/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/API/C/ |
H A D | WKAuthenticationChallenge.cpp | 42 WKAuthenticationDecisionListenerRef WKAuthenticationChallengeGetDecisionListener(WKAuthenticationChallengeRef challenge) argument 44 return toAPI(toImpl(challenge)->listener()); 47 WKProtectionSpaceRef WKAuthenticationChallengeGetProtectionSpace(WKAuthenticationChallengeRef challenge) argument 49 return toAPI(toImpl(challenge)->protectionSpace()); 52 WKCredentialRef WKAuthenticationChallengeGetProposedCredential(WKAuthenticationChallengeRef challenge) argument 54 return toAPI(toImpl(challenge)->proposedCredential()); 57 int WKAuthenticationChallengeGetPreviousFailureCount(WKAuthenticationChallengeRef challenge) argument 59 return toImpl(challenge)->previousFailureCount();
|
/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/API/Cocoa/ |
H A D | WKNSURLAuthenticationChallenge.mm | 46 AuthenticationChallengeProxy& challenge = *reinterpret_cast<AuthenticationChallengeProxy*>(&self._apiObject); 54 return [[NSURLAuthenticationChallenge alloc] initWithAuthenticationChallenge:mac(challenge.core()) sender:sender]; 66 static void checkChallenge(NSURLAuthenticationChallenge *challenge) 68 if ([challenge class] != [WKNSURLAuthenticationChallenge class]) 69 [NSException raise:NSInvalidArgumentException format:@"The challenge was not sent by the receiver."]; 72 - (void)cancelAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 74 checkChallenge(challenge); 75 AuthenticationChallengeProxy& webChallenge = ((WKNSURLAuthenticationChallenge *)challenge)._web_authenticationChallengeProxy; 79 - (void)continueWithoutCredentialForAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge 81 checkChallenge(challenge); [all...] |
H A D | WKNSURLAuthenticationChallenge.h | 35 inline NSURLAuthenticationChallenge *wrapper(AuthenticationChallengeProxy& challenge) argument 37 ASSERT([challenge.wrapper() isKindOfClass:[NSURLAuthenticationChallenge self]]); 38 return (NSURLAuthenticationChallenge *)challenge.wrapper();
|
H A D | WKBrowsingContextLoadDelegatePrivate.h | 32 - (void)browsingContextController:(WKBrowsingContextController *)sender didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge;
|
/macosx-10.10.1/WebKit2-7600.1.25/Shared/Authentication/ |
H A D | AuthenticationManager.cpp | 111 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 112 ASSERT(!challenge.isNull()); 114 if (tryUseCertificateInfoForChallenge(challenge, certificateInfo)) 117 AuthenticationClient* coreClient = challenge.authenticationClient(); 119 // This authentication challenge comes from a download. 120 Download::receivedCredential(challenge, credential); 124 coreClient->receivedCredential(challenge, credential); 131 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 132 ASSERT(!challenge.isNull()); 133 AuthenticationClient* coreClient = challenge 147 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 163 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 179 AuthenticationChallenge challenge = m_challenges.take(challengeID); local [all...] |
/macosx-10.10.1/WebKit-7600.1.25/mac/Panels/ |
H A D | WebPanelAuthenticationHandler.m | 70 -(void)enqueueChallenge:(NSURLAuthenticationChallenge *)challenge forWindow:(id)window 78 [queue addObject:challenge]; 87 NSURLAuthenticationChallenge *challenge = [[queue objectAtIndex:0] retain]; 92 NSURLCredential *latestCredential = [[NSURLCredentialStorage sharedCredentialStorage] defaultCredentialForProtectionSpace:[challenge protectionSpace]]; 95 [[challenge sender] useCredential:latestCredential forAuthenticationChallenge:challenge]; 96 [challenge release]; 100 [self startAuthentication:challenge window:(window == WebModalDialogPretendWindow ? nil : window)]; 101 [challenge release]; 105 -(void)startAuthentication:(NSURLAuthenticationChallenge *)challenge windo [all...] |
H A D | WebPanelAuthenticationHandler.h | 42 - (void)startAuthentication:(NSURLAuthenticationChallenge *)challenge window:(NSWindow *)w; 43 - (void)cancelAuthentication:(NSURLAuthenticationChallenge *)challenge;
|
/macosx-10.10.1/WebKit-7600.1.25/win/ |
H A D | WebURLAuthenticationChallengeSenderCFNet.cpp | 42 /* [in] */ IWebURLAuthenticationChallenge* challenge) 44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 53 /* [in] */ IWebURLAuthenticationChallenge* challenge) 55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 65 /* [in] */ IWebURLAuthenticationChallenge* challenge) 67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 41 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 52 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 63 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
|
H A D | WebURLAuthenticationChallengeSenderCurl.cpp | 42 /* [in] */ IWebURLAuthenticationChallenge* challenge) 44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 53 /* [in] */ IWebURLAuthenticationChallenge* challenge) 55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 65 /* [in] */ IWebURLAuthenticationChallenge* challenge) 67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 41 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 52 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 63 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
|
H A D | WebURLAuthenticationChallengeSender.h | 54 /* [in] */ IWebURLAuthenticationChallenge* challenge); 57 /* [in] */ IWebURLAuthenticationChallenge* challenge); 61 /* [in] */ IWebURLAuthenticationChallenge* challenge);
|
/macosx-10.10.1/OpenSSH-189/openssh/ |
H A D | auth-bsdauth.c | 55 char *challenge = NULL; local 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 60 if (challenge == NULL) { 66 if (challenge == NULL) { 71 authctxt->style, "auth-ssh", &challenge); 73 challenge = NULL; 74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 77 if (challenge == NULL) 85 (*prompts)[0] = xstrdup(challenge); [all...] |
H A D | auth-skey.c | 56 char challenge[1024]; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 60 sizeof(challenge)) == -1) 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
|
H A D | sshconnect1.c | 77 BIGNUM *challenge; local 84 if ((challenge = BN_new()) == NULL) 111 /* Otherwise it should have sent a challenge. */ 116 packet_get_bignum(challenge); 119 debug("Received RSA challenge from server."); 121 /* Ask the agent to decrypt the challenge. */ 122 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) { 128 logit("Authentication agent failed to decrypt challenge."); 132 debug("Sending response to RSA challenge."); 134 /* Send the decrypted challenge bac 167 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) argument 214 BIGNUM *challenge; local 339 BIGNUM *challenge; local 401 char *challenge, *response; local [all...] |
H A D | auth-rsa.c | 78 BIGNUM *challenge; local 81 if ((challenge = BN_new()) == NULL) 83 /* Generate a random challenge. */ 84 if (BN_rand(challenge, 256, 0, 0) == 0) 88 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0) 92 return challenge; 96 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) argument 109 /* The response is MD5 of decrypted challenge plus session id. */ 110 len = BN_num_bytes(challenge); 138 BIGNUM *challenge, *encrypted_challenge; local [all...] |
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/ |
H A D | chap.h | 44 const uint8_t * challenge, int challenge_len,
|
H A D | chap.c | 48 const uint8_t * challenge, int challenge_len, 53 /* MD5 hash over the identifier + password + challenge */ 57 CC_MD5_Update(&ctx, challenge, challenge_len); 47 chap_md5(uint8_t identifier, const uint8_t * password, int password_len, const uint8_t * challenge, int challenge_len, uint8_t * hash) argument
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/CyrusSasl/ |
H A D | SaslServer.java | 8 evaluateResponse(byte[] challenge) argument
|
H A D | SaslClient.java | 8 evaluateChallenge(byte[] challenge) argument
|
/macosx-10.10.1/Heimdal-398.1.2/lib/ntlm/ |
H A D | heim-auth.h | 18 heim_apop_create(const char *challenge, const char *password); 21 heim_apop_verify(const char *challenge, const char *password, const char *response); 35 heim_cram_md5_create(const char *challenge, const char *password); 38 heim_cram_md5_verify(const char *challenge, const char *password, const char *response); 47 heim_cram_md5_verify_ctx(heim_cram_md5 ctx, const char *challenge, const char *response); 98 heim_digest_parse_challenge(heim_digest_t context, const char *challenge);
|
H A D | apop.c | 68 heim_apop_create(const char *challenge, const char *password) argument 75 CC_MD5_Update(&ctx, challenge, (CC_LONG)strlen(challenge)); 88 heim_apop_verify(const char *challenge, const char *password, const char *response) argument 93 str = heim_apop_create(challenge, password); 194 heim_cram_md5_verify_ctx(heim_cram_md5 ctx, const char *challenge, const char *response) argument 200 CC_MD5_Update(&ctx->ipad, challenge, (CC_LONG)strlen(challenge)); 227 heim_cram_md5_create(const char *challenge, const char *password) argument 234 CCHmacUpdate(&ctx, challenge, strle 247 heim_cram_md5_verify(const char *challenge, const char *password, const char *response) argument [all...] |
/macosx-10.10.1/ppp-786.1.1/Helpers/pppd/ |
H A D | chap-md5.c | 84 unsigned char *challenge, unsigned char *response, 92 challenge_len = *challenge++; 95 /* Generate hash of ID, secret, challenge */ 99 MD5_Update(&ctx, challenge, challenge_len); 114 unsigned char *challenge, u_char *secret, int secret_len, 119 int challenge_len = *challenge++; 124 MD5_Update(&ctx, challenge, challenge_len); 82 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 113 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.h | 79 * Semi-arbitrary limits on challenge and response fields. 127 * Note: challenge and response arguments below are formatted as 128 * a length byte followed by the actual challenge/response data. 130 void (*generate_challenge)(unsigned char *challenge); 133 unsigned char *challenge, unsigned char *response, 136 unsigned char *challenge, u_char *secret, int secret_len, 153 /* Hook for a plugin to validate CHAP challenge */ 156 unsigned char *challenge, unsigned char *response, 163 unsigned char *challenge, unsigned char *pkt, int pkt_len,
|
/macosx-10.10.1/WebKit2-7600.1.25/Shared/Authentication/mac/ |
H A D | AuthenticationManager.mac.mm | 40 bool AuthenticationManager::tryUseCertificateInfoForChallenge(const AuthenticationChallenge& challenge, const CertificateInfo& certificateInfo) 53 [challenge.sender() cancelAuthenticationChallenge:challenge.nsURLAuthenticationChallenge()]; 64 [challenge.sender() useCredential:credential forAuthenticationChallenge:challenge.nsURLAuthenticationChallenge()];
|
/macosx-10.10.1/ruby-106/ruby/lib/webrick/httpauth/ |
H A D | basicauth.rb | 71 challenge(req, res) 77 challenge(req, res) 81 challenge(req, res) 85 challenge(req, res) 92 # Returns a challenge response which asks for for authentication 95 def challenge(req, res) method in class:WEBrick.HTTPAuth.BasicAuth
|
/macosx-10.10.1/sudo-73/src/auth/ |
H A D | rfc1938.c | 71 char challenge[256]; local 100 * Look up the user and get the rfc1938 challenge. 104 if (rfc1938challenge(&rfc1938, pw->pw_name, challenge, sizeof(challenge))) { 113 /* Get space for new prompt with embedded challenge */ 114 if (np_size < op_len + strlen(challenge) + 7) { 115 np_size = op_len + strlen(challenge) + 7; 120 (void) snprintf(new_prompt, np_size, "%s\n%s", challenge, orig_prompt); 123 orig_prompt, challenge);
|