Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 168) sorted by relevance

1234567

/external/ppp/pppd/
Dchap_ms.c169 chapms_generate_challenge(unsigned char *challenge) in chapms_generate_challenge() argument
171 *challenge++ = 8; in chapms_generate_challenge()
174 memcpy(challenge, mschap_challenge, 8); in chapms_generate_challenge()
177 random_bytes(challenge, 8); in chapms_generate_challenge()
181 chapms2_generate_challenge(unsigned char *challenge) in chapms2_generate_challenge() argument
183 *challenge++ = 16; in chapms2_generate_challenge()
186 memcpy(challenge, mschap_challenge, 16); in chapms2_generate_challenge()
189 random_bytes(challenge, 16); in chapms2_generate_challenge()
195 unsigned char *challenge, unsigned char *response, in chapms_verify_response() argument
202 challenge_len = *challenge++; /* skip length, is 8 */ in chapms_verify_response()
[all …]
Dchap-md5.c59 unsigned char *challenge, unsigned char *response, in chap_md5_verify_response() argument
67 challenge_len = *challenge++; in chap_md5_verify_response()
74 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_verify_response()
89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument
94 int challenge_len = *challenge++; in chap_md5_make_response()
99 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_make_response()
Dchap-new.h100 void (*generate_challenge)(unsigned char *challenge);
103 unsigned char *challenge, unsigned char *response,
106 unsigned char *challenge, char *secret, int secret_len,
117 unsigned char *challenge, unsigned char *response,
Dchap-new.c55 unsigned char *challenge, unsigned char *response,
102 unsigned char challenge[CHAL_MAX_PKTLEN]; member
126 unsigned char *challenge, unsigned char *response,
271 output(0, ss->challenge, ss->challenge_pktlen); in chap_timeout()
287 p = ss->challenge; in chap_generate_challenge()
298 p = ss->challenge + PPP_HDRLEN; in chap_generate_challenge()
321 if (id != ss->challenge[PPP_HDRLEN+1] || len < 2) in chap_handle_response()
349 ss->challenge + PPP_HDRLEN + CHAP_HDRLEN, in chap_handle_response()
414 unsigned char *challenge, unsigned char *response, in chap_verify_response() argument
427 ok = digest->verify_response(id, name, secret, secret_len, challenge, in chap_verify_response()
/external/openssh/
Dauth-bsdauth.c55 char *challenge = NULL; in bsdauth_query() local
64 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query()
65 if (challenge == NULL) { in bsdauth_query()
71 if (challenge == NULL) { in bsdauth_query()
76 authctxt->style, "auth-ssh", &challenge); in bsdauth_query()
78 challenge = NULL; in bsdauth_query()
79 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
82 if (challenge == NULL) in bsdauth_query()
90 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
/external/wpa_supplicant_8/src/crypto/
Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
97 os_memcpy(challenge, hash, 8); in challenge_hash()
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
180 username_len, challenge) || in generate_nt_response()
182 challenge_response(challenge, password_hash, response)) in generate_nt_response()
204 u8 challenge[8]; in generate_nt_response_pwhash() local
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
DNetscapeCertRequest.java51 String challenge; field in NetscapeCertRequest
106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest()
129 String challenge, in NetscapeCertRequest() argument
135 this.challenge = challenge; in NetscapeCertRequest()
142 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest()
156 return challenge; in getChallenge()
161 challenge = value; in setChallenge()
194 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument
197 if (!challenge.equals(this.challenge)) in verify()
239 pkac.add(new DERIA5String(challenge)); in sign()
[all …]
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jce/netscape/
DNetscapeCertRequest.java53 String challenge; field in NetscapeCertRequest
108 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest()
131 String challenge, in NetscapeCertRequest() argument
137 this.challenge = challenge; in NetscapeCertRequest()
144 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest()
158 return challenge; in getChallenge()
163 challenge = value; in setChallenge()
196 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument
199 if (!challenge.equals(this.challenge)) in verify()
241 pkac.add(new DERIA5String(challenge)); in sign()
[all …]
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jce/netscape/
DNetscapeCertRequest.java53 String challenge; field in NetscapeCertRequest
108 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest()
131 String challenge, in NetscapeCertRequest() argument
137 this.challenge = challenge; in NetscapeCertRequest()
144 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest()
158 return challenge; in getChallenge()
163 challenge = value; in setChallenge()
196 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument
199 if (!challenge.equals(this.challenge)) in verify()
241 pkac.add(new DERIA5String(challenge)); in sign()
[all …]
/external/python/httplib2/python2/httplib2/
D__init__.py673 challenge = _parse_www_authenticate(response, "www-authenticate")
674 self.challenge = challenge["digest"]
675 qop = self.challenge.get("qop", "auth")
676 self.challenge["qop"] = (
679 if self.challenge["qop"] is None:
683 self.challenge["algorithm"] = self.challenge.get("algorithm", "MD5").upper()
684 if self.challenge["algorithm"] != "MD5":
686 _("Unsupported value for algorithm: %s." % self.challenge["algorithm"])
692 self.challenge["realm"],
697 self.challenge["nc"] = 1
[all …]
/external/python/httplib2/python3/httplib2/
D__init__.py648 challenge = _parse_www_authenticate(response, "www-authenticate")
649 self.challenge = challenge["digest"]
650 qop = self.challenge.get("qop", "auth")
651 self.challenge["qop"] = (
654 if self.challenge["qop"] is None:
658 self.challenge["algorithm"] = self.challenge.get("algorithm", "MD5").upper()
659 if self.challenge["algorithm"] != "MD5":
661 _("Unsupported value for algorithm: %s." % self.challenge["algorithm"])
667 self.challenge["realm"],
672 self.challenge["nc"] = 1
[all …]
/external/apache-http/src/org/apache/http/impl/auth/
DNTLMScheme.java65 private String challenge; field in NTLMScheme
74 this.challenge = null; in NTLMScheme()
98 String challenge = buffer.substringTrimmed(pos, len); in parseChallenge() local
99 if (challenge.length() == 0) { in parseChallenge()
105 this.challenge = null; in parseChallenge()
108 this.challenge = challenge; in parseChallenge()
135 this.challenge); in authenticate()
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
DAuthenticatorAdapter.java42 Challenge challenge = challenges.get(i); in authenticate() local
43 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticate()
47 challenge.getRealm(), challenge.getScheme(), url.url(), RequestorType.SERVER); in authenticate()
64 Challenge challenge = challenges.get(i); in authenticateProxy() local
65 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticateProxy()
70 url.scheme(), challenge.getRealm(), challenge.getScheme(), url.url(), in authenticateProxy()
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/http/
DAuthenticatorAdapter.java44 Challenge challenge = challenges.get(i); in authenticate() local
45 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticate()
49 challenge.getRealm(), challenge.getScheme(), url.url(), RequestorType.SERVER); in authenticate()
66 Challenge challenge = challenges.get(i); in authenticateProxy() local
67 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticateProxy()
72 url.scheme(), challenge.getRealm(), challenge.getScheme(), url.url(), in authenticateProxy()
/external/ppp/pppd/plugins/
Dwinbind.c100 unsigned char *challenge,
245 const u_char *challenge, in run_ntlm_auth() argument
355 sprintf(challenge_hex + i * 2, "%02X", challenge[i]); in run_ntlm_auth()
513 unsigned char *challenge, in winbind_chap_verify() argument
525 challenge_len = *challenge++; in winbind_chap_verify()
580 challenge, challenge_len, in winbind_chap_verify()
585 mppe_set_keys(challenge, session_key); in winbind_chap_verify()
595 challenge_len, challenge); in winbind_chap_verify()
610 ChallengeHash(&response[MS_CHAP2_PEER_CHALLENGE], challenge, in winbind_chap_verify()
629 challenge, user, saresponse); in winbind_chap_verify()
[all …]
/external/python/cpython2/Demo/pdist/
Dsecurity.py28 def _compare_challenge_response(self, challenge, response): argument
29 return self._encode_challenge(challenge) == response
31 def _encode_challenge(self, challenge): argument
33 return pow(long(challenge), p, m)
/external/autotest/client/common_lib/cros/
Dg2f_utils.py44 def G2fRegister(client, dev, challenge, application, p1=0): argument
50 ' --challenge=' + challenge +
55 def G2fAuth(client, dev, challenge, application, key_handle, p1=0): argument
61 ' --challenge=' + challenge +
/external/openscreen/cast/receiver/channel/
Ddevice_auth_namespace_handler.cc85 const AuthChallenge& challenge = device_auth_message.challenge(); in OnMessage() local
86 const SignatureAlgorithm sig_alg = challenge.signature_algorithm(); in OnMessage()
87 HashAlgorithm hash_alg = challenge.hash_algorithm(); in OnMessage()
121 if (challenge.has_sender_nonce()) { in OnMessage()
122 sender_nonce = challenge.sender_nonce(); in OnMessage()
/external/wpa_supplicant_8/src/eap_peer/
Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
67 challenge = pos; in eap_md5_process()
69 challenge, challenge_len); in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
Deap_ttls.c516 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2()
541 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2()
543 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2()
552 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2()
558 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2()
562 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
573 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2()
576 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
585 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
610 u8 *buf, *pos, *challenge; in eap_ttls_phase2_request_mschap()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq()
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq()
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq()
123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
/external/autotest/server/site_tests/firmware_Cr50RMAOpen/
Dcontrol21 - Authcodes can't be reused once another challenge is generated.
24 Generate the challenge and calculate the response using rma_reset -c. Verify
27 If the generated challenge has the wrong version, make sure the challenge
Dfirmware_Cr50RMAOpen.py102 def parse_challenge(self, challenge): argument
104 return re.sub('\s', '', challenge.strip())
107 def generate_response(self, challenge): argument
117 stdout = self.host.run('rma_reset -c ' + challenge).stdout
239 challenge = challenge_func()
240 logging.info(challenge)
244 authcode, unsupported_key = self.generate_response(challenge)
Dcontrol.faft_cr50_tot21 - Authcodes can't be reused once another challenge is generated.
24 Generate the challenge and calculate the response using rma_reset -c. Verify
27 If the generated challenge has the wrong version, make sure the challenge
/external/avb/tools/
Dat_auth_unlock.py240 def SelectMatchingUnlockCredential(all_creds, challenge): argument
254 if GetAtxCertificateSubject(creds.unlock_cert) == challenge.product_id_hash:
258 def MakeAtxUnlockCredential(creds, challenge, out_file): argument
279 hash = SHA512.new(challenge.challenge_data)
324 challenge = UnlockChallenge(challenge_file)
326 binascii.hexlify(challenge.product_id_hash)))
328 selected_cred = SelectMatchingUnlockCredential(all_creds, challenge)
336 MakeAtxUnlockCredential(selected_cred, challenge, credential_file)

1234567