Home
last modified time | relevance | path

Searched refs:challenge (Results 1 - 25 of 125) sorted by relevance

12345

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dms_funcs.c78 * @challenge: 8-octet Challenge (OUT)
82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash()
97 os_memcpy(challenge, hash, 8); in challenge_hash()
140 * @challenge: 8-octet Challenge (IN)
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
180 username_len, challenge) || in generate_nt_response()
81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) challenge_hash() argument
204 u8 challenge[8]; generate_nt_response_pwhash() local
247 u8 password_hash_hash[16], challenge[8]; generate_authenticator_response_pwhash() local
306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) nt_challenge_response() argument
[all...]
H A Dms_funcs.h31 int nt_challenge_response(const u8 *challenge, const u8 *password,
34 int challenge_response(const u8 *challenge, const u8 *password_hash,
37 const u8 *username, size_t username_len, u8 *challenge);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dms_funcs.c78 * @challenge: 8-octet Challenge (OUT)
82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash()
97 os_memcpy(challenge, hash, 8); in challenge_hash()
140 * @challenge: 8-octet Challenge (IN)
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
180 username_len, challenge) || in generate_nt_response()
81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) challenge_hash() argument
204 u8 challenge[8]; generate_nt_response_pwhash() local
247 u8 password_hash_hash[16], challenge[8]; generate_authenticator_response_pwhash() local
306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) nt_challenge_response() argument
[all...]
H A Dms_funcs.h31 int nt_challenge_response(const u8 *challenge, const u8 *password,
34 int challenge_response(const u8 *challenge, const u8 *password_hash,
37 const u8 *username, size_t username_len, u8 *challenge);
/third_party/lwip/src/netif/ppp/
H A Dchap-md5.c63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response()
72 challenge_len = *challenge++; in chap_md5_verify_response()
75 /* Generate hash of ID, secret, challenge */ in chap_md5_verify_response()
80 lwip_md5_update(&ctx, challenge, challenge_len); in chap_md5_verify_response()
96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response()
100 int challenge_len = *challenge++; in chap_md5_make_response()
109 lwip_md5_update(&ctx, challenge, challenge_len); in chap_md5_make_response()
61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chap_md5_verify_response() argument
95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chap_md5_make_response() argument
H A Dchap_ms.c209 { "mschap-challenge", o_string, &mschap_challenge,
210 "specify CHAP challenge" },
211 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
212 "specify CHAP peer challenge" },
220 * chapms_generate_challenge - generate a challenge for MS-CHAP.
221 * For MS-CHAP the challenge length is fixed at 8 bytes.
222 * The length goes in challenge[0] and the actual challenge starts
223 * at challenge[1].
225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { in chapms_generate_challenge() argument
237 chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) chapms2_generate_challenge() argument
249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms_verify_response() argument
297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms2_verify_response() argument
374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms_make_response() argument
385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms2_make_response() argument
496 ChallengeResponse(const u_char *challenge, const u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) ChallengeResponse() argument
[all...]
H A Dchap-new.c53 /* Hook for a plugin to validate CHAP challenge */
56 const unsigned char *challenge, const unsigned char *response,
67 { "chap-max-challenge", o_int, &pcb->settings.chap_max_transmits,
68 "Set max #xmits for challenge", OPT_PRIO },
97 const unsigned char *challenge, const unsigned char *response,
191 * There isn't much to do until we receive a challenge.
219 * chap_timeout - It's time to send another challenge to the peer.
220 * This could be either a retransmission of a previous challenge,
221 * or a new challenge to start re-authentication.
246 MEMCPY(p->payload, pcb->chap_server.challenge, pc in chap_timeout()
411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) global() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/
H A Deddsa.c232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local
234 /* Compute the challenge */ in ossl_c448_ed448_sign()
240 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign()
243 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign()
244 sizeof(challenge)); in ossl_c448_ed448_sign()
245 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign()
329 /* Compute the challenge */ in ossl_c448_ed448_verify()
331 uint8_t challenge[ in ossl_c448_ed448_verify() local
[all...]
/third_party/openssl/crypto/ec/curve448/
H A Deddsa.c232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local
234 /* Compute the challenge */ in ossl_c448_ed448_sign()
240 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign()
243 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign()
244 sizeof(challenge)); in ossl_c448_ed448_sign()
245 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign()
329 /* Compute the challenge */ in ossl_c448_ed448_verify()
331 uint8_t challenge[ in ossl_c448_ed448_verify() local
[all...]
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/signer/fulcio/
H A Dca.js29 async createSigningCertificate(identityToken, publicKey, challenge) {
30 const request = toCertificateRequest(identityToken, publicKey, challenge);
47 function toCertificateRequest(identityToken, publicKey, challenge) {
57 proofOfPossession: challenge.toString('base64'),
/third_party/lwip/src/include/netif/ppp/
H A Dchap-new.h66 * Semi-arbitrary limits on challenge and response fields.
72 * These limits apply to challenge and response packets we send.
136 * Note: challenge and response arguments below are formatted as
137 * a length byte followed by the actual challenge/response data.
139 void (*generate_challenge)(ppp_pcb *pcb, unsigned char *challenge);
142 const unsigned char *challenge, const unsigned char *response,
146 const unsigned char *challenge, const char *secret, int secret_len,
171 unsigned char challenge[CHAL_MAX_PKTLEN]; member
177 /* Hook for a plugin to validate CHAP challenge */
180 unsigned char *challenge, unsigne
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq()
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq()
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq()
123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
H A Deap_server_ttls.c334 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge()
557 const u8 *challenge, in eap_ttls_process_phase2_chap()
564 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap()
568 "(challenge len %lu password len %lu)", in eap_ttls_process_phase2_chap()
587 "challenge from TLS data"); in eap_ttls_process_phase2_chap()
592 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap()
604 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap()
620 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap()
625 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap()
629 "attributes (challenge le in eap_ttls_process_phase2_mschap()
555 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) eap_ttls_process_phase2_chap() argument
618 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschap() argument
693 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschapv2() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " in eap_md5_process()
67 challenge = pos; in eap_md5_process()
69 challenge, challenge_len); in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
H A Deap_ttls.c307 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge()
487 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2()
512 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2()
514 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2()
517 "implicit challenge"); in eap_ttls_phase2_request_mschapv2()
523 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2()
529 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2()
533 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
536 "random data for peer challenge"); in eap_ttls_phase2_request_mschapv2()
544 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2()
[all...]
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " in eap_leap_process_request()
102 challenge = pos; in eap_leap_process_request()
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
105 challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request()
120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
171 "for challenge"); in eap_leap_process_success()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " in eap_md5_process()
67 challenge = pos; in eap_md5_process()
69 challenge, challenge_len); in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
H A Deap_ttls.c319 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge()
516 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2()
541 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2()
543 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2()
546 "implicit challenge"); in eap_ttls_phase2_request_mschapv2()
552 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2()
558 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2()
562 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
565 "random data for peer challenge"); in eap_ttls_phase2_request_mschapv2()
573 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2()
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Dspkac.c45 {"challenge", OPT_CHALLENGE, 's', "Challenge string"},
66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
114 challenge = opt_arg(); in spkac_main()
156 if (challenge != NULL) in spkac_main()
157 ASN1_STRING_set(spki->spkac->challenge, in spkac_main()
158 challenge, (int)strlen(challenge)); in spkac_main()
/third_party/openssl/apps/
H A Dspkac.c45 {"challenge", OPT_CHALLENGE, 's', "Challenge string"},
66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
114 challenge = opt_arg(); in spkac_main()
156 if (challenge != NULL) in spkac_main()
157 ASN1_STRING_set(spki->spkac->challenge, in spkac_main()
158 challenge, (int)strlen(challenge)); in spkac_main()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq()
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq()
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq()
123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
H A Deap_server_ttls.c334 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge()
556 const u8 *challenge, in eap_ttls_process_phase2_chap()
563 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap()
567 "(challenge len %lu password len %lu)", in eap_ttls_process_phase2_chap()
586 "challenge from TLS data"); in eap_ttls_process_phase2_chap()
591 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap()
603 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap()
619 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap()
624 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap()
628 "attributes (challenge le in eap_ttls_process_phase2_mschap()
554 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) eap_ttls_process_phase2_chap() argument
617 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschap() argument
692 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschapv2() argument
[all...]
/third_party/node/deps/npm/lib/commands/
H A Dprofile.js329 const challenge = await pulseTillDone.withPromise(
333 if (challenge.tfa === null) {
338 const badResponse = typeof challenge.tfa !== 'string'
339 || !/^otpauth:[/][/]/.test(challenge.tfa)
343 ', got: ' + inspect(challenge.tfa)
347 const otpauth = new URL(challenge.tfa)
349 const code = await qrcode(challenge.tfa)
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
25 addr[2] = challenge; in chap_md5()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
25 addr[2] = challenge; in chap_md5()

Completed in 15 milliseconds

12345