/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/C/ |
H A D | WKAuthenticationChallenge.cpp | 42 WKAuthenticationDecisionListenerRef WKAuthenticationChallengeGetDecisionListener(WKAuthenticationChallengeRef challenge) argument 44 return toAPI(toImpl(challenge)->listener()); 47 WKProtectionSpaceRef WKAuthenticationChallengeGetProtectionSpace(WKAuthenticationChallengeRef challenge) argument 49 return toAPI(toImpl(challenge)->protectionSpace()); 52 WKCredentialRef WKAuthenticationChallengeGetProposedCredential(WKAuthenticationChallengeRef challenge) argument 54 return toAPI(toImpl(challenge)->proposedCredential()); 57 int WKAuthenticationChallengeGetPreviousFailureCount(WKAuthenticationChallengeRef challenge) argument 59 return toImpl(challenge)->previousFailureCount();
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/Cocoa/ |
H A D | WKNSURLAuthenticationChallenge.mm | 46 AuthenticationChallengeProxy& challenge = *reinterpret_cast<AuthenticationChallengeProxy*>(&self._apiObject); 54 return [[NSURLAuthenticationChallenge alloc] initWithAuthenticationChallenge:mac(challenge.core()) sender:sender]; 66 static void checkChallenge(NSURLAuthenticationChallenge *challenge) 68 if ([challenge class] != [WKNSURLAuthenticationChallenge class]) 69 [NSException raise:NSInvalidArgumentException format:@"The challenge was not sent by the receiver."]; 72 - (void)cancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 74 checkChallenge(challenge); 75 AuthenticationChallengeProxy& webChallenge = ((WKNSURLAuthenticationChallenge *)challenge)._web_authenticationChallengeProxy; 79 - (void)continueWithoutCredentialForAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 81 checkChallenge(challenge); [all...] |
H A D | WKNSURLAuthenticationChallenge.h | 35 inline NSURLAuthenticationChallenge *wrapper(AuthenticationChallengeProxy& challenge) argument 37 ASSERT([challenge.wrapper() isKindOfClass:[NSURLAuthenticationChallenge self]]); 38 return (NSURLAuthenticationChallenge *)challenge.wrapper();
|
H A D | WKBrowsingContextLoadDelegatePrivate.h | 32 - (void)browsingContextController:(WKBrowsingContextController *)sender didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge;
|
/macosx-10.10/WebKit2-7600.1.25/Shared/Authentication/ |
H A D | AuthenticationManager.cpp | 111 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 112 ASSERT(!challenge.isNull()); 114 if (tryUseCertificateInfoForChallenge(challenge, certificateInfo)) 117 AuthenticationClient* coreClient = challenge.authenticationClient(); 119 // This authentication challenge comes from a download. 120 Download::receivedCredential(challenge, credential); 124 coreClient->receivedCredential(challenge, credential); 131 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 132 ASSERT(!challenge.isNull()); 133 AuthenticationClient* coreClient = challenge 147 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 163 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 179 AuthenticationChallenge challenge = m_challenges.take(challengeID); local [all...] |
/macosx-10.10/WebKit-7600.1.25/mac/Panels/ |
H A D | WebPanelAuthenticationHandler.m | 70 -(void)enqueueChallenge:(NSURLAuthenticationChallenge *)challenge forWindow:(id)window 78 [queue addObject:challenge]; 87 NSURLAuthenticationChallenge *challenge = [[queue objectAtIndex:0] retain]; 92 NSURLCredential *latestCredential = [[NSURLCredentialStorage sharedCredentialStorage] defaultCredentialForProtectionSpace:[challenge protectionSpace]]; 95 [[challenge sender] useCredential:latestCredential forAuthenticationChallenge:challenge]; 96 [challenge release]; 100 [self startAuthentication:challenge window:(window == WebModalDialogPretendWindow ? nil : window)]; 101 [challenge release]; 105 -(void)startAuthentication:(NSURLAuthenticationChallenge *)challenge windo [all...] |
H A D | WebPanelAuthenticationHandler.h | 42 - (void)startAuthentication:(NSURLAuthenticationChallenge *)challenge window:(NSWindow *)w; 43 - (void)cancelAuthentication:(NSURLAuthenticationChallenge *)challenge;
|
/macosx-10.10/WebCore-7600.1.25/platform/network/mac/ |
H A D | SynchronousLoaderClient.mm | 35 void SynchronousLoaderClient::didReceiveAuthenticationChallenge(ResourceHandle*, const AuthenticationChallenge& challenge) 38 [challenge.sender() continueWithoutCredentialForAuthenticationChallenge:challenge.nsURLAuthenticationChallenge()];
|
H A D | AuthenticationMac.mm | 88 - (void)useCredential:(NSURLCredential *)credential forAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 91 m_client->receivedCredential(core(challenge), core(credential)); 94 - (void)continueWithoutCredentialForAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 97 m_client->receivedRequestToContinueWithoutCredential(core(challenge)); 100 - (void)cancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 103 m_client->receivedCancellation(core(challenge)); 107 - (void)setCFChallenge:(CFURLAuthChallengeRef)challenge 109 m_cfChallenge = challenge; 171 AuthenticationChallenge::AuthenticationChallenge(NSURLAuthenticationChallenge *challenge) 172 : AuthenticationChallengeBase(ProtectionSpace([challenge protectionSpac [all...] |
/macosx-10.10/WebKit-7600.1.25/win/ |
H A D | WebURLAuthenticationChallengeSenderCFNet.cpp | 42 /* [in] */ IWebURLAuthenticationChallenge* challenge) 44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 53 /* [in] */ IWebURLAuthenticationChallenge* challenge) 55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 65 /* [in] */ IWebURLAuthenticationChallenge* challenge) 67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 41 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 52 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 63 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
|
H A D | WebURLAuthenticationChallengeSenderCurl.cpp | 42 /* [in] */ IWebURLAuthenticationChallenge* challenge) 44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 53 /* [in] */ IWebURLAuthenticationChallenge* challenge) 55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 65 /* [in] */ IWebURLAuthenticationChallenge* challenge) 67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 41 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 52 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 63 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
|
H A D | WebURLAuthenticationChallengeSender.h | 54 /* [in] */ IWebURLAuthenticationChallenge* challenge); 57 /* [in] */ IWebURLAuthenticationChallenge* challenge); 61 /* [in] */ IWebURLAuthenticationChallenge* challenge);
|
/macosx-10.10/WebCore-7600.1.25/platform/network/cf/ |
H A D | SynchronousLoaderClientCFNet.cpp | 37 void SynchronousLoaderClient::didReceiveAuthenticationChallenge(ResourceHandle* handle, const AuthenticationChallenge& challenge) argument 40 CFURLConnectionUseCredential(handle->connection(), 0, challenge.cfURLAuthChallengeRef());
|
H A D | ResourceHandleCFNet.cpp | 325 void ResourceHandle::didReceiveAuthenticationChallenge(const AuthenticationChallenge& challenge) argument 331 ASSERT(challenge.cfURLAuthChallengeRef()); 332 ASSERT(challenge.authenticationClient() == this); // Should be already set. 337 if (challenge.protectionSpace().isProxy()) { 338 // Cannot use receivedRequestToContinueWithoutCredential(), because current challenge is not yet set. 339 CFURLConnectionUseCredential(d->m_connection.get(), 0, challenge.cfURLAuthChallengeRef()); 348 if (challenge.failureResponse().httpStatusCode() == 401) 349 urlToStore = challenge.failureResponse().url(); 350 CredentialStorage::set(core(credential.get()), challenge.protectionSpace(), urlToStore); 352 CFURLConnectionUseCredential(d->m_connection.get(), credential.get(), challenge 401 receivedCredential(const AuthenticationChallenge& challenge, const Credential& credential) argument 435 receivedRequestToContinueWithoutCredential(const AuthenticationChallenge& challenge) argument 448 receivedCancellation(const AuthenticationChallenge& challenge) argument 458 receivedRequestToPerformDefaultHandling(const AuthenticationChallenge& challenge) argument 471 receivedChallengeRejection(const AuthenticationChallenge& challenge) argument [all...] |
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | auth-bsdauth.c | 55 char *challenge = NULL; local 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 60 if (challenge == NULL) { 66 if (challenge == NULL) { 71 authctxt->style, "auth-ssh", &challenge); 73 challenge = NULL; 74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 77 if (challenge == NULL) 85 (*prompts)[0] = xstrdup(challenge); [all...] |
H A D | auth-skey.c | 56 char challenge[1024]; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 60 sizeof(challenge)) == -1) 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
|
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | chap.h | 44 const uint8_t * challenge, int challenge_len,
|
H A D | chap.c | 48 const uint8_t * challenge, int challenge_len, 53 /* MD5 hash over the identifier + password + challenge */ 57 CC_MD5_Update(&ctx, challenge, challenge_len); 47 chap_md5(uint8_t identifier, const uint8_t * password, int password_len, const uint8_t * challenge, int challenge_len, uint8_t * hash) argument
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/java/CyrusSasl/ |
H A D | SaslServer.java | 8 evaluateResponse(byte[] challenge) argument
|
H A D | SaslClient.java | 8 evaluateChallenge(byte[] challenge) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/ |
H A D | heim-auth.h | 18 heim_apop_create(const char *challenge, const char *password); 21 heim_apop_verify(const char *challenge, const char *password, const char *response); 35 heim_cram_md5_create(const char *challenge, const char *password); 38 heim_cram_md5_verify(const char *challenge, const char *password, const char *response); 47 heim_cram_md5_verify_ctx(heim_cram_md5 ctx, const char *challenge, const char *response); 98 heim_digest_parse_challenge(heim_digest_t context, const char *challenge);
|
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | chap-md5.c | 84 unsigned char *challenge, unsigned char *response, 92 challenge_len = *challenge++; 95 /* Generate hash of ID, secret, challenge */ 99 MD5_Update(&ctx, challenge, challenge_len); 114 unsigned char *challenge, u_char *secret, int secret_len, 119 int challenge_len = *challenge++; 124 MD5_Update(&ctx, challenge, challenge_len); 82 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 113 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument
|
/macosx-10.10/WebCore-7600.1.25/platform/network/curl/ |
H A D | ResourceHandleCurl.cpp | 194 void ResourceHandle::didReceiveAuthenticationChallenge(const AuthenticationChallenge& challenge) argument 200 if (challenge.failureResponse().httpStatusCode() == 401) 201 urlToStore = challenge.failureResponse().url(); 202 CredentialStorage::set(credential, challenge.protectionSpace(), urlToStore); 214 if (!d->m_initialCredential.isEmpty() || challenge.previousFailureCount()) { 218 CredentialStorage::remove(challenge.protectionSpace()); 221 if (!challenge.previousFailureCount()) { 222 Credential credential = CredentialStorage::get(challenge.protectionSpace()); 225 if (challenge.failureResponse().httpStatusCode() == 401) { 227 CredentialStorage::set(credential, challenge 242 receivedCredential(const AuthenticationChallenge& challenge, const Credential& credential) argument 265 receivedRequestToContinueWithoutCredential(const AuthenticationChallenge& challenge) argument 276 receivedCancellation(const AuthenticationChallenge& challenge) argument [all...] |
/macosx-10.10/WebKit2-7600.1.25/Shared/Authentication/mac/ |
H A D | AuthenticationManager.mac.mm | 40 bool AuthenticationManager::tryUseCertificateInfoForChallenge(const AuthenticationChallenge& challenge, const CertificateInfo& certificateInfo) 53 [challenge.sender() cancelAuthenticationChallenge:challenge.nsURLAuthenticationChallenge()]; 64 [challenge.sender() useCredential:credential forAuthenticationChallenge:challenge.nsURLAuthenticationChallenge()];
|
/macosx-10.10/ruby-106/ruby/lib/webrick/httpauth/ |
H A D | basicauth.rb | 71 challenge(req, res) 77 challenge(req, res) 81 challenge(req, res) 85 challenge(req, res) 92 # Returns a challenge response which asks for for authentication 95 def challenge(req, res) method in class:WEBrick.HTTPAuth.BasicAuth
|