Searched refs:challenge (Results 1 - 25 of 193) sorted by relevance

12345678

/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/C/
H A DWKAuthenticationChallenge.cpp42 WKAuthenticationDecisionListenerRef WKAuthenticationChallengeGetDecisionListener(WKAuthenticationChallengeRef challenge) argument
44 return toAPI(toImpl(challenge)->listener());
47 WKProtectionSpaceRef WKAuthenticationChallengeGetProtectionSpace(WKAuthenticationChallengeRef challenge) argument
49 return toAPI(toImpl(challenge)->protectionSpace());
52 WKCredentialRef WKAuthenticationChallengeGetProposedCredential(WKAuthenticationChallengeRef challenge) argument
54 return toAPI(toImpl(challenge)->proposedCredential());
57 int WKAuthenticationChallengeGetPreviousFailureCount(WKAuthenticationChallengeRef challenge) argument
59 return toImpl(challenge)->previousFailureCount();
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/Cocoa/
H A DWKNSURLAuthenticationChallenge.mm46 AuthenticationChallengeProxy& challenge = *reinterpret_cast<AuthenticationChallengeProxy*>(&self._apiObject);
54 return [[NSURLAuthenticationChallenge alloc] initWithAuthenticationChallenge:mac(challenge.core()) sender:sender];
66 static void checkChallenge(NSURLAuthenticationChallenge *challenge)
68 if ([challenge class] != [WKNSURLAuthenticationChallenge class])
69 [NSException raise:NSInvalidArgumentException format:@"The challenge was not sent by the receiver."];
72 - (void)cancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
74 checkChallenge(challenge);
75 AuthenticationChallengeProxy& webChallenge = ((WKNSURLAuthenticationChallenge *)challenge)._web_authenticationChallengeProxy;
79 - (void)continueWithoutCredentialForAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
81 checkChallenge(challenge);
[all...]
H A DWKNSURLAuthenticationChallenge.h35 inline NSURLAuthenticationChallenge *wrapper(AuthenticationChallengeProxy& challenge) argument
37 ASSERT([challenge.wrapper() isKindOfClass:[NSURLAuthenticationChallenge self]]);
38 return (NSURLAuthenticationChallenge *)challenge.wrapper();
H A DWKBrowsingContextLoadDelegatePrivate.h32 - (void)browsingContextController:(WKBrowsingContextController *)sender didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge;
/macosx-10.10/WebKit2-7600.1.25/Shared/Authentication/
H A DAuthenticationManager.cpp111 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
112 ASSERT(!challenge.isNull());
114 if (tryUseCertificateInfoForChallenge(challenge, certificateInfo))
117 AuthenticationClient* coreClient = challenge.authenticationClient();
119 // This authentication challenge comes from a download.
120 Download::receivedCredential(challenge, credential);
124 coreClient->receivedCredential(challenge, credential);
131 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
132 ASSERT(!challenge.isNull());
133 AuthenticationClient* coreClient = challenge
147 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
163 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
179 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
[all...]
/macosx-10.10/WebKit-7600.1.25/mac/Panels/
H A DWebPanelAuthenticationHandler.m70 -(void)enqueueChallenge:(NSURLAuthenticationChallenge *)challenge forWindow:(id)window
78 [queue addObject:challenge];
87 NSURLAuthenticationChallenge *challenge = [[queue objectAtIndex:0] retain];
92 NSURLCredential *latestCredential = [[NSURLCredentialStorage sharedCredentialStorage] defaultCredentialForProtectionSpace:[challenge protectionSpace]];
95 [[challenge sender] useCredential:latestCredential forAuthenticationChallenge:challenge];
96 [challenge release];
100 [self startAuthentication:challenge window:(window == WebModalDialogPretendWindow ? nil : window)];
101 [challenge release];
105 -(void)startAuthentication:(NSURLAuthenticationChallenge *)challenge windo
[all...]
H A DWebPanelAuthenticationHandler.h42 - (void)startAuthentication:(NSURLAuthenticationChallenge *)challenge window:(NSWindow *)w;
43 - (void)cancelAuthentication:(NSURLAuthenticationChallenge *)challenge;
/macosx-10.10/WebCore-7600.1.25/platform/network/mac/
H A DSynchronousLoaderClient.mm35 void SynchronousLoaderClient::didReceiveAuthenticationChallenge(ResourceHandle*, const AuthenticationChallenge& challenge)
38 [challenge.sender() continueWithoutCredentialForAuthenticationChallenge:challenge.nsURLAuthenticationChallenge()];
H A DAuthenticationMac.mm88 - (void)useCredential:(NSURLCredential *)credential forAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
91 m_client->receivedCredential(core(challenge), core(credential));
94 - (void)continueWithoutCredentialForAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
97 m_client->receivedRequestToContinueWithoutCredential(core(challenge));
100 - (void)cancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
103 m_client->receivedCancellation(core(challenge));
107 - (void)setCFChallenge:(CFURLAuthChallengeRef)challenge
109 m_cfChallenge = challenge;
171 AuthenticationChallenge::AuthenticationChallenge(NSURLAuthenticationChallenge *challenge)
172 : AuthenticationChallengeBase(ProtectionSpace([challenge protectionSpac
[all...]
/macosx-10.10/WebKit-7600.1.25/win/
H A DWebURLAuthenticationChallengeSenderCFNet.cpp42 /* [in] */ IWebURLAuthenticationChallenge* challenge)
44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
53 /* [in] */ IWebURLAuthenticationChallenge* challenge)
55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
65 /* [in] */ IWebURLAuthenticationChallenge* challenge)
67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
41 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
52 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
63 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
H A DWebURLAuthenticationChallengeSenderCurl.cpp42 /* [in] */ IWebURLAuthenticationChallenge* challenge)
44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
53 /* [in] */ IWebURLAuthenticationChallenge* challenge)
55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
65 /* [in] */ IWebURLAuthenticationChallenge* challenge)
67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
41 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
52 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
63 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
H A DWebURLAuthenticationChallengeSender.h54 /* [in] */ IWebURLAuthenticationChallenge* challenge);
57 /* [in] */ IWebURLAuthenticationChallenge* challenge);
61 /* [in] */ IWebURLAuthenticationChallenge* challenge);
/macosx-10.10/WebCore-7600.1.25/platform/network/cf/
H A DSynchronousLoaderClientCFNet.cpp37 void SynchronousLoaderClient::didReceiveAuthenticationChallenge(ResourceHandle* handle, const AuthenticationChallenge& challenge) argument
40 CFURLConnectionUseCredential(handle->connection(), 0, challenge.cfURLAuthChallengeRef());
H A DResourceHandleCFNet.cpp325 void ResourceHandle::didReceiveAuthenticationChallenge(const AuthenticationChallenge& challenge) argument
331 ASSERT(challenge.cfURLAuthChallengeRef());
332 ASSERT(challenge.authenticationClient() == this); // Should be already set.
337 if (challenge.protectionSpace().isProxy()) {
338 // Cannot use receivedRequestToContinueWithoutCredential(), because current challenge is not yet set.
339 CFURLConnectionUseCredential(d->m_connection.get(), 0, challenge.cfURLAuthChallengeRef());
348 if (challenge.failureResponse().httpStatusCode() == 401)
349 urlToStore = challenge.failureResponse().url();
350 CredentialStorage::set(core(credential.get()), challenge.protectionSpace(), urlToStore);
352 CFURLConnectionUseCredential(d->m_connection.get(), credential.get(), challenge
401 receivedCredential(const AuthenticationChallenge& challenge, const Credential& credential) argument
435 receivedRequestToContinueWithoutCredential(const AuthenticationChallenge& challenge) argument
448 receivedCancellation(const AuthenticationChallenge& challenge) argument
458 receivedRequestToPerformDefaultHandling(const AuthenticationChallenge& challenge) argument
471 receivedChallengeRejection(const AuthenticationChallenge& challenge) argument
[all...]
/macosx-10.10/OpenSSH-189/openssh/
H A Dauth-bsdauth.c55 char *challenge = NULL; local
59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
60 if (challenge == NULL) {
66 if (challenge == NULL) {
71 authctxt->style, "auth-ssh", &challenge);
73 challenge = NULL;
74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
77 if (challenge == NULL)
85 (*prompts)[0] = xstrdup(challenge);
[all...]
H A Dauth-skey.c56 char challenge[1024]; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
60 sizeof(challenge)) == -1)
69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
/macosx-10.10/eap8021x-198/EAP8021X.fproj/
H A Dchap.h44 const uint8_t * challenge, int challenge_len,
H A Dchap.c48 const uint8_t * challenge, int challenge_len,
53 /* MD5 hash over the identifier + password + challenge */
57 CC_MD5_Update(&ctx, challenge, challenge_len);
47 chap_md5(uint8_t identifier, const uint8_t * password, int password_len, const uint8_t * challenge, int challenge_len, uint8_t * hash) argument
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/java/CyrusSasl/
H A DSaslServer.java8 evaluateResponse(byte[] challenge) argument
H A DSaslClient.java8 evaluateChallenge(byte[] challenge) argument
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/
H A Dheim-auth.h18 heim_apop_create(const char *challenge, const char *password);
21 heim_apop_verify(const char *challenge, const char *password, const char *response);
35 heim_cram_md5_create(const char *challenge, const char *password);
38 heim_cram_md5_verify(const char *challenge, const char *password, const char *response);
47 heim_cram_md5_verify_ctx(heim_cram_md5 ctx, const char *challenge, const char *response);
98 heim_digest_parse_challenge(heim_digest_t context, const char *challenge);
/macosx-10.10/ppp-786.1.1/Helpers/pppd/
H A Dchap-md5.c84 unsigned char *challenge, unsigned char *response,
92 challenge_len = *challenge++;
95 /* Generate hash of ID, secret, challenge */
99 MD5_Update(&ctx, challenge, challenge_len);
114 unsigned char *challenge, u_char *secret, int secret_len,
119 int challenge_len = *challenge++;
124 MD5_Update(&ctx, challenge, challenge_len);
82 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
113 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument
/macosx-10.10/WebCore-7600.1.25/platform/network/curl/
H A DResourceHandleCurl.cpp194 void ResourceHandle::didReceiveAuthenticationChallenge(const AuthenticationChallenge& challenge) argument
200 if (challenge.failureResponse().httpStatusCode() == 401)
201 urlToStore = challenge.failureResponse().url();
202 CredentialStorage::set(credential, challenge.protectionSpace(), urlToStore);
214 if (!d->m_initialCredential.isEmpty() || challenge.previousFailureCount()) {
218 CredentialStorage::remove(challenge.protectionSpace());
221 if (!challenge.previousFailureCount()) {
222 Credential credential = CredentialStorage::get(challenge.protectionSpace());
225 if (challenge.failureResponse().httpStatusCode() == 401) {
227 CredentialStorage::set(credential, challenge
242 receivedCredential(const AuthenticationChallenge& challenge, const Credential& credential) argument
265 receivedRequestToContinueWithoutCredential(const AuthenticationChallenge& challenge) argument
276 receivedCancellation(const AuthenticationChallenge& challenge) argument
[all...]
/macosx-10.10/WebKit2-7600.1.25/Shared/Authentication/mac/
H A DAuthenticationManager.mac.mm40 bool AuthenticationManager::tryUseCertificateInfoForChallenge(const AuthenticationChallenge& challenge, const CertificateInfo& certificateInfo)
53 [challenge.sender() cancelAuthenticationChallenge:challenge.nsURLAuthenticationChallenge()];
64 [challenge.sender() useCredential:credential forAuthenticationChallenge:challenge.nsURLAuthenticationChallenge()];
/macosx-10.10/ruby-106/ruby/lib/webrick/httpauth/
H A Dbasicauth.rb71 challenge(req, res)
77 challenge(req, res)
81 challenge(req, res)
85 challenge(req, res)
92 # Returns a challenge response which asks for for authentication
95 def challenge(req, res) method in class:WEBrick.HTTPAuth.BasicAuth

Completed in 163 milliseconds

12345678