HomeSort by: relevance | last modified time | path
    Searched defs:challenge (Results 1 - 25 of 53) sorted by relevancy

1 2 3

  /src/crypto/external/bsd/netpgp/dist/src/libpaa/
client.c 47 char challenge[2048]; local
62 //challenge.domain = optarg;
65 //challenge.realm = optarg;
82 /* read challenge into challenge */
83 challengec = read(0, challenge, sizeof(challenge));
84 cc = paa_format_response(&response, &netpgp, challenge, buf, sizeof(buf));
server.c 46 paa_challenge_t challenge; local
55 (void) memset(&challenge, 0x0, sizeof(challenge));
69 challenge.domain = optarg;
72 challenge.realm = optarg;
92 /* format the challenge */
93 cc = paa_format_challenge(&challenge, &server, buf, sizeof(buf));
94 /* write challenge to temp file */
95 paa_write_file("challenge", buf, cc);
97 system("client/paaclient -r authentication@bigco.com < challenge > response")
    [all...]
libpaa.h 48 /* used in server to formulate challenge */
50 const char *realm; /* this is realm of challenge */
51 const char *domain; /* domain of challenge */
52 char challenge[512]; /* the output challenge */ member in struct:paa_challenge_t
53 int challengec; /* # of chars in challenge */
54 /* sub-parts of challenge */
55 char encoded_challenge[512]; /* encoded challenge part */
56 int encc; /* # of chars in encoded challenge */
63 char challenge[PAA_CHALLENGE_SIZE]; /* input challenge * member in struct:paa_response_t
    [all...]
libpaa.c 65 /* generate a challenge */
67 genchallenge(paa_challenge_t *challenge, paa_server_info_t *server)
75 cc = snprintf(raw, sizeof(raw), "%s;%s;%lld;", challenge->realm, server->hostaddress, (int64_t)t);
77 /* raw now has the raw-challenge in it */
78 challenge->encc = b64encode(raw, (const unsigned)cc, challenge->encoded_challenge,
79 sizeof(challenge->encoded_challenge), 0);
84 /* raw has raw-challenge ; server-secret-value, i.e. raw-server-signature */
85 challenge->challengec = snprintf(challenge->challenge, sizeof(challenge->challenge)
229 char challenge[2048 * 2]; local
    [all...]
  /src/crypto/external/bsd/openssh/dist/
auth-bsdauth.c 57 char *challenge = NULL; local
66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
67 if (challenge == NULL) {
73 if (challenge == NULL) {
78 authctxt->style, "auth-ssh", &challenge);
80 challenge = NULL;
81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
84 if (challenge == NULL)
92 (*prompts)[0] = xstrdup(challenge);
    [all...]
auth-skey.c 61 char challenge[1024]; local
64 if (skeychallenge(&skey, authctxt->user, challenge, sizeof(challenge)) == -1)
73 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
ssh-sk-helper.c 173 struct sshbuf *challenge, *attest, *kbuf, *resp; local
187 (r = sshbuf_froms(req, &challenge)) != 0)
194 if (sshbuf_len(challenge) == 0) {
195 sshbuf_free(challenge);
196 challenge = NULL;
203 flags, pin, challenge, &key, attest)) != 0) {
221 sshbuf_free(challenge);
ssh-sk.c 55 int (*sk_enroll)(int alg, const uint8_t *challenge,
60 /* Sign a challenge */
73 int ssh_sk_enroll(int alg, const uint8_t *challenge,
471 const u_char *challenge; local
479 "userid \"%s\", flags 0x%02x, challenge len %zu%s",
516 debug_f("using random challenge");
518 challenge = randchall;
521 error("Missing enrollment challenge");
525 challenge = sshbuf_ptr(challenge_buf);
527 debug3_f("using explicit challenge len=%zd", challenge_len)
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_md5.c 34 const u8 *pos, *challenge, *password; local
55 * CHAP Challenge:
56 * Value-Size (1 octet) | Value(Challenge) | Name(optional)
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
69 challenge, challenge_len);
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
eap_leap.c 65 const u8 *pos, *challenge, *identity, *password; local
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge "
102 challenge = pos;
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP",
105 challenge, LEAP_CHALLENGE_LEN);
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
118 if ((pwhash && challenge_response(challenge, password, rpos)) ||
120 nt_challenge_response(challenge, password, password_len, rpos))) {
171 "for challenge");
    [all...]
  /src/external/bsd/openldap/dist/libraries/liblutil/
sasl.c 118 int challenge=0; local
136 challenge = 1;
139 challenge = 1;
156 if( challenge ) {
157 if( interact->challenge ) {
158 fprintf( stderr, _("Challenge: %s\n"), interact->challenge );
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_md5.c 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
  /src/crypto/external/apache2/openssl/dist/crypto/ec/curve448/
eddsa.c 228 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; local
230 /* Compute the challenge */
236 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge)))
239 ossl_curve448_scalar_decode_long(challenge_scalar, challenge,
240 sizeof(challenge));
241 OPENSSL_cleanse(challenge, sizeof(challenge));
334 /* Compute the challenge */
336 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES] local
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/
kdc.c 256 krb5_data challenge; local
298 ret = krb5_ntlm_init_get_challenge(c->context, c->ntlm, &challenge);
304 if (challenge.length != sizeof(type2.challenge)) {
308 memcpy(type2.challenge, challenge.data, sizeof(type2.challenge));
309 krb5_data_free(&challenge);
  /src/crypto/external/bsd/openssl/dist/crypto/ec/curve448/
eddsa.c 232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; local
234 /* Compute the challenge */
240 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge)))
243 ossl_curve448_scalar_decode_long(challenge_scalar, challenge,
244 sizeof(challenge));
245 OPENSSL_cleanse(challenge, sizeof(challenge));
329 /* Compute the challenge */
331 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES] local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/ec/curve448/
eddsa.c 202 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; local
204 /* Compute the challenge */
209 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge)))
212 curve448_scalar_decode_long(challenge_scalar, challenge,
213 sizeof(challenge));
214 OPENSSL_cleanse(challenge, sizeof(challenge));
294 /* Compute the challenge */
296 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES] local
    [all...]
  /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/
key_correctness_proof.c 340 i, j, test_bit( j, proof->challenge, proof->length_challenge));
345 if( test_bit( j, proof->challenge, proof->length_challenge)) {
377 LogDebug("verifiable challenge=%s",
379 LogDebug(" challenge=%s",
380 dump_byte_array( proof->length_challenge, proof->challenge));
386 if( verifiable_challenge[i] != proof->challenge[i]) {
391 *isCorrect = ( memcmp( verifiable_challenge, proof->challenge, length_challenge) == 0);
471 LogDebug("Step b: compute challenge (message digest)");
472 BYTE challenge[EVP_MAX_MD_SIZE]; local
474 generateMessageDigest( challenge,
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
spkac.c 55 { "challenge", OPT_CHALLENGE, 's', "Challenge string" },
76 char *challenge = NULL, *keyfile = NULL; local
124 challenge = opt_arg();
165 if (challenge != NULL
166 && !ASN1_STRING_set(spki->spkac->challenge,
167 challenge, (int)strlen(challenge)))
  /src/crypto/external/apache2/openssl/dist/ssl/quic/
qlog_event_helpers.c 356 uint64_t challenge; local
358 if (!ossl_quic_wire_decode_frame_path_challenge(pkt, &challenge))
364 uint64_t challenge; local
366 if (!ossl_quic_wire_decode_frame_path_response(pkt, &challenge))
  /src/crypto/external/bsd/heimdal/dist/kuser/
kdigest.c 278 unsigned char md[SHA_DIGEST_LENGTH], challenge[SHA_DIGEST_LENGTH]; local
330 EVP_DigestFinal_ex(ctx, challenge, NULL);
334 EVP_DigestUpdate(ctx, challenge, 8);
438 krb5_data challenge, opaque; local
463 ret = krb5_ntlm_init_get_challenge(context, ntlm, &challenge);
467 if (challenge.length != sizeof(type2.challenge))
468 krb5_errx(context, 1, "ntlm challenge have wrong length");
469 memcpy(type2.challenge, challenge.data, sizeof(type2.challenge))
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/ntlm/
test_ntlm.c 101 memset(type2.challenge, 0x7f, sizeof(type2.challenge));
138 type2.challenge,
180 memset(type2.challenge, 0x7f, sizeof(type2.challenge));
341 const unsigned char challenge[8] = local
377 challenge,
  /src/crypto/external/bsd/openssl/dist/apps/
spkac.c 45 {"challenge", OPT_CHALLENGE, 's', "Challenge string"},
66 char *challenge = NULL, *keyfile = NULL; local
114 challenge = opt_arg();
156 if (challenge != NULL)
157 ASN1_STRING_set(spki->spkac->challenge,
158 challenge, (int)strlen(challenge));
  /src/crypto/external/bsd/openssl.old/dist/apps/
spkac.c 37 {"challenge", OPT_CHALLENGE, 's', "Challenge string"},
57 char *challenge = NULL, *keyfile = NULL; local
103 challenge = opt_arg();
133 if (challenge != NULL)
134 ASN1_STRING_set(spki->spkac->challenge,
135 challenge, (int)strlen(challenge));
  /src/external/bsd/libfido2/dist/src/
u2f.c 149 unsigned char challenge[SHA256_DIGEST_LENGTH]; local
153 /* dummy challenge & application */
154 memset(&challenge, 0xff, sizeof(challenge));
159 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 ||
205 unsigned char challenge[SHA256_DIGEST_LENGTH]; local
217 memset(&challenge, 0xff, sizeof(challenge));
231 iso7816_add(apdu, &challenge, sizeof(challenge)) < 0 |
    [all...]
  /src/external/bsd/wpa/dist/src/crypto/
ms_funcs.c 78 * @challenge: 8-octet Challenge (OUT)
82 const u8 *username, size_t username_len, u8 *challenge)
97 os_memcpy(challenge, hash, 8);
140 * @challenge: 8-octet Challenge (IN)
145 int challenge_response(const u8 *challenge, const u8 *password_hash,
150 if (des_encrypt(challenge, password_hash, response) < 0 ||
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0)
156 return des_encrypt(challenge, zpwd, response + 16)
176 u8 challenge[8]; local
204 u8 challenge[8]; local
247 u8 password_hash_hash[16], challenge[8]; local
    [all...]

Completed in 60 milliseconds

1 2 3