/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.c | 78 * @challenge: 8-octet Challenge (OUT) 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() 97 os_memcpy(challenge, hash, 8); in challenge_hash() 140 * @challenge: 8-octet Challenge (IN) 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 180 username_len, challenge) || in generate_nt_response() 81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) challenge_hash() argument 204 u8 challenge[8]; generate_nt_response_pwhash() local 247 u8 password_hash_hash[16], challenge[8]; generate_authenticator_response_pwhash() local 306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) nt_challenge_response() argument [all...] |
H A D | ms_funcs.h | 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 34 int challenge_response(const u8 *challenge, const u8 *password_hash, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | ms_funcs.c | 78 * @challenge: 8-octet Challenge (OUT) 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() 97 os_memcpy(challenge, hash, 8); in challenge_hash() 140 * @challenge: 8-octet Challenge (IN) 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 180 username_len, challenge) || in generate_nt_response() 81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) challenge_hash() argument 204 u8 challenge[8]; generate_nt_response_pwhash() local 247 u8 password_hash_hash[16], challenge[8]; generate_authenticator_response_pwhash() local 306 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) nt_challenge_response() argument [all...] |
H A D | ms_funcs.h | 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 34 int challenge_response(const u8 *challenge, const u8 *password_hash, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/third_party/lwip/src/netif/ppp/ |
H A D | chap-md5.c | 63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response() 72 challenge_len = *challenge++; in chap_md5_verify_response() 75 /* Generate hash of ID, secret, challenge */ in chap_md5_verify_response() 80 lwip_md5_update(&ctx, challenge, challenge_len); in chap_md5_verify_response() 96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response() 100 int challenge_len = *challenge++; in chap_md5_make_response() 109 lwip_md5_update(&ctx, challenge, challenge_len); in chap_md5_make_response() 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chap_md5_verify_response() argument 95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chap_md5_make_response() argument
|
H A D | chap_ms.c | 209 { "mschap-challenge", o_string, &mschap_challenge, 210 "specify CHAP challenge" }, 211 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 212 "specify CHAP peer challenge" }, 220 * chapms_generate_challenge - generate a challenge for MS-CHAP. 221 * For MS-CHAP the challenge length is fixed at 8 bytes. 222 * The length goes in challenge[0] and the actual challenge starts 223 * at challenge[1]. 225 static void chapms_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) { in chapms_generate_challenge() argument 237 chapms2_generate_challenge(ppp_pcb *pcb, unsigned char *challenge) chapms2_generate_challenge() argument 249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms_verify_response() argument 297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms2_verify_response() argument 374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms_make_response() argument 385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms2_make_response() argument 496 ChallengeResponse(const u_char *challenge, const u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) ChallengeResponse() argument [all...] |
H A D | chap-new.c | 53 /* Hook for a plugin to validate CHAP challenge */ 56 const unsigned char *challenge, const unsigned char *response, 67 { "chap-max-challenge", o_int, &pcb->settings.chap_max_transmits, 68 "Set max #xmits for challenge", OPT_PRIO }, 97 const unsigned char *challenge, const unsigned char *response, 191 * There isn't much to do until we receive a challenge. 219 * chap_timeout - It's time to send another challenge to the peer. 220 * This could be either a retransmission of a previous challenge, 221 * or a new challenge to start re-authentication. 246 MEMCPY(p->payload, pcb->chap_server.challenge, pc in chap_timeout() 411 chap_verify_response(ppp_pcb *pcb, const char *name, const char *ourname, int id, const struct chap_digest_type *digest, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) global() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local 234 /* Compute the challenge */ in ossl_c448_ed448_sign() 240 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign() 243 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign() 244 sizeof(challenge)); in ossl_c448_ed448_sign() 245 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign() 329 /* Compute the challenge */ in ossl_c448_ed448_verify() 331 uint8_t challenge[ in ossl_c448_ed448_verify() local [all...] |
/third_party/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 232 uint8_t challenge[2 * EDDSA_448_PRIVATE_BYTES]; in ossl_c448_ed448_sign() local 234 /* Compute the challenge */ in ossl_c448_ed448_sign() 240 || !EVP_DigestFinalXOF(hashctx, challenge, sizeof(challenge))) in ossl_c448_ed448_sign() 243 ossl_curve448_scalar_decode_long(challenge_scalar, challenge, in ossl_c448_ed448_sign() 244 sizeof(challenge)); in ossl_c448_ed448_sign() 245 OPENSSL_cleanse(challenge, sizeof(challenge)); in ossl_c448_ed448_sign() 329 /* Compute the challenge */ in ossl_c448_ed448_verify() 331 uint8_t challenge[ in ossl_c448_ed448_verify() local [all...] |
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/signer/fulcio/ |
H A D | ca.js | 29 async createSigningCertificate(identityToken, publicKey, challenge) { 30 const request = toCertificateRequest(identityToken, publicKey, challenge); 47 function toCertificateRequest(identityToken, publicKey, challenge) { 57 proofOfPossession: challenge.toString('base64'),
|
/third_party/lwip/src/include/netif/ppp/ |
H A D | chap-new.h | 66 * Semi-arbitrary limits on challenge and response fields. 72 * These limits apply to challenge and response packets we send. 136 * Note: challenge and response arguments below are formatted as 137 * a length byte followed by the actual challenge/response data. 139 void (*generate_challenge)(ppp_pcb *pcb, unsigned char *challenge); 142 const unsigned char *challenge, const unsigned char *response, 146 const unsigned char *challenge, const char *secret, int secret_len, 171 unsigned char challenge[CHAL_MAX_PKTLEN]; member 177 /* Hook for a plugin to validate CHAP challenge */ 180 unsigned char *challenge, unsigne [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq() 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq() 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq() 123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
|
H A D | eap_server_ttls.c | 334 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge() 557 const u8 *challenge, in eap_ttls_process_phase2_chap() 564 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap() 568 "(challenge len %lu password len %lu)", in eap_ttls_process_phase2_chap() 587 "challenge from TLS data"); in eap_ttls_process_phase2_chap() 592 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap() 604 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap() 620 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() 625 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap() 629 "attributes (challenge le in eap_ttls_process_phase2_mschap() 555 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) eap_ttls_process_phase2_chap() argument 618 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschap() argument 693 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschapv2() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " in eap_md5_process() 67 challenge = pos; in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
H A D | eap_ttls.c | 307 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge() 487 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2() 512 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2() 514 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2() 517 "implicit challenge"); in eap_ttls_phase2_request_mschapv2() 523 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2() 529 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2() 533 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 536 "random data for peer challenge"); in eap_ttls_phase2_request_mschapv2() 544 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() [all...] |
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " in eap_leap_process_request() 102 challenge = pos; in eap_leap_process_request() 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 105 challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request() 118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request() 171 "for challenge"); in eap_leap_process_success()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " in eap_md5_process() 67 challenge = pos; in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
H A D | eap_ttls.c | 319 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge() 516 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2() 541 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2() 543 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2() 546 "implicit challenge"); in eap_ttls_phase2_request_mschapv2() 552 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2() 558 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2() 562 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 565 "random data for peer challenge"); in eap_ttls_phase2_request_mschapv2() 573 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | spkac.c | 45 {"challenge", OPT_CHALLENGE, 's', "Challenge string"}, 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 114 challenge = opt_arg(); in spkac_main() 156 if (challenge != NULL) in spkac_main() 157 ASN1_STRING_set(spki->spkac->challenge, in spkac_main() 158 challenge, (int)strlen(challenge)); in spkac_main()
|
/third_party/openssl/apps/ |
H A D | spkac.c | 45 {"challenge", OPT_CHALLENGE, 's', "Challenge string"}, 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 114 challenge = opt_arg(); in spkac_main() 156 if (challenge != NULL) in spkac_main() 157 ASN1_STRING_set(spki->spkac->challenge, in spkac_main() 158 challenge, (int)strlen(challenge)); in spkac_main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq() 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq() 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq() 123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
|
H A D | eap_server_ttls.c | 334 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", in eap_ttls_implicit_challenge() 556 const u8 *challenge, in eap_ttls_process_phase2_chap() 563 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap() 567 "(challenge len %lu password len %lu)", in eap_ttls_process_phase2_chap() 586 "challenge from TLS data"); in eap_ttls_process_phase2_chap() 591 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap() 603 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap() 619 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() 624 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap() 628 "attributes (challenge le in eap_ttls_process_phase2_mschap() 554 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) eap_ttls_process_phase2_chap() argument 617 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschap() argument 692 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) eap_ttls_process_phase2_mschapv2() argument [all...] |
/third_party/node/deps/npm/lib/commands/ |
H A D | profile.js | 329 const challenge = await pulseTillDone.withPromise( 333 if (challenge.tfa === null) { 338 const badResponse = typeof challenge.tfa !== 'string' 339 || !/^otpauth:[/][/]/.test(challenge.tfa) 343 ', got: ' + inspect(challenge.tfa) 347 const otpauth = new URL(challenge.tfa) 349 const code = await qrcode(challenge.tfa)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 25 addr[2] = challenge; in chap_md5()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 25 addr[2] = challenge; in chap_md5()
|