| /src/crypto/external/bsd/netpgp/dist/src/libpaa/ |
| client.c | 47 char challenge[2048]; local 62 //challenge.domain = optarg; 65 //challenge.realm = optarg; 82 /* read challenge into challenge */ 83 challengec = read(0, challenge, sizeof(challenge)); 84 cc = paa_format_response(&response, &netpgp, challenge, buf, sizeof(buf));
|
| server.c | 46 paa_challenge_t challenge; local 55 (void) memset(&challenge, 0x0, sizeof(challenge)); 69 challenge.domain = optarg; 72 challenge.realm = optarg; 92 /* format the challenge */ 93 cc = paa_format_challenge(&challenge, &server, buf, sizeof(buf)); 94 /* write challenge to temp file */ 95 paa_write_file("challenge", buf, cc); 97 system("client/paaclient -r authentication@bigco.com < challenge > response") [all...] |
| libpaa.h | 48 /* used in server to formulate challenge */ 50 const char *realm; /* this is realm of challenge */ 51 const char *domain; /* domain of challenge */ 52 char challenge[512]; /* the output challenge */ member in struct:paa_challenge_t 53 int challengec; /* # of chars in challenge */ 54 /* sub-parts of challenge */ 55 char encoded_challenge[512]; /* encoded challenge part */ 56 int encc; /* # of chars in encoded challenge */ 63 char challenge[PAA_CHALLENGE_SIZE]; /* input challenge * member in struct:paa_response_t [all...] |
| libpaa.c | 65 /* generate a challenge */ 67 genchallenge(paa_challenge_t *challenge, paa_server_info_t *server) 75 cc = snprintf(raw, sizeof(raw), "%s;%s;%lld;", challenge->realm, server->hostaddress, (int64_t)t); 77 /* raw now has the raw-challenge in it */ 78 challenge->encc = b64encode(raw, (const unsigned)cc, challenge->encoded_challenge, 79 sizeof(challenge->encoded_challenge), 0); 84 /* raw has raw-challenge ; server-secret-value, i.e. raw-server-signature */ 85 challenge->challengec = snprintf(challenge->challenge, sizeof(challenge->challenge) 229 char challenge[2048 * 2]; local [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| auth-bsdauth.c | 57 char *challenge = NULL; local 66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 67 if (challenge == NULL) { 73 if (challenge == NULL) { 78 authctxt->style, "auth-ssh", &challenge); 80 challenge = NULL; 81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 84 if (challenge == NULL) 92 (*prompts)[0] = xstrdup(challenge); [all...] |
| auth-skey.c | 61 char challenge[1024]; local 64 if (skeychallenge(&skey, authctxt->user, challenge, sizeof(challenge)) == -1) 73 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
|
| ssh-sk-helper.c | 173 struct sshbuf *challenge, *attest, *kbuf, *resp; local 187 (r = sshbuf_froms(req, &challenge)) != 0) 194 if (sshbuf_len(challenge) == 0) { 195 sshbuf_free(challenge); 196 challenge = NULL; 203 flags, pin, challenge, &key, attest)) != 0) { 221 sshbuf_free(challenge);
|
| ssh-sk.c | 55 int (*sk_enroll)(int alg, const uint8_t *challenge, 60 /* Sign a challenge */ 73 int ssh_sk_enroll(int alg, const uint8_t *challenge, 471 const u_char *challenge; local 479 "userid \"%s\", flags 0x%02x, challenge len %zu%s", 516 debug_f("using random challenge"); 518 challenge = randchall; 521 error("Missing enrollment challenge"); 525 challenge = sshbuf_ptr(challenge_buf); 527 debug3_f("using explicit challenge len=%zd", challenge_len) [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_md5.c | 34 const u8 *pos, *challenge, *password; local 55 * CHAP Challenge: 56 * Value-Size (1 octet) | Value(Challenge) | Name(optional) 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 69 challenge, challenge_len); 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
| eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " 102 challenge = pos; 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 105 challenge, LEAP_CHALLENGE_LEN); 107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 118 if ((pwhash && challenge_response(challenge, password, rpos)) || 120 nt_challenge_response(challenge, password, password_len, rpos))) { 171 "for challenge"); [all...] |
| /src/external/bsd/openldap/dist/libraries/liblutil/ |
| sasl.c | 118 int challenge=0; local 136 challenge = 1; 139 challenge = 1; 156 if( challenge ) { 157 if( interact->challenge ) { 158 fprintf( stderr, _("Challenge: %s\n"), interact->challenge );
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
| /src/crypto/external/apache2/openssl/dist/crypto/ec/curve448/ |
| eddsa.c | 228 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; local 230 /* Compute the challenge */ 236 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) 239 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, 240 sizeof(challenge)); 241 OPENSSL_cleanse(challenge, sizeof(challenge)); 334 /* Compute the challenge */ 336 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES] local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| kdc.c | 256 krb5_data challenge; local 298 ret = krb5_ntlm_init_get_challenge(c->context, c->ntlm, &challenge); 304 if (challenge.length != sizeof(type2.challenge)) { 308 memcpy(type2.challenge, challenge.data, sizeof(type2.challenge)); 309 krb5_data_free(&challenge);
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/curve448/ |
| eddsa.c | 232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; local 234 /* Compute the challenge */ 240 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) 243 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, 244 sizeof(challenge)); 245 OPENSSL_cleanse(challenge, sizeof(challenge)); 329 /* Compute the challenge */ 331 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES] local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/curve448/ |
| eddsa.c | 202 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; local 204 /* Compute the challenge */ 209 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) 212 curve448_scalar_decode_long(challenge_scalar, challenge, 213 sizeof(challenge)); 214 OPENSSL_cleanse(challenge, sizeof(challenge)); 294 /* Compute the challenge */ 296 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES] local [all...] |
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
| key_correctness_proof.c | 340 i, j, test_bit( j, proof->challenge, proof->length_challenge)); 345 if( test_bit( j, proof->challenge, proof->length_challenge)) { 377 LogDebug("verifiable challenge=%s", 379 LogDebug(" challenge=%s", 380 dump_byte_array( proof->length_challenge, proof->challenge)); 386 if( verifiable_challenge[i] != proof->challenge[i]) { 391 *isCorrect = ( memcmp( verifiable_challenge, proof->challenge, length_challenge) == 0); 471 LogDebug("Step b: compute challenge (message digest)"); 472 BYTE challenge[EVP_MAX_MD_SIZE]; local 474 generateMessageDigest( challenge, [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| spkac.c | 55 { "challenge", OPT_CHALLENGE, 's', "Challenge string" }, 76 char *challenge = NULL, *keyfile = NULL; local 124 challenge = opt_arg(); 165 if (challenge != NULL 166 && !ASN1_STRING_set(spki->spkac->challenge, 167 challenge, (int)strlen(challenge)))
|
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| qlog_event_helpers.c | 356 uint64_t challenge; local 358 if (!ossl_quic_wire_decode_frame_path_challenge(pkt, &challenge)) 364 uint64_t challenge; local 366 if (!ossl_quic_wire_decode_frame_path_response(pkt, &challenge))
|
| /src/crypto/external/bsd/heimdal/dist/kuser/ |
| kdigest.c | 278 unsigned char md[SHA_DIGEST_LENGTH], challenge[SHA_DIGEST_LENGTH]; local 330 EVP_DigestFinal_ex(ctx, challenge, NULL); 334 EVP_DigestUpdate(ctx, challenge, 8); 438 krb5_data challenge, opaque; local 463 ret = krb5_ntlm_init_get_challenge(context, ntlm, &challenge); 467 if (challenge.length != sizeof(type2.challenge)) 468 krb5_errx(context, 1, "ntlm challenge have wrong length"); 469 memcpy(type2.challenge, challenge.data, sizeof(type2.challenge)) [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
| test_ntlm.c | 101 memset(type2.challenge, 0x7f, sizeof(type2.challenge)); 138 type2.challenge, 180 memset(type2.challenge, 0x7f, sizeof(type2.challenge)); 341 const unsigned char challenge[8] = local 377 challenge,
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| spkac.c | 45 {"challenge", OPT_CHALLENGE, 's', "Challenge string"}, 66 char *challenge = NULL, *keyfile = NULL; local 114 challenge = opt_arg(); 156 if (challenge != NULL) 157 ASN1_STRING_set(spki->spkac->challenge, 158 challenge, (int)strlen(challenge));
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| spkac.c | 37 {"challenge", OPT_CHALLENGE, 's', "Challenge string"}, 57 char *challenge = NULL, *keyfile = NULL; local 103 challenge = opt_arg(); 133 if (challenge != NULL) 134 ASN1_STRING_set(spki->spkac->challenge, 135 challenge, (int)strlen(challenge));
|
| /src/external/bsd/libfido2/dist/src/ |
| u2f.c | 149 unsigned char challenge[SHA256_DIGEST_LENGTH]; local 153 /* dummy challenge & application */ 154 memset(&challenge, 0xff, sizeof(challenge)); 159 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 || 205 unsigned char challenge[SHA256_DIGEST_LENGTH]; local 217 memset(&challenge, 0xff, sizeof(challenge)); 231 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 | [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| ms_funcs.c | 78 * @challenge: 8-octet Challenge (OUT) 82 const u8 *username, size_t username_len, u8 *challenge) 97 os_memcpy(challenge, hash, 8); 140 * @challenge: 8-octet Challenge (IN) 145 int challenge_response(const u8 *challenge, const u8 *password_hash, 150 if (des_encrypt(challenge, password_hash, response) < 0 || 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) 156 return des_encrypt(challenge, zpwd, response + 16) 176 u8 challenge[8]; local 204 u8 challenge[8]; local 247 u8 password_hash_hash[16], challenge[8]; local [all...] |