/external/ppp/pppd/ |
D | chap_ms.c | 169 chapms_generate_challenge(unsigned char *challenge) in chapms_generate_challenge() argument 171 *challenge++ = 8; in chapms_generate_challenge() 174 memcpy(challenge, mschap_challenge, 8); in chapms_generate_challenge() 177 random_bytes(challenge, 8); in chapms_generate_challenge() 181 chapms2_generate_challenge(unsigned char *challenge) in chapms2_generate_challenge() argument 183 *challenge++ = 16; in chapms2_generate_challenge() 186 memcpy(challenge, mschap_challenge, 16); in chapms2_generate_challenge() 189 random_bytes(challenge, 16); in chapms2_generate_challenge() 195 unsigned char *challenge, unsigned char *response, in chapms_verify_response() argument 202 challenge_len = *challenge++; /* skip length, is 8 */ in chapms_verify_response() [all …]
|
D | chap-md5.c | 59 unsigned char *challenge, unsigned char *response, in chap_md5_verify_response() argument 67 challenge_len = *challenge++; in chap_md5_verify_response() 74 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_verify_response() 89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument 94 int challenge_len = *challenge++; in chap_md5_make_response() 99 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_make_response()
|
D | chap-new.h | 100 void (*generate_challenge)(unsigned char *challenge); 103 unsigned char *challenge, unsigned char *response, 106 unsigned char *challenge, char *secret, int secret_len, 117 unsigned char *challenge, unsigned char *response,
|
D | chap-new.c | 55 unsigned char *challenge, unsigned char *response, 102 unsigned char challenge[CHAL_MAX_PKTLEN]; member 126 unsigned char *challenge, unsigned char *response, 271 output(0, ss->challenge, ss->challenge_pktlen); in chap_timeout() 287 p = ss->challenge; in chap_generate_challenge() 298 p = ss->challenge + PPP_HDRLEN; in chap_generate_challenge() 321 if (id != ss->challenge[PPP_HDRLEN+1] || len < 2) in chap_handle_response() 349 ss->challenge + PPP_HDRLEN + CHAP_HDRLEN, in chap_handle_response() 414 unsigned char *challenge, unsigned char *response, in chap_verify_response() argument 427 ok = digest->verify_response(id, name, secret, secret_len, challenge, in chap_verify_response()
|
/external/openssh/ |
D | auth-bsdauth.c | 57 char *challenge = NULL; in bsdauth_query() local 66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query() 67 if (challenge == NULL) { in bsdauth_query() 73 if (challenge == NULL) { in bsdauth_query() 78 authctxt->style, "auth-ssh", &challenge); in bsdauth_query() 80 challenge = NULL; in bsdauth_query() 81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query() 84 if (challenge == NULL) in bsdauth_query() 92 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
|
D | auth-rsa.c | 76 BIGNUM *challenge; in auth_rsa_generate_challenge() local 79 if ((challenge = BN_new()) == NULL) in auth_rsa_generate_challenge() 82 if (BN_rand(challenge, 256, 0, 0) == 0) in auth_rsa_generate_challenge() 86 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0) in auth_rsa_generate_challenge() 90 return challenge; in auth_rsa_generate_challenge() 94 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) in auth_rsa_verify_response() argument 109 len = BN_num_bytes(challenge); in auth_rsa_verify_response() 113 BN_bn2bin(challenge, buf + 32 - len); in auth_rsa_verify_response() 139 BIGNUM *challenge, *encrypted_challenge; in auth_rsa_challenge_dialog() local 146 challenge = PRIVSEP(auth_rsa_generate_challenge(key)); in auth_rsa_challenge_dialog() [all …]
|
D | sshconnect1.c | 72 BIGNUM *challenge; in try_agent_authentication() local 83 if ((challenge = BN_new()) == NULL) in try_agent_authentication() 118 packet_get_bignum(challenge); in try_agent_authentication() 125 challenge, session_id, response)) != 0) { in try_agent_authentication() 164 BN_clear_free(challenge); in try_agent_authentication() 173 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) in respond_to_rsa_challenge() argument 181 if (rsa_private_decrypt(challenge, challenge, prv) != 0) in respond_to_rsa_challenge() 187 len = BN_num_bytes(challenge); in respond_to_rsa_challenge() 193 BN_bn2bin(challenge, buf + sizeof(buf) - len); in respond_to_rsa_challenge() 222 BIGNUM *challenge; in try_rsa_authentication() local [all …]
|
D | auth-skey.c | 56 char challenge[1024]; in skey_query() local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, in skey_query() 60 sizeof(challenge)) == -1) in skey_query() 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT); in skey_query()
|
D | auth-chall.c | 50 char *challenge, *name, *info, **prompts; in get_challenge() local 72 challenge = xstrdup(prompts[0]); in get_challenge() 80 return (challenge); in get_challenge()
|
D | auth1.c | 202 char *challenge; in auth1_process_tis_challenge() local 204 if ((challenge = get_challenge(authctxt)) == NULL) in auth1_process_tis_challenge() 207 debug("sending challenge '%s'", challenge); in auth1_process_tis_challenge() 209 packet_put_cstring(challenge); in auth1_process_tis_challenge() 210 free(challenge); in auth1_process_tis_challenge()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python3/httplib2/ |
D | __init__.py | 485 challenge = _parse_www_authenticate(response, 'www-authenticate') 486 self.challenge = challenge['digest'] 487 qop = self.challenge.get('qop', 'auth') 488 self.challenge['qop'] = ('auth' in [x.strip() for x in qop.split()]) and 'auth' or None 489 if self.challenge['qop'] is None: 491 self.challenge['algorithm'] = self.challenge.get('algorithm', 'MD5').upper() 492 if self.challenge['algorithm'] != 'MD5': 493 …ntedDigestAuthOptionError( _("Unsupported value for algorithm: %s." % self.challenge['algorithm'])) 494 … self.A1 = "".join([self.credentials[0], ":", self.challenge['realm'], ":", self.credentials[1]]) 495 self.challenge['nc'] = 1 [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 97 os_memcpy(challenge, hash, 8); in challenge_hash() 144 void challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 148 des_encrypt(challenge, password_hash, response); in challenge_response() 149 des_encrypt(challenge, password_hash + 7, response + 8); in challenge_response() 153 des_encrypt(challenge, zpwd, response + 16); in challenge_response() 173 u8 challenge[8]; in generate_nt_response() local 177 username_len, challenge) || in generate_nt_response() 180 challenge_response(challenge, password_hash, response); in generate_nt_response() 201 u8 challenge[8]; in generate_nt_response_pwhash() local [all …]
|
D | ms_funcs.h | 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 34 void challenge_response(const u8 *challenge, const u8 *password_hash, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
D | NetscapeCertRequest.java | 51 String challenge; field in NetscapeCertRequest 106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest() 129 String challenge, in NetscapeCertRequest() argument 135 this.challenge = challenge; in NetscapeCertRequest() 142 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest() 156 return challenge; in getChallenge() 161 challenge = value; in setChallenge() 194 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument 197 if (!challenge.equals(this.challenge)) in verify() 241 pkac.add(new DERIA5String(challenge)); in sign() [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/httplib2/ |
D | __init__.py | 515 challenge = _parse_www_authenticate(response, 'www-authenticate') 516 self.challenge = challenge['digest'] 517 qop = self.challenge.get('qop', 'auth') 518 self.challenge['qop'] = ('auth' in [x.strip() for x in qop.split()]) and 'auth' or None 519 if self.challenge['qop'] is None: 521 self.challenge['algorithm'] = self.challenge.get('algorithm', 'MD5').upper() 522 if self.challenge['algorithm'] != 'MD5': 523 …ntedDigestAuthOptionError( _("Unsupported value for algorithm: %s." % self.challenge['algorithm'])) 524 … self.A1 = "".join([self.credentials[0], ":", self.challenge['realm'], ":", self.credentials[1]]) 525 self.challenge['nc'] = 1 [all …]
|
/external/apache-http/src/org/apache/http/impl/auth/ |
D | NTLMScheme.java | 65 private String challenge; field in NTLMScheme 74 this.challenge = null; in NTLMScheme() 98 String challenge = buffer.substringTrimmed(pos, len); in parseChallenge() local 99 if (challenge.length() == 0) { in parseChallenge() 105 this.challenge = null; in parseChallenge() 108 this.challenge = challenge; in parseChallenge() 135 this.challenge); in authenticate()
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
D | AuthenticatorAdapter.java | 42 Challenge challenge = challenges.get(i); in authenticate() local 43 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticate() 47 challenge.getRealm(), challenge.getScheme(), url.url(), RequestorType.SERVER); in authenticate() 64 Challenge challenge = challenges.get(i); in authenticateProxy() local 65 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) continue; in authenticateProxy() 70 url.scheme(), challenge.getRealm(), challenge.getScheme(), url.url(), in authenticateProxy()
|
/external/ppp/pppd/plugins/ |
D | winbind.c | 100 unsigned char *challenge, 245 const u_char *challenge, in run_ntlm_auth() argument 355 sprintf(challenge_hex + i * 2, "%02X", challenge[i]); in run_ntlm_auth() 513 unsigned char *challenge, in winbind_chap_verify() argument 525 challenge_len = *challenge++; in winbind_chap_verify() 580 challenge, challenge_len, in winbind_chap_verify() 585 mppe_set_keys(challenge, session_key); in winbind_chap_verify() 595 challenge_len, challenge); in winbind_chap_verify() 610 ChallengeHash(&response[MS_CHAP2_PEER_CHALLENGE], challenge, in winbind_chap_verify() 629 challenge, user, saresponse); in winbind_chap_verify() [all …]
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
D | pairingsession.cc | 26 PoloChallengeResponse* challenge) in PairingSession() argument 30 challenge_(challenge), in PairingSession() 98 if (!challenge().CheckGamma(secret)) { in SetSecret() 103 nonce_ = challenge().ExtractNonce(secret); in SetSecret() 109 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_); in SetSecret() 162 const Gamma* gamma = challenge().GetGamma(*nonce_); in DoOutputPairing() 230 const Alpha* alpha = challenge().GetAlpha(*nonce_); in OnSecretMessage() 267 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_); in VerifySecret()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local 67 challenge = pos; in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
D | eap_ttls.c | 485 u8 *buf, *pos, *challenge, *peer_challenge; in eap_ttls_phase2_request_mschapv2() 510 challenge = eap_ttls_implicit_challenge( in eap_ttls_phase2_request_mschapv2() 512 if (challenge == NULL) { in eap_ttls_phase2_request_mschapv2() 521 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); in eap_ttls_phase2_request_mschapv2() 527 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; in eap_ttls_phase2_request_mschapv2() 531 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 542 password_len, pwhash, challenge, in eap_ttls_phase2_request_mschapv2() 545 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 554 os_free(challenge); in eap_ttls_phase2_request_mschapv2() 579 u8 *buf, *pos, *challenge; in eap_ttls_phase2_request_mschap() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq() 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); in eap_md5_buildReq() 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, in eap_md5_buildReq() 123 data->challenge, CHALLENGE_LEN, hash)) { in eap_md5_process()
|
/external/mtpd/ |
D | l2tp.c | 107 static uint8_t challenge[CHALLENGE_SIZE]; variable 335 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) { in l2tp_connect() 341 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); in l2tp_connect() 374 static uint8_t *compute_response(uint8_t type, void *challenge, int size) in compute_response() argument 381 MD5_Update(&ctx, challenge, size); in compute_response() 394 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE), in verify_challenge() 403 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; in answer_challenge() local 404 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE); in answer_challenge() 406 uint8_t *response = compute_response(SCCCN, challenge, size); in answer_challenge()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument 25 addr[2] = challenge; in chap_md5()
|
/external/chromium-trace/catapult/third_party/Paste/tests/test_auth/ |
D | test_auth_digest.py | 38 challenge = WWW_AUTHENTICATE(headers) 40 challenge=challenge, path=path)
|