Searched refs:challenge (Results 26 - 50 of 168) sorted by relevance

1234567

/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/sample/
H A Dhttp_digest_client.c82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; local
209 /* find Digest challenge */
210 challenge = strstr(buffer, DIGEST_AUTH_HEADER);
211 if (!challenge) break;
212 challenge += strlen(DIGEST_AUTH_HEADER);
213 p = strchr(challenge, '\r');
219 challenge, strlen(challenge),
234 challenge = strstr(buffer, DIGEST_OK_HEADER);
235 if (challenge) {
[all...]
/macosx-10.10.1/OpenSSL098-52/src/crypto/asn1/
H A Dx_spki.c70 ASN1_SIMPLE(NETSCAPE_SPKAC, challenge, ASN1_IA5STRING)
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/modules/sasl/
H A Dsasl.tcl199 proc ::SASL::step {context challenge args} {
202 return [eval [linsert $args 0 $ctx(proc) $context $challenge]]
248 proc ::SASL::CRAM-MD5:client {context challenge args} {
254 if {[string length $challenge] == 0} {
260 set reply [hmac_hex $password $challenge]
308 proc ::SASL::PLAIN:client {context challenge args} {
349 proc ::SASL::LOGIN:client {context challenge args} {
351 if {$ctx(step) == 0 && [string length $challenge] == 0} {
412 proc ::SASL::ANONYMOUS:client {context challenge args} {
444 proc ::SASL::DIGEST-MD5:client {context challenge arg
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/
H A DSecNetscapeTemplates.h60 * Public key/challenge, to send to CA.
65 * challenge IA5STRING
76 CSSM_DATA challenge; // ASCII member in struct:__anon3810
H A DSecNetscapeTemplates.cpp51 offsetof(PublicKeyAndChallenge, challenge),
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecNetscapeTemplates.h60 * Public key/challenge, to send to CA.
65 * challenge IA5STRING
76 CSSM_DATA challenge; // ASCII member in struct:__anon4696
H A DSecNetscapeTemplates.cpp51 offsetof(PublicKeyAndChallenge, challenge),
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecNetscapeTemplates.h60 * Public key/challenge, to send to CA.
65 * challenge IA5STRING
76 CSSM_DATA challenge; // ASCII member in struct:__anon4783
H A DSecNetscapeTemplates.cpp51 offsetof(PublicKeyAndChallenge, challenge),
/macosx-10.10.1/ruby-106/ruby/test/openssl/
H A Dtest_ns_spki.rb21 spki.challenge = "RandomString"
30 assert_equal("RandomString", spki.challenge)
40 assert_equal("MozillaIsMyFriend", spki.challenge)
46 assert_equal("MozillaIsMyFriend", spki.challenge)
/macosx-10.10.1/libtelnet-13/
H A Dkerberos.c101 static Block challenge = { 0 }; variable
210 * the challenge, and verify it when the response comes back.
219 des_ecb_encrypt(&session_key, &challenge, sched, 0);
221 * Increment the challenge by 1, and encrypt it for
226 x = (unsigned int)challenge[i] + 1;
227 challenge[i] = x; /* ignore overflow */
231 des_ecb_encrypt(&challenge, &challenge, sched, 1);
317 * Take the received encrypted challenge, and encrypt
327 * Now decrypt the received encrypted challenge,
[all...]
H A Dkrb4encpwd.c117 static char challenge[REALM_SZ]; variable
220 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) {
242 * Take the received random challenge text and save
245 memmove((void *)challenge, (void *)data, sizeof(Block));
251 * Receive ack, if mutual then send random challenge
256 * the challenge, and verify it when the response comes back.
263 sprintf(challenge, "%x", now);
264 Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge));
306 * Verify that the response to the challenge i
[all...]
H A Drsaencpwd.c110 static char challenge[CHAL_SZ]; variable
226 r = accept_rsa_encpwd(&auth, key, challenge,
252 * the challenge, and verify it when the response comes back.
260 sprintf(challenge, "%x", now);
261 challenge_len = strlen(challenge);
263 strcpy(challenge, "randchal");
294 memmove(ptr, challenge, challenge_len);
342 * Verify that the response to the challenge is correct.
354 memmove(challenge, ptr, challenge_len);
366 Challenge = challenge;
[all...]
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/CyrusSasl/
H A DGenericClient.java39 * @param challenge byte[] from server (must be protocol specific decode before)
43 public byte[] evaluateChallenge(byte[] challenge) throws SaslException argument
45 /* xxx this should check for empty challenge & existing initial
46 sasl challenge */
49 if (complete && challenge == null) {
50 /* we're already done and there's no challenge */
54 if (challenge==null) {
57 out=jni_sasl_client_step(ptr, challenge, challenge.length);
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/examples/sasl/
H A Dsaslclient.tcl134 set challenge [string range $line 4 end]
135 set e [string range $challenge end-5 end]
137 if {![catch {set dec [base64::decode $challenge]}]} {
138 set challenge $dec
142 #puts "> $challenge"
143 if {$mech eq "NTLM"} {puts ">CHA [SASL::NTLM::Debug $challenge]"}
144 set code [catch {SASL::step $ctx $challenge} err]
/macosx-10.10.1/rsync-45/rsync/
H A Dauthenticate.c57 /* Generate a challenge buffer and return it base64-encoded. */
58 static void gen_challenge(char *addr, char *challenge) argument
76 base64_encode(md4_out, MD4_SUM_LENGTH, challenge, 0);
205 * and the challenge string and return it base64-encoded. */
206 static void generate_hash(char *in, char *challenge, char *out) argument
212 sum_update(challenge, strlen(challenge));
228 char challenge[MD4_SUM_LENGTH*2]; local
238 gen_challenge(addr, challenge);
240 io_printf(f_out, "%s%s\n", leader, challenge);
290 auth_client(int fd, char *user, char *challenge) argument
[all...]
/macosx-10.10.1/KerberosHelper-151/CFNetwork/
H A DNSURLConnection.m51 - (void)connection:(NSURLConnection *)connection didCancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge;
52 - (void)connection:(NSURLConnection *)connection didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge;
75 - (void)connection:(NSURLConnection *)connection didCancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
124 - (void)connection:(NSURLConnection*)connection didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
126 NSURLProtectionSpace *protectionSpace = [challenge protectionSpace];
180 [[challenge sender] useCredential:credential forAuthenticationChallenge:challenge];
188 [[challenge sender] continueWithoutCredentialForAuthenticationChallenge:challenge];
/macosx-10.10.1/OpenSSH-189/openssh/
H A Dauth-chall.c48 char *challenge, *name, *info, **prompts; local
70 challenge = xstrdup(prompts[0]);
78 return (challenge);
/macosx-10.10.1/ppp-786.1.1/Helpers/pppd/
H A Dchap_ms.c186 { "mschap-challenge", o_string, &mschap_challenge,
187 "specify CHAP challenge" },
188 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
189 "specify CHAP peer challenge" },
195 * chapms_generate_challenge - generate a challenge for MS-CHAP.
196 * For MS-CHAP the challenge length is fixed at 8 bytes.
197 * The length goes in challenge[0] and the actual challenge starts
198 * at challenge[1].
201 chapms_generate_challenge(unsigned char *challenge) argument
211 chapms2_generate_challenge(unsigned char *challenge) argument
221 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
271 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
350 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument
360 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument
610 unsigned char challenge[MAX_CHALLENGE_LEN]; local
655 unsigned char challenge[MAX_CHALLENGE_LEN]; local
812 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument
[all...]
/macosx-10.10.1/Heimdal-398.1.2/appl/telnet/libtelnet/
H A Drsaencpwd.c111 static char challenge[CHAL_SZ]; variable
226 r = accept_rsa_encpwd(&auth, key, challenge,
252 * the challenge, and verify it when the response comes back.
260 snprintf(challenge, sizeof(challenge), "%x", now);
261 challenge_len = strlen(challenge);
263 strlcpy(challenge, "randchal", sizeof(challenge));
294 memmove(ptr, challenge, challenge_len);
342 * Verify that the response to the challenge i
[all...]
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/
H A Dmschap.c38 ChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE],
78 NTChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], argument
85 ChallengeResponse(challenge, hash, response);
90 NTMPPEChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], argument
98 ChallengeResponse(challenge, hash, response);
103 ChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], argument
113 DesEncrypt(challenge, zhash, response);
114 DesEncrypt(challenge, zhash + 7, response + 8);
115 DesEncrypt(challenge, zhash + 14, response + 16);
123 uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZ
120 ChallengeHash(const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE]) argument
169 uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE]; local
256 MSChap(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument
269 MSChap_MPPE(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument
289 uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE]; local
[all...]
/macosx-10.10.1/WebKit-7600.1.25/mac/Misc/
H A DWebDownload.mm126 - (void)download:(NSURLDownload *)download didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
130 if (![challenge previousFailureCount]) {
131 NSURLCredential *credential = mac(CredentialStorage::get(ProtectionSpace([challenge protectionSpace])));
133 [[challenge sender] useCredential:credential forAuthenticationChallenge:challenge];
139 [realDelegate download:download didReceiveAuthenticationChallenge:challenge];
146 [[WebPanelAuthenticationHandler sharedHandler] startAuthentication:challenge window:window];
151 - (void)download:(NSURLDownload *)download didCancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
155 [realDelegate download:download didCancelAuthenticationChallenge:challenge];
157 [[WebPanelAuthenticationHandler sharedHandler] cancelAuthentication:challenge];
[all...]
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/plugins/
H A Dcram.c97 char *challenge; member in struct:server_context
103 const char *challenge __attribute__((unused)),
176 text->challenge = NULL;
179 /* Because Apple's password server needs the userID before the challenge, there is no way for */
184 /* allocate some space for the challenge */
185 text->challenge = sparams->utils->malloc(clientinlen + 1);
186 if (text->challenge == NULL) {
191 memcpy( text->challenge, clientin, clientinlen );
192 text->challenge[clientinlen] = '\0';
211 if ( text->challenge
[all...]
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/contrib/ldapc++/src/
H A DSaslInteraction.cpp31 return std::string(m_interact->challenge);
/macosx-10.10.1/WebKit-7600.1.25/mac/WebView/
H A DWebResourceLoadDelegate.h81 @abstract Start authentication for the resource, providing a challenge
83 cancel on the challenge when done.
84 @param challenge The NSURLAuthenticationChallenge to start authentication for
88 - (void)webView:(WebView *)sender resource:(id)identifier didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge fromDataSource:(WebDataSource *)dataSource;
93 @param challenge The NSURLAuthenticationChallenge for which to cancel authentication
95 - (void)webView:(WebView *)sender resource:(id)identifier didCancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge fromDataSource:(WebDataSource *)dataSource;

Completed in 409 milliseconds

1234567