/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/sample/ |
H A D | http_digest_client.c | 82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; local 209 /* find Digest challenge */ 210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); 211 if (!challenge) break; 212 challenge += strlen(DIGEST_AUTH_HEADER); 213 p = strchr(challenge, '\r'); 219 challenge, strlen(challenge), 234 challenge = strstr(buffer, DIGEST_OK_HEADER); 235 if (challenge) { [all...] |
/macosx-10.10.1/OpenSSL098-52/src/crypto/asn1/ |
H A D | x_spki.c | 70 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
|
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/modules/sasl/ |
H A D | sasl.tcl | 199 proc ::SASL::step {context challenge args} { 202 return [eval [linsert $args 0 $ctx(proc) $context $challenge]] 248 proc ::SASL::CRAM-MD5:client {context challenge args} { 254 if {[string length $challenge] == 0} { 260 set reply [hmac_hex $password $challenge] 308 proc ::SASL::PLAIN:client {context challenge args} { 349 proc ::SASL::LOGIN:client {context challenge args} { 351 if {$ctx(step) == 0 && [string length $challenge] == 0} { 412 proc ::SASL::ANONYMOUS:client {context challenge args} { 444 proc ::SASL::DIGEST-MD5:client {context challenge arg [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecNetscapeTemplates.h | 60 * Public key/challenge, to send to CA. 65 * challenge IA5STRING 76 CSSM_DATA challenge; // ASCII member in struct:__anon3810
|
H A D | SecNetscapeTemplates.cpp | 51 offsetof(PublicKeyAndChallenge, challenge),
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecNetscapeTemplates.h | 60 * Public key/challenge, to send to CA. 65 * challenge IA5STRING 76 CSSM_DATA challenge; // ASCII member in struct:__anon4696
|
H A D | SecNetscapeTemplates.cpp | 51 offsetof(PublicKeyAndChallenge, challenge),
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecNetscapeTemplates.h | 60 * Public key/challenge, to send to CA. 65 * challenge IA5STRING 76 CSSM_DATA challenge; // ASCII member in struct:__anon4783
|
H A D | SecNetscapeTemplates.cpp | 51 offsetof(PublicKeyAndChallenge, challenge),
|
/macosx-10.10.1/ruby-106/ruby/test/openssl/ |
H A D | test_ns_spki.rb | 21 spki.challenge = "RandomString" 30 assert_equal("RandomString", spki.challenge) 40 assert_equal("MozillaIsMyFriend", spki.challenge) 46 assert_equal("MozillaIsMyFriend", spki.challenge)
|
/macosx-10.10.1/libtelnet-13/ |
H A D | kerberos.c | 101 static Block challenge = { 0 }; variable 210 * the challenge, and verify it when the response comes back. 219 des_ecb_encrypt(&session_key, &challenge, sched, 0); 221 * Increment the challenge by 1, and encrypt it for 226 x = (unsigned int)challenge[i] + 1; 227 challenge[i] = x; /* ignore overflow */ 231 des_ecb_encrypt(&challenge, &challenge, sched, 1); 317 * Take the received encrypted challenge, and encrypt 327 * Now decrypt the received encrypted challenge, [all...] |
H A D | krb4encpwd.c | 117 static char challenge[REALM_SZ]; variable 220 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) { 242 * Take the received random challenge text and save 245 memmove((void *)challenge, (void *)data, sizeof(Block)); 251 * Receive ack, if mutual then send random challenge 256 * the challenge, and verify it when the response comes back. 263 sprintf(challenge, "%x", now); 264 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge)); 306 * Verify that the response to the challenge i [all...] |
H A D | rsaencpwd.c | 110 static char challenge[CHAL_SZ]; variable 226 r = accept_rsa_encpwd(&auth, key, challenge, 252 * the challenge, and verify it when the response comes back. 260 sprintf(challenge, "%x", now); 261 challenge_len = strlen(challenge); 263 strcpy(challenge, "randchal"); 294 memmove(ptr, challenge, challenge_len); 342 * Verify that the response to the challenge is correct. 354 memmove(challenge, ptr, challenge_len); 366 Challenge = challenge; [all...] |
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/CyrusSasl/ |
H A D | GenericClient.java | 39 * @param challenge byte[] from server (must be protocol specific decode before) 43 public byte[] evaluateChallenge(byte[] challenge) throws SaslException argument 45 /* xxx this should check for empty challenge & existing initial 46 sasl challenge */ 49 if (complete && challenge == null) { 50 /* we're already done and there's no challenge */ 54 if (challenge==null) { 57 out=jni_sasl_client_step(ptr, challenge, challenge.length);
|
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/examples/sasl/ |
H A D | saslclient.tcl | 134 set challenge [string range $line 4 end] 135 set e [string range $challenge end-5 end] 137 if {![catch {set dec [base64::decode $challenge]}]} { 138 set challenge $dec 142 #puts "> $challenge" 143 if {$mech eq "NTLM"} {puts ">CHA [SASL::NTLM::Debug $challenge]"} 144 set code [catch {SASL::step $ctx $challenge} err]
|
/macosx-10.10.1/rsync-45/rsync/ |
H A D | authenticate.c | 57 /* Generate a challenge buffer and return it base64-encoded. */ 58 static void gen_challenge(char *addr, char *challenge) argument 76 base64_encode(md4_out, MD4_SUM_LENGTH, challenge, 0); 205 * and the challenge string and return it base64-encoded. */ 206 static void generate_hash(char *in, char *challenge, char *out) argument 212 sum_update(challenge, strlen(challenge)); 228 char challenge[MD4_SUM_LENGTH*2]; local 238 gen_challenge(addr, challenge); 240 io_printf(f_out, "%s%s\n", leader, challenge); 290 auth_client(int fd, char *user, char *challenge) argument [all...] |
/macosx-10.10.1/KerberosHelper-151/CFNetwork/ |
H A D | NSURLConnection.m | 51 - (void)connection:(NSURLConnection *)connection didCancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge; 52 - (void)connection:(NSURLConnection *)connection didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge; 75 - (void)connection:(NSURLConnection *)connection didCancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 124 - (void)connection:(NSURLConnection*)connection didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 126 NSURLProtectionSpace *protectionSpace = [challenge protectionSpace]; 180 [[challenge sender] useCredential:credential forAuthenticationChallenge:challenge]; 188 [[challenge sender] continueWithoutCredentialForAuthenticationChallenge:challenge];
|
/macosx-10.10.1/OpenSSH-189/openssh/ |
H A D | auth-chall.c | 48 char *challenge, *name, *info, **prompts; local 70 challenge = xstrdup(prompts[0]); 78 return (challenge);
|
/macosx-10.10.1/ppp-786.1.1/Helpers/pppd/ |
H A D | chap_ms.c | 186 { "mschap-challenge", o_string, &mschap_challenge, 187 "specify CHAP challenge" }, 188 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 189 "specify CHAP peer challenge" }, 195 * chapms_generate_challenge - generate a challenge for MS-CHAP. 196 * For MS-CHAP the challenge length is fixed at 8 bytes. 197 * The length goes in challenge[0] and the actual challenge starts 198 * at challenge[1]. 201 chapms_generate_challenge(unsigned char *challenge) argument 211 chapms2_generate_challenge(unsigned char *challenge) argument 221 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 271 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 350 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument 360 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument 610 unsigned char challenge[MAX_CHALLENGE_LEN]; local 655 unsigned char challenge[MAX_CHALLENGE_LEN]; local 812 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 111 static char challenge[CHAL_SZ]; variable 226 r = accept_rsa_encpwd(&auth, key, challenge, 252 * the challenge, and verify it when the response comes back. 260 snprintf(challenge, sizeof(challenge), "%x", now); 261 challenge_len = strlen(challenge); 263 strlcpy(challenge, "randchal", sizeof(challenge)); 294 memmove(ptr, challenge, challenge_len); 342 * Verify that the response to the challenge i [all...] |
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/ |
H A D | mschap.c | 38 ChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], 78 NTChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], argument 85 ChallengeResponse(challenge, hash, response); 90 NTMPPEChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], argument 98 ChallengeResponse(challenge, hash, response); 103 ChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], argument 113 DesEncrypt(challenge, zhash, response); 114 DesEncrypt(challenge, zhash + 7, response + 8); 115 DesEncrypt(challenge, zhash + 14, response + 16); 123 uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZ 120 ChallengeHash(const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE]) argument 169 uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE]; local 256 MSChap(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument 269 MSChap_MPPE(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument 289 uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE]; local [all...] |
/macosx-10.10.1/WebKit-7600.1.25/mac/Misc/ |
H A D | WebDownload.mm | 126 - (void)download:(NSURLDownload *)download didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 130 if (![challenge previousFailureCount]) { 131 NSURLCredential *credential = mac(CredentialStorage::get(ProtectionSpace([challenge protectionSpace]))); 133 [[challenge sender] useCredential:credential forAuthenticationChallenge:challenge]; 139 [realDelegate download:download didReceiveAuthenticationChallenge:challenge]; 146 [[WebPanelAuthenticationHandler sharedHandler] startAuthentication:challenge window:window]; 151 - (void)download:(NSURLDownload *)download didCancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 155 [realDelegate download:download didCancelAuthenticationChallenge:challenge]; 157 [[WebPanelAuthenticationHandler sharedHandler] cancelAuthentication:challenge]; [all...] |
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/plugins/ |
H A D | cram.c | 97 char *challenge; member in struct:server_context 103 const char *challenge __attribute__((unused)), 176 text->challenge = NULL; 179 /* Because Apple's password server needs the userID before the challenge, there is no way for */ 184 /* allocate some space for the challenge */ 185 text->challenge = sparams->utils->malloc(clientinlen + 1); 186 if (text->challenge == NULL) { 191 memcpy( text->challenge, clientin, clientinlen ); 192 text->challenge[clientinlen] = '\0'; 211 if ( text->challenge [all...] |
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/contrib/ldapc++/src/ |
H A D | SaslInteraction.cpp | 31 return std::string(m_interact->challenge);
|
/macosx-10.10.1/WebKit-7600.1.25/mac/WebView/ |
H A D | WebResourceLoadDelegate.h | 81 @abstract Start authentication for the resource, providing a challenge 83 cancel on the challenge when done. 84 @param challenge The NSURLAuthenticationChallenge to start authentication for 88 - (void)webView:(WebView *)sender resource:(id)identifier didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge fromDataSource:(WebDataSource *)dataSource; 93 @param challenge The NSURLAuthenticationChallenge for which to cancel authentication 95 - (void)webView:(WebView *)sender resource:(id)identifier didCancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge fromDataSource:(WebDataSource *)dataSource;
|