Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 106) sorted by relevance

12345

/external/ppp/pppd/
Dchap_ms.c169 chapms_generate_challenge(unsigned char *challenge) in chapms_generate_challenge() argument
171 *challenge++ = 8; in chapms_generate_challenge()
174 memcpy(challenge, mschap_challenge, 8); in chapms_generate_challenge()
177 random_bytes(challenge, 8); in chapms_generate_challenge()
181 chapms2_generate_challenge(unsigned char *challenge) in chapms2_generate_challenge() argument
183 *challenge++ = 16; in chapms2_generate_challenge()
186 memcpy(challenge, mschap_challenge, 16); in chapms2_generate_challenge()
189 random_bytes(challenge, 16); in chapms2_generate_challenge()
195 unsigned char *challenge, unsigned char *response, in chapms_verify_response() argument
202 challenge_len = *challenge++; /* skip length, is 8 */ in chapms_verify_response()
[all …]
Dchap-md5.c59 unsigned char *challenge, unsigned char *response, in chap_md5_verify_response() argument
67 challenge_len = *challenge++; in chap_md5_verify_response()
74 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_verify_response()
89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument
94 int challenge_len = *challenge++; in chap_md5_make_response()
99 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_make_response()
Dchap-new.h100 void (*generate_challenge)(unsigned char *challenge);
103 unsigned char *challenge, unsigned char *response,
106 unsigned char *challenge, char *secret, int secret_len,
117 unsigned char *challenge, unsigned char *response,
Dchap-new.c55 unsigned char *challenge, unsigned char *response,
102 unsigned char challenge[CHAL_MAX_PKTLEN]; member
126 unsigned char *challenge, unsigned char *response,
271 output(0, ss->challenge, ss->challenge_pktlen); in chap_timeout()
287 p = ss->challenge; in chap_generate_challenge()
298 p = ss->challenge + PPP_HDRLEN; in chap_generate_challenge()
321 if (id != ss->challenge[PPP_HDRLEN+1] || len < 2) in chap_handle_response()
349 ss->challenge + PPP_HDRLEN + CHAP_HDRLEN, in chap_handle_response()
414 unsigned char *challenge, unsigned char *response, in chap_verify_response() argument
427 ok = digest->verify_response(id, name, secret, secret_len, challenge, in chap_verify_response()
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python3/httplib2/
D__init__.py485 challenge = _parse_www_authenticate(response, 'www-authenticate')
486 self.challenge = challenge['digest']
487 qop = self.challenge.get('qop', 'auth')
488 self.challenge['qop'] = ('auth' in [x.strip() for x in qop.split()]) and 'auth' or None
489 if self.challenge['qop'] is None:
491 self.challenge['algorithm'] = self.challenge.get('algorithm', 'MD5').upper()
492 if self.challenge['algorithm'] != 'MD5':
493 …ntedDigestAuthOptionError( _("Unsupported value for algorithm: %s." % self.challenge['algorithm']))
494 … self.A1 = "".join([self.credentials[0], ":", self.challenge['realm'], ":", self.credentials[1]])
495 self.challenge['nc'] = 1
[all …]
/external/wpa_supplicant_8/src/crypto/
Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
97 os_memcpy(challenge, hash, 8); in challenge_hash()
144 void challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument
148 des_encrypt(challenge, password_hash, response); in challenge_response()
149 des_encrypt(challenge, password_hash + 7, response + 8); in challenge_response()
153 des_encrypt(challenge, zpwd, response + 16); in challenge_response()
173 u8 challenge[8]; in generate_nt_response() local
177 username_len, challenge) || in generate_nt_response()
180 challenge_response(challenge, password_hash, response); in generate_nt_response()
201 u8 challenge[8]; in generate_nt_response_pwhash() local
[all …]
Dms_funcs.h31 int nt_challenge_response(const u8 *challenge, const u8 *password,
34 void challenge_response(const u8 *challenge, const u8 *password_hash,
37 const u8 *username, size_t username_len, u8 *challenge);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
DNetscapeCertRequest.java51 String challenge; field in NetscapeCertRequest
106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest()
129 String challenge, in NetscapeCertRequest() argument
135 this.challenge = challenge; in NetscapeCertRequest()
142 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest()
156 return challenge; in getChallenge()
161 challenge = value; in setChallenge()
194 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument
197 if (!challenge.equals(this.challenge)) in verify()
241 pkac.add(new DERIA5String(challenge)); in sign()
[all …]
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/httplib2/
D__init__.py515 challenge = _parse_www_authenticate(response, 'www-authenticate')
516 self.challenge = challenge['digest']
517 qop = self.challenge.get('qop', 'auth')
518 self.challenge['qop'] = ('auth' in [x.strip() for x in qop.split()]) and 'auth' or None
519 if self.challenge['qop'] is None:
521 self.challenge['algorithm'] = self.challenge.get('algorithm', 'MD5').upper()
522 if self.challenge['algorithm'] != 'MD5':
523 …ntedDigestAuthOptionError( _("Unsupported value for algorithm: %s." % self.challenge['algorithm']))
524 … self.A1 = "".join([self.credentials[0], ":", self.challenge['realm'], ":", self.credentials[1]])
525 self.challenge['nc'] = 1
[all …]
/external/apache-http/src/org/apache/http/impl/auth/
DNTLMScheme.java65 private String challenge; field in NTLMScheme
74 this.challenge = null; in NTLMScheme()
98 String challenge = buffer.substringTrimmed(pos, len); in parseChallenge() local
99 if (challenge.length() == 0) { in parseChallenge()
105 this.challenge = null; in parseChallenge()
108 this.challenge = challenge; in parseChallenge()
135 this.challenge); in authenticate()
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
DAuthenticatorAdapter.java42 Challenge challenge = challenges.get(i); in authenticate() local
43 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticate()
47 challenge.getRealm(), challenge.getScheme(), url.url(), RequestorType.SERVER); in authenticate()
64 Challenge challenge = challenges.get(i); in authenticateProxy() local
65 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticateProxy()
70 url.scheme(), challenge.getRealm(), challenge.getScheme(), url.url(), in authenticateProxy()
/external/ppp/pppd/plugins/
Dwinbind.c100 unsigned char *challenge,
245 const u_char *challenge, in run_ntlm_auth() argument
355 sprintf(challenge_hex + i * 2, "%02X", challenge[i]); in run_ntlm_auth()
513 unsigned char *challenge, in winbind_chap_verify() argument
525 challenge_len = *challenge++; in winbind_chap_verify()
580 challenge, challenge_len, in winbind_chap_verify()
585 mppe_set_keys(challenge, session_key); in winbind_chap_verify()
595 challenge_len, challenge); in winbind_chap_verify()
610 ChallengeHash(&response[MS_CHAP2_PEER_CHALLENGE], challenge, in winbind_chap_verify()
629 challenge, user, saresponse); in winbind_chap_verify()
[all …]
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/
Dpairingsession.cc26 PoloChallengeResponse* challenge) in PairingSession() argument
30 challenge_(challenge), in PairingSession()
98 if (!challenge().CheckGamma(secret)) { in SetSecret()
103 nonce_ = challenge().ExtractNonce(secret); in SetSecret()
109 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_); in SetSecret()
162 const Gamma* gamma = challenge().GetGamma(*nonce_); in DoOutputPairing()
230 const Alpha* alpha = challenge().GetAlpha(*nonce_); in OnSecretMessage()
267 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_); in VerifySecret()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq()
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq()
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq()
123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
Deap_server_ttls.c557 const u8 *challenge, in eap_ttls_process_phase2_chap() argument
564 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap()
592 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap()
604 challenge, challenge_len, hash); in eap_ttls_process_phase2_chap()
620 u8 *challenge, size_t challenge_len, in eap_ttls_process_phase2_mschap() argument
625 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap()
656 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap()
659 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_mschap()
670 challenge_response(challenge, sm->user->password, nt_response); in eap_ttls_process_phase2_mschap()
672 nt_challenge_response(challenge, sm->user->password, in eap_ttls_process_phase2_mschap()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
67 challenge = pos; in eap_md5_process()
69 challenge, challenge_len); in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
Deap_ttls.c485 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2()
510 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2()
512 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2()
521 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2()
527 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2()
531 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
542 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2()
545 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
554 os_free(challenge); in eap_ttls_phase2_request_mschapv2()
579 u8 *buf, *pos, *challenge; in eap_ttls_phase2_request_mschap()
[all …]
Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
102 challenge = pos; in eap_leap_process_request()
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
105 challenge, LEAP_CHALLENGE_LEN); in eap_leap_process_request()
119 challenge_response(challenge, password, rpos); in eap_leap_process_request()
121 nt_challenge_response(challenge, password, password_len, rpos); in eap_leap_process_request()
/external/mtpd/
Dl2tp.c107 static uint8_t challenge[CHALLENGE_SIZE]; variable
335 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) { in l2tp_connect()
341 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); in l2tp_connect()
374 static uint8_t *compute_response(uint8_t type, void *challenge, int size) in compute_response() argument
381 MD5_Update(&ctx, challenge, size); in compute_response()
394 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE), in verify_challenge()
403 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; in answer_challenge() local
404 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE); in answer_challenge()
406 uint8_t *response = compute_response(SCCCN, challenge, size); in answer_challenge()
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
DAuthenticationHelperImpl.java125 public ClientTransaction handleChallenge(Response challenge, in handleChallenge() argument
130 sipStack.getStackLogger().logDebug("handleChallenge: " + challenge); in handleChallenge()
171 if (challenge == null || reoriginatedRequest == null) { in handleChallenge()
177 if (challenge.getStatusCode() == Response.UNAUTHORIZED) { in handleChallenge()
178 authHeaders = challenge.getHeaders(WWWAuthenticateHeader.NAME); in handleChallenge()
179 } else if (challenge.getStatusCode() == Response.PROXY_AUTHENTICATION_REQUIRED) { in handleChallenge()
180 authHeaders = challenge.getHeaders(ProxyAuthenticateHeader.NAME); in handleChallenge()
/external/chromium-trace/catapult/third_party/Paste/tests/test_auth/
Dtest_auth_digest.py38 challenge = WWW_AUTHENTICATE(headers)
40 challenge=challenge, path=path)
/external/wpa_supplicant_8/src/eap_common/
Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
25 addr[2] = challenge; in chap_md5()
/external/ppp/pppd/plugins/radius/
Dradius.c79 unsigned char *challenge,
88 unsigned char *challenge,
336 unsigned char *challenge, unsigned char *response, in radius_chap_verify() argument
352 challenge_len = *challenge++; in radius_chap_verify()
406 challenge, challenge_len, VENDOR_NONE); in radius_chap_verify()
425 challenge, challenge_len, VENDOR_MICROSOFT); in radius_chap_verify()
445 challenge, challenge_len, VENDOR_MICROSOFT); in radius_chap_verify()
481 challenge, message, message_space) < 0) { in radius_chap_verify()
538 struct chap_digest_type *digest, unsigned char *challenge, in radius_setparams() argument
672 if (radius_setmppekeys(vp, req_info, challenge) < 0) { in radius_setparams()
[all …]
/external/nist-sip/java/gov/nist/javax/sip/parser/
DChallengeParser.java49 protected ChallengeParser(String challenge) { in ChallengeParser() argument
50 super(challenge); in ChallengeParser()
/external/chromium-trace/catapult/third_party/Paste/paste/
Dhttpheaders.py1004 challenge=None, path=None, method=None): argument
1006 if basic or not challenge:
1010 assert challenge and not basic
1012 (_, realm) = challenge.split('realm="')
1016 (token, challenge) = challenge.split(' ', 1)
1017 chal = parse_keqv_list(parse_http_list(challenge))

12345