challenge[SHA256_DIGEST_LENGTH]; in send_dummy_register() local 152 memset(&challenge, 0xff, sizeof(challenge)); in send_dummy_register() 157 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 || in send_dummy_register() 195 unsigned char challenge[SHA256_DIGEST_LENGTH]; in key_lookup() local 208 memset(&challenge, 0xff, sizeof(challenge)); in key_lookup() 222 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 || in key_lookup()
|
/openbsd/lib/libc/gen/ |
H A D | auth_subr.c | 97 char *challenge; /* last challenge issued */ member 287 free(as->challenge); in auth_close() 317 free(as->challenge); in auth_challenge() 318 as->challenge = NULL; in auth_challenge() 323 as->challenge = auth_getvalue(as, "challenge"); in auth_challenge() 326 return (as->challenge); in auth_challenge() 418 return (as->challenge); in auth_getitem() 460 if (value == as->challenge) in auth_setitem() 464 free(as->challenge); in auth_setitem() 465 as->challenge = value; in auth_setitem()
|
H A D | authenticate.c | 453 char *style, *name, *challenge, *class; in auth_userresponse() local 476 challenge = auth_getitem(as, AUTHV_CHALLENGE); in auth_userresponse() 479 if (challenge) in auth_userresponse() 480 auth_setdata(as, challenge, strlen(challenge) + 1); in auth_userresponse()
|
/openbsd/usr.bin/doas/ |
H A D | doas.c | 208 char *challenge = NULL, *response, rbuf[1024], cbuf[128]; in authuser_checkpass() local 212 &challenge))) { in authuser_checkpass() 216 if (!challenge) { in authuser_checkpass() 223 challenge = cbuf; in authuser_checkpass() 225 response = readpassphrase(challenge, rbuf, sizeof(rbuf), in authuser_checkpass()
|
/openbsd/regress/sys/net/pf_state/ |
H A D | README | 9 The run-regress-challenge-ack subtest checks that the pf firewall 10 sends TCP a challenge Ack if the sequence number is out of range.
|
H A D | Makefile | 116 REGRESS_TARGETS += run-challenge-ack 117 run-challenge-ack: challenge_ack.py addr.py
|
/openbsd/lib/libcrypto/ |
H A D | openssl.cnf | 22 challengePassword = A challenge password
|
/openbsd/usr.sbin/pppd/ |
H A D | chap.h | 86 u_char challenge[MAX_CHALLENGE_LENGTH]; /* last challenge string sent */ member
|