/dports/net-mgmt/pandorafms_console/pandorafms_console-6.0SP2/include/swiftmailer/classes/Swift/Transport/Esmtp/Auth/ |
H A D | CramMd5Authenticator.php | 46 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334)); 47 $challenge = base64_decode(substr($challenge, 4)); 49 $username . ' ' . $this->_getResponse($password, $challenge) 64 * @param string $challenge 67 private function _getResponse($secret, $challenge) argument 82 $inner = pack('H32', md5($k_ipad . $challenge));
|
/dports/www/dolibarr13/dolibarr-13.0.5/htdocs/includes/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/ |
H A D | CramMd5Authenticator.php | 40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334)); 41 $challenge = base64_decode(substr($challenge, 4)); 43 $username.' '.$this->getResponse($password, $challenge) 59 * @param string $challenge 63 private function getResponse($secret, $challenge) argument 76 $inner = pack('H32', md5($k_ipad.$challenge));
|
/dports/www/phpmyfaq/phpmyfaq/src/libs/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/ |
H A D | CramMd5Authenticator.php | 40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334)); 41 $challenge = base64_decode(substr($challenge, 4)); 43 $username.' '.$this->_getResponse($password, $challenge) 59 * @param string $challenge 63 private function _getResponse($secret, $challenge) argument 76 $inner = pack('H32', md5($k_ipad.$challenge));
|
/dports/www/typo3-9/typo3_src-9.5.31/vendor/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/ |
H A D | CramMd5Authenticator.php | 40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334)); 41 $challenge = base64_decode(substr($challenge, 4)); 43 $username.' '.$this->_getResponse($password, $challenge) 59 * @param string $challenge 63 private function _getResponse($secret, $challenge) argument 76 $inner = pack('H32', md5($k_ipad.$challenge));
|
/dports/www/webtrees/webtrees-1.7.18/webtrees/vendor/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/ |
H A D | CramMd5Authenticator.php | 40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334)); 41 $challenge = base64_decode(substr($challenge, 4)); 43 $username.' '.$this->_getResponse($password, $challenge) 59 * @param string $challenge 63 private function _getResponse($secret, $challenge) argument 76 $inner = pack('H32', md5($k_ipad.$challenge));
|
/dports/www/kanboard/kanboard-1.2.21/vendor/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/ |
H A D | CramMd5Authenticator.php | 40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334)); 41 $challenge = base64_decode(substr($challenge, 4)); 43 $username.' '.$this->_getResponse($password, $challenge) 59 * @param string $challenge 63 private function _getResponse($secret, $challenge) argument 76 $inner = pack('H32', md5($k_ipad.$challenge));
|
/dports/www/dolibarr/dolibarr-14.0.3/htdocs/includes/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/ |
H A D | CramMd5Authenticator.php | 40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334)); 41 $challenge = base64_decode(substr($challenge, 4)); 43 $username.' '.$this->getResponse($password, $challenge) 59 * @param string $challenge 63 private function getResponse($secret, $challenge) argument 76 $inner = pack('H32', md5($k_ipad.$challenge));
|
/dports/www/itop/web/lib/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/ |
H A D | CramMd5Authenticator.php | 40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334)); 41 $challenge = base64_decode(substr($challenge, 4)); 43 $username.' '.$this->_getResponse($password, $challenge) 59 * @param string $challenge 63 private function _getResponse($secret, $challenge) argument 76 $inner = pack('H32', md5($k_ipad.$challenge));
|
/dports/www/thirtybees/thirtybees-1.1.0/vendor/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/ |
H A D | CramMd5Authenticator.php | 40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334)); 41 $challenge = base64_decode(substr($challenge, 4)); 43 $username.' '.$this->_getResponse($password, $challenge) 59 * @param string $challenge 63 private function _getResponse($secret, $challenge) argument 76 $inner = pack('H32', md5($k_ipad.$challenge));
|
/dports/www/orangehrm/orangehrm-4.9/symfony/lib/vendor/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/ |
H A D | CramMd5Authenticator.php | 40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334)); 41 $challenge = base64_decode(substr($challenge, 4)); 43 $username.' '.$this->_getResponse($password, $challenge) 59 * @param string $challenge 63 private function _getResponse($secret, $challenge) argument 76 $inner = pack('H32', md5($k_ipad.$challenge));
|
/dports/security/cyrus-sasl2-gssapi/cyrus-sasl-2.1.28/sample/ |
H A D | http_digest_client.c | 82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local 210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main() 211 if (!challenge) break; in main() 212 challenge += strlen(DIGEST_AUTH_HEADER); in main() 213 p = strchr(challenge, '\r'); in main() 219 challenge, strlen(challenge), in main() 234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main() 235 if (challenge) { in main() 236 challenge += strlen(DIGEST_OK_HEADER); in main() 237 p = strchr(challenge, '\r'); in main() [all …]
|
/dports/security/cyrus-sasl2-ldapdb/cyrus-sasl-2.1.28/sample/ |
H A D | http_digest_client.c | 82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local 210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main() 211 if (!challenge) break; in main() 212 challenge += strlen(DIGEST_AUTH_HEADER); in main() 213 p = strchr(challenge, '\r'); in main() 219 challenge, strlen(challenge), in main() 234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main() 235 if (challenge) { in main() 236 challenge += strlen(DIGEST_OK_HEADER); in main() 237 p = strchr(challenge, '\r'); in main() [all …]
|
/dports/security/cyrus-sasl2-saslauthd/cyrus-sasl-2.1.28/sample/ |
H A D | http_digest_client.c | 82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local 210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main() 211 if (!challenge) break; in main() 212 challenge += strlen(DIGEST_AUTH_HEADER); in main() 213 p = strchr(challenge, '\r'); in main() 219 challenge, strlen(challenge), in main() 234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main() 235 if (challenge) { in main() 236 challenge += strlen(DIGEST_OK_HEADER); in main() 237 p = strchr(challenge, '\r'); in main() [all …]
|
/dports/security/cyrus-sasl2/cyrus-sasl-2.1.28/sample/ |
H A D | http_digest_client.c | 82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local 210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main() 211 if (!challenge) break; in main() 212 challenge += strlen(DIGEST_AUTH_HEADER); in main() 213 p = strchr(challenge, '\r'); in main() 219 challenge, strlen(challenge), in main() 234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main() 235 if (challenge) { in main() 236 challenge += strlen(DIGEST_OK_HEADER); in main() 237 p = strchr(challenge, '\r'); in main() [all …]
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/sasl2-sys-0.1.12/sasl2/sample/ |
H A D | http_digest_client.c | 82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local 210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main() 211 if (!challenge) break; in main() 212 challenge += strlen(DIGEST_AUTH_HEADER); in main() 213 p = strchr(challenge, '\r'); in main() 219 challenge, strlen(challenge), in main() 234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main() 235 if (challenge) { in main() 236 challenge += strlen(DIGEST_OK_HEADER); in main() 237 p = strchr(challenge, '\r'); in main() [all …]
|
/dports/security/cyrus-sasl2-sql/cyrus-sasl-2.1.28/sample/ |
H A D | http_digest_client.c | 82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local 210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main() 211 if (!challenge) break; in main() 212 challenge += strlen(DIGEST_AUTH_HEADER); in main() 213 p = strchr(challenge, '\r'); in main() 219 challenge, strlen(challenge), in main() 234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main() 235 if (challenge) { in main() 236 challenge += strlen(DIGEST_OK_HEADER); in main() 237 p = strchr(challenge, '\r'); in main() [all …]
|
/dports/security/cyrus-sasl2-srp/cyrus-sasl-2.1.28/sample/ |
H A D | http_digest_client.c | 82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local 210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main() 211 if (!challenge) break; in main() 212 challenge += strlen(DIGEST_AUTH_HEADER); in main() 213 p = strchr(challenge, '\r'); in main() 219 challenge, strlen(challenge), in main() 234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main() 235 if (challenge) { in main() 236 challenge += strlen(DIGEST_OK_HEADER); in main() 237 p = strchr(challenge, '\r'); in main() [all …]
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/p2p/discover/v5wire/ |
H A D | encoding_test.go | 81 challenge := &Whoareyou{ 112 challenge := &Whoareyou{ 141 challenge := &Whoareyou{ 244 challenge := &Whoareyou{ 256 Node: challenge.Node, 257 sent: challenge.sent, 339 challenge: &challenge0A, 352 challenge: &challenge1A, 417 if challenge != nil { 527 var challenge *Whoareyou [all …]
|
/dports/sysutils/py-azure-cli/azure-cli-2.29.2/azure/cli/command_modules/keyvault/vendored_sdks/azure_keyvault_t1/ |
H A D | http_bearer_challenge.py | 15 def __init__(self, request_uri, challenge): argument 21 trimmed_challenge = self._validate_challenge(challenge) 74 def _validate_challenge(self, challenge): argument 77 if not challenge: 80 challenge = challenge.strip() 81 if not challenge.startswith(bearer_string): 84 return challenge[len(bearer_string):]
|
/dports/devel/py-azure-keyvault/azure-keyvault-1.1.0/azure/keyvault/ |
H A D | http_bearer_challenge.py | 14 def __init__(self, request_uri, challenge): argument 20 trimmed_challenge = self._validate_challenge(challenge) 73 def _validate_challenge(self, challenge): argument 76 if not challenge: 79 challenge = challenge.strip() 80 if not challenge.startswith(bearer_string): 83 return challenge[len(bearer_string):]
|
/dports/www/matomo/piwik/plugins/Tour/config/ |
H A D | test.php | 8 foreach ($challenges as &$challenge) { 9 $challenge['isSkipped'] = true; 10 $challenge['isCompleted'] = true; 15 foreach ($challenges as &$challenge) { 16 $challenge['isSkipped'] = false; 17 $challenge['isCompleted'] = false;
|
/dports/security/p5-Authen-NTLM/NTLM-1.09/ |
H A D | NTLM.pm | 212 sub challenge subroutine 214 my ( $self, $challenge) = @_; 215 $state = defined $challenge; 218 return ntlm($challenge); 275 my ($challenge) = @_; 285 $challenge =~ s/^\s*//; 286 $challenge = decode_base64($challenge); 368 my ($challenge) = @_; 372 my $original = $challenge; 376 $challenge = substr($challenge, 0, $msg2_hlen); [all …]
|
/dports/security/zaproxy/zaproxy-2.11.1/zap/src/main/java/org/zaproxy/zap/network/ |
H A D | ZapNTLMScheme.java | 84 private String challenge; field in ZapNTLMScheme 90 this.challenge = null; in ZapNTLMScheme() 116 public void processChallenge(String challenge) throws MalformedChallengeException { in processChallenge() argument 117 String s = AuthChallengeParser.extractScheme(challenge); in processChallenge() 119 throw new MalformedChallengeException("Invalid NTLM challenge: " + challenge); in processChallenge() 121 int i = challenge.indexOf(' '); in processChallenge() 134 this.challenge = challenge.substring(i, challenge.length()).trim(); in processChallenge() 163 this.challenge); in authenticate()
|
/dports/net/jcifs/jcifs_1.3.19/src/jcifs/smb/ |
H A D | NtlmChallenge.java | 27 public byte[] challenge; field in NtlmChallenge 30 NtlmChallenge( byte[] challenge, UniAddress dc ) { in NtlmChallenge() argument 31 this.challenge = challenge; in NtlmChallenge() 37 Hexdump.toHexString( challenge, 0, challenge.length * 2 ) + in toString()
|
/dports/mail/imapsync/imapsync-1d08afa/W/patches/ |
H A D | imapsync_1.592.kerio.diff | 21 + # receive a challenge 22 + my $challenge ; 25 + $challenge = $line ; 30 + chomp($challenge) ; 32 + # strip the challenge and return it for debuging 33 + $challenge = substr($challenge, 2) ; 34 + printf("%s: Challenge is '%s'\n", $Side, $challenge ) ; 36 + $challenge .= substr($password,0,24) ; 38 + my $md5pass = md5_hex($challenge) ; 39 + # show the challenge response and send it to the server
|