Searched refs:challenge (Results 1 - 25 of 168) sorted by relevance

1234567

/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/API/C/
H A DWKAuthenticationChallenge.cpp42 WKAuthenticationDecisionListenerRef WKAuthenticationChallengeGetDecisionListener(WKAuthenticationChallengeRef challenge) argument
44 return toAPI(toImpl(challenge)->listener());
47 WKProtectionSpaceRef WKAuthenticationChallengeGetProtectionSpace(WKAuthenticationChallengeRef challenge) argument
49 return toAPI(toImpl(challenge)->protectionSpace());
52 WKCredentialRef WKAuthenticationChallengeGetProposedCredential(WKAuthenticationChallengeRef challenge) argument
54 return toAPI(toImpl(challenge)->proposedCredential());
57 int WKAuthenticationChallengeGetPreviousFailureCount(WKAuthenticationChallengeRef challenge) argument
59 return toImpl(challenge)->previousFailureCount();
/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/API/Cocoa/
H A DWKNSURLAuthenticationChallenge.mm46 AuthenticationChallengeProxy& challenge = *reinterpret_cast<AuthenticationChallengeProxy*>(&self._apiObject);
54 return [[NSURLAuthenticationChallenge alloc] initWithAuthenticationChallenge:mac(challenge.core()) sender:sender];
66 static void checkChallenge(NSURLAuthenticationChallenge *challenge)
68 if ([challenge class] != [WKNSURLAuthenticationChallenge class])
69 [NSException raise:NSInvalidArgumentException format:@"The challenge was not sent by the receiver."];
72 - (void)cancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
74 checkChallenge(challenge);
75 AuthenticationChallengeProxy& webChallenge = ((WKNSURLAuthenticationChallenge *)challenge)._web_authenticationChallengeProxy;
79 - (void)continueWithoutCredentialForAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
81 checkChallenge(challenge);
[all...]
H A DWKNSURLAuthenticationChallenge.h35 inline NSURLAuthenticationChallenge *wrapper(AuthenticationChallengeProxy& challenge) argument
37 ASSERT([challenge.wrapper() isKindOfClass:[NSURLAuthenticationChallenge self]]);
38 return (NSURLAuthenticationChallenge *)challenge.wrapper();
H A DWKBrowsingContextLoadDelegatePrivate.h32 - (void)browsingContextController:(WKBrowsingContextController *)sender didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge;
/macosx-10.10.1/WebKit2-7600.1.25/Shared/Authentication/
H A DAuthenticationManager.cpp111 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
112 ASSERT(!challenge.isNull());
114 if (tryUseCertificateInfoForChallenge(challenge, certificateInfo))
117 AuthenticationClient* coreClient = challenge.authenticationClient();
119 // This authentication challenge comes from a download.
120 Download::receivedCredential(challenge, credential);
124 coreClient->receivedCredential(challenge, credential);
131 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
132 ASSERT(!challenge.isNull());
133 AuthenticationClient* coreClient = challenge
147 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
163 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
179 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
[all...]
/macosx-10.10.1/WebKit-7600.1.25/mac/Panels/
H A DWebPanelAuthenticationHandler.m70 -(void)enqueueChallenge:(NSURLAuthenticationChallenge *)challenge forWindow:(id)window
78 [queue addObject:challenge];
87 NSURLAuthenticationChallenge *challenge = [[queue objectAtIndex:0] retain];
92 NSURLCredential *latestCredential = [[NSURLCredentialStorage sharedCredentialStorage] defaultCredentialForProtectionSpace:[challenge protectionSpace]];
95 [[challenge sender] useCredential:latestCredential forAuthenticationChallenge:challenge];
96 [challenge release];
100 [self startAuthentication:challenge window:(window == WebModalDialogPretendWindow ? nil : window)];
101 [challenge release];
105 -(void)startAuthentication:(NSURLAuthenticationChallenge *)challenge windo
[all...]
H A DWebPanelAuthenticationHandler.h42 - (void)startAuthentication:(NSURLAuthenticationChallenge *)challenge window:(NSWindow *)w;
43 - (void)cancelAuthentication:(NSURLAuthenticationChallenge *)challenge;
/macosx-10.10.1/WebKit-7600.1.25/win/
H A DWebURLAuthenticationChallengeSenderCFNet.cpp42 /* [in] */ IWebURLAuthenticationChallenge* challenge)
44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
53 /* [in] */ IWebURLAuthenticationChallenge* challenge)
55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
65 /* [in] */ IWebURLAuthenticationChallenge* challenge)
67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
41 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
52 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
63 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
H A DWebURLAuthenticationChallengeSenderCurl.cpp42 /* [in] */ IWebURLAuthenticationChallenge* challenge)
44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
53 /* [in] */ IWebURLAuthenticationChallenge* challenge)
55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
65 /* [in] */ IWebURLAuthenticationChallenge* challenge)
67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
41 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
52 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
63 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
H A DWebURLAuthenticationChallengeSender.h54 /* [in] */ IWebURLAuthenticationChallenge* challenge);
57 /* [in] */ IWebURLAuthenticationChallenge* challenge);
61 /* [in] */ IWebURLAuthenticationChallenge* challenge);
/macosx-10.10.1/OpenSSH-189/openssh/
H A Dauth-bsdauth.c55 char *challenge = NULL; local
59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
60 if (challenge == NULL) {
66 if (challenge == NULL) {
71 authctxt->style, "auth-ssh", &challenge);
73 challenge = NULL;
74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
77 if (challenge == NULL)
85 (*prompts)[0] = xstrdup(challenge);
[all...]
H A Dauth-skey.c56 char challenge[1024]; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
60 sizeof(challenge)) == -1)
69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
H A Dsshconnect1.c77 BIGNUM *challenge; local
84 if ((challenge = BN_new()) == NULL)
111 /* Otherwise it should have sent a challenge. */
116 packet_get_bignum(challenge);
119 debug("Received RSA challenge from server.");
121 /* Ask the agent to decrypt the challenge. */
122 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) {
128 logit("Authentication agent failed to decrypt challenge.");
132 debug("Sending response to RSA challenge.");
134 /* Send the decrypted challenge bac
167 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) argument
214 BIGNUM *challenge; local
339 BIGNUM *challenge; local
401 char *challenge, *response; local
[all...]
H A Dauth-rsa.c78 BIGNUM *challenge; local
81 if ((challenge = BN_new()) == NULL)
83 /* Generate a random challenge. */
84 if (BN_rand(challenge, 256, 0, 0) == 0)
88 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0)
92 return challenge;
96 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) argument
109 /* The response is MD5 of decrypted challenge plus session id. */
110 len = BN_num_bytes(challenge);
138 BIGNUM *challenge, *encrypted_challenge; local
[all...]
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/
H A Dchap.h44 const uint8_t * challenge, int challenge_len,
H A Dchap.c48 const uint8_t * challenge, int challenge_len,
53 /* MD5 hash over the identifier + password + challenge */
57 CC_MD5_Update(&ctx, challenge, challenge_len);
47 chap_md5(uint8_t identifier, const uint8_t * password, int password_len, const uint8_t * challenge, int challenge_len, uint8_t * hash) argument
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/CyrusSasl/
H A DSaslServer.java8 evaluateResponse(byte[] challenge) argument
H A DSaslClient.java8 evaluateChallenge(byte[] challenge) argument
/macosx-10.10.1/Heimdal-398.1.2/lib/ntlm/
H A Dheim-auth.h18 heim_apop_create(const char *challenge, const char *password);
21 heim_apop_verify(const char *challenge, const char *password, const char *response);
35 heim_cram_md5_create(const char *challenge, const char *password);
38 heim_cram_md5_verify(const char *challenge, const char *password, const char *response);
47 heim_cram_md5_verify_ctx(heim_cram_md5 ctx, const char *challenge, const char *response);
98 heim_digest_parse_challenge(heim_digest_t context, const char *challenge);
H A Dapop.c68 heim_apop_create(const char *challenge, const char *password) argument
75 CC_MD5_Update(&ctx, challenge, (CC_LONG)strlen(challenge));
88 heim_apop_verify(const char *challenge, const char *password, const char *response) argument
93 str = heim_apop_create(challenge, password);
194 heim_cram_md5_verify_ctx(heim_cram_md5 ctx, const char *challenge, const char *response) argument
200 CC_MD5_Update(&ctx->ipad, challenge, (CC_LONG)strlen(challenge));
227 heim_cram_md5_create(const char *challenge, const char *password) argument
234 CCHmacUpdate(&ctx, challenge, strle
247 heim_cram_md5_verify(const char *challenge, const char *password, const char *response) argument
[all...]
/macosx-10.10.1/ppp-786.1.1/Helpers/pppd/
H A Dchap-md5.c84 unsigned char *challenge, unsigned char *response,
92 challenge_len = *challenge++;
95 /* Generate hash of ID, secret, challenge */
99 MD5_Update(&ctx, challenge, challenge_len);
114 unsigned char *challenge, u_char *secret, int secret_len,
119 int challenge_len = *challenge++;
124 MD5_Update(&ctx, challenge, challenge_len);
82 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
113 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument
H A Dchap-new.h79 * Semi-arbitrary limits on challenge and response fields.
127 * Note: challenge and response arguments below are formatted as
128 * a length byte followed by the actual challenge/response data.
130 void (*generate_challenge)(unsigned char *challenge);
133 unsigned char *challenge, unsigned char *response,
136 unsigned char *challenge, u_char *secret, int secret_len,
153 /* Hook for a plugin to validate CHAP challenge */
156 unsigned char *challenge, unsigned char *response,
163 unsigned char *challenge, unsigned char *pkt, int pkt_len,
/macosx-10.10.1/WebKit2-7600.1.25/Shared/Authentication/mac/
H A DAuthenticationManager.mac.mm40 bool AuthenticationManager::tryUseCertificateInfoForChallenge(const AuthenticationChallenge& challenge, const CertificateInfo& certificateInfo)
53 [challenge.sender() cancelAuthenticationChallenge:challenge.nsURLAuthenticationChallenge()];
64 [challenge.sender() useCredential:credential forAuthenticationChallenge:challenge.nsURLAuthenticationChallenge()];
/macosx-10.10.1/ruby-106/ruby/lib/webrick/httpauth/
H A Dbasicauth.rb71 challenge(req, res)
77 challenge(req, res)
81 challenge(req, res)
85 challenge(req, res)
92 # Returns a challenge response which asks for for authentication
95 def challenge(req, res) method in class:WEBrick.HTTPAuth.BasicAuth
/macosx-10.10.1/sudo-73/src/auth/
H A Drfc1938.c71 char challenge[256]; local
100 * Look up the user and get the rfc1938 challenge.
104 if (rfc1938challenge(&rfc1938, pw->pw_name, challenge, sizeof(challenge))) {
113 /* Get space for new prompt with embedded challenge */
114 if (np_size < op_len + strlen(challenge) + 7) {
115 np_size = op_len + strlen(challenge) + 7;
120 (void) snprintf(new_prompt, np_size, "%s\n%s", challenge, orig_prompt);
123 orig_prompt, challenge);

Completed in 339 milliseconds

1234567