Home
last modified time | relevance | path

Searched refs:challenge (Results 251 – 275 of 14363) sorted by relevance

1...<<11121314151617181920>>...575

/dports/net-mgmt/pandorafms_console/pandorafms_console-6.0SP2/include/swiftmailer/classes/Swift/Transport/Esmtp/Auth/
H A DCramMd5Authenticator.php46 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334));
47 $challenge = base64_decode(substr($challenge, 4));
49 $username . ' ' . $this->_getResponse($password, $challenge)
64 * @param string $challenge
67 private function _getResponse($secret, $challenge) argument
82 $inner = pack('H32', md5($k_ipad . $challenge));
/dports/www/dolibarr13/dolibarr-13.0.5/htdocs/includes/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/
H A DCramMd5Authenticator.php40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334));
41 $challenge = base64_decode(substr($challenge, 4));
43 $username.' '.$this->getResponse($password, $challenge)
59 * @param string $challenge
63 private function getResponse($secret, $challenge) argument
76 $inner = pack('H32', md5($k_ipad.$challenge));
/dports/www/phpmyfaq/phpmyfaq/src/libs/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/
H A DCramMd5Authenticator.php40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334));
41 $challenge = base64_decode(substr($challenge, 4));
43 $username.' '.$this->_getResponse($password, $challenge)
59 * @param string $challenge
63 private function _getResponse($secret, $challenge) argument
76 $inner = pack('H32', md5($k_ipad.$challenge));
/dports/www/typo3-9/typo3_src-9.5.31/vendor/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/
H A DCramMd5Authenticator.php40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334));
41 $challenge = base64_decode(substr($challenge, 4));
43 $username.' '.$this->_getResponse($password, $challenge)
59 * @param string $challenge
63 private function _getResponse($secret, $challenge) argument
76 $inner = pack('H32', md5($k_ipad.$challenge));
/dports/www/webtrees/webtrees-1.7.18/webtrees/vendor/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/
H A DCramMd5Authenticator.php40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334));
41 $challenge = base64_decode(substr($challenge, 4));
43 $username.' '.$this->_getResponse($password, $challenge)
59 * @param string $challenge
63 private function _getResponse($secret, $challenge) argument
76 $inner = pack('H32', md5($k_ipad.$challenge));
/dports/www/kanboard/kanboard-1.2.21/vendor/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/
H A DCramMd5Authenticator.php40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334));
41 $challenge = base64_decode(substr($challenge, 4));
43 $username.' '.$this->_getResponse($password, $challenge)
59 * @param string $challenge
63 private function _getResponse($secret, $challenge) argument
76 $inner = pack('H32', md5($k_ipad.$challenge));
/dports/www/dolibarr/dolibarr-14.0.3/htdocs/includes/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/
H A DCramMd5Authenticator.php40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334));
41 $challenge = base64_decode(substr($challenge, 4));
43 $username.' '.$this->getResponse($password, $challenge)
59 * @param string $challenge
63 private function getResponse($secret, $challenge) argument
76 $inner = pack('H32', md5($k_ipad.$challenge));
/dports/www/itop/web/lib/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/
H A DCramMd5Authenticator.php40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334));
41 $challenge = base64_decode(substr($challenge, 4));
43 $username.' '.$this->_getResponse($password, $challenge)
59 * @param string $challenge
63 private function _getResponse($secret, $challenge) argument
76 $inner = pack('H32', md5($k_ipad.$challenge));
/dports/www/thirtybees/thirtybees-1.1.0/vendor/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/
H A DCramMd5Authenticator.php40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334));
41 $challenge = base64_decode(substr($challenge, 4));
43 $username.' '.$this->_getResponse($password, $challenge)
59 * @param string $challenge
63 private function _getResponse($secret, $challenge) argument
76 $inner = pack('H32', md5($k_ipad.$challenge));
/dports/www/orangehrm/orangehrm-4.9/symfony/lib/vendor/swiftmailer/swiftmailer/lib/classes/Swift/Transport/Esmtp/Auth/
H A DCramMd5Authenticator.php40 $challenge = $agent->executeCommand("AUTH CRAM-MD5\r\n", array(334));
41 $challenge = base64_decode(substr($challenge, 4));
43 $username.' '.$this->_getResponse($password, $challenge)
59 * @param string $challenge
63 private function _getResponse($secret, $challenge) argument
76 $inner = pack('H32', md5($k_ipad.$challenge));
/dports/security/cyrus-sasl2-gssapi/cyrus-sasl-2.1.28/sample/
H A Dhttp_digest_client.c82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local
210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main()
211 if (!challenge) break; in main()
212 challenge += strlen(DIGEST_AUTH_HEADER); in main()
213 p = strchr(challenge, '\r'); in main()
219 challenge, strlen(challenge), in main()
234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main()
235 if (challenge) { in main()
236 challenge += strlen(DIGEST_OK_HEADER); in main()
237 p = strchr(challenge, '\r'); in main()
[all …]
/dports/security/cyrus-sasl2-ldapdb/cyrus-sasl-2.1.28/sample/
H A Dhttp_digest_client.c82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local
210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main()
211 if (!challenge) break; in main()
212 challenge += strlen(DIGEST_AUTH_HEADER); in main()
213 p = strchr(challenge, '\r'); in main()
219 challenge, strlen(challenge), in main()
234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main()
235 if (challenge) { in main()
236 challenge += strlen(DIGEST_OK_HEADER); in main()
237 p = strchr(challenge, '\r'); in main()
[all …]
/dports/security/cyrus-sasl2-saslauthd/cyrus-sasl-2.1.28/sample/
H A Dhttp_digest_client.c82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local
210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main()
211 if (!challenge) break; in main()
212 challenge += strlen(DIGEST_AUTH_HEADER); in main()
213 p = strchr(challenge, '\r'); in main()
219 challenge, strlen(challenge), in main()
234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main()
235 if (challenge) { in main()
236 challenge += strlen(DIGEST_OK_HEADER); in main()
237 p = strchr(challenge, '\r'); in main()
[all …]
/dports/security/cyrus-sasl2/cyrus-sasl-2.1.28/sample/
H A Dhttp_digest_client.c82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local
210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main()
211 if (!challenge) break; in main()
212 challenge += strlen(DIGEST_AUTH_HEADER); in main()
213 p = strchr(challenge, '\r'); in main()
219 challenge, strlen(challenge), in main()
234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main()
235 if (challenge) { in main()
236 challenge += strlen(DIGEST_OK_HEADER); in main()
237 p = strchr(challenge, '\r'); in main()
[all …]
/dports/sysutils/vector/vector-0.10.0/cargo-crates/sasl2-sys-0.1.12/sasl2/sample/
H A Dhttp_digest_client.c82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local
210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main()
211 if (!challenge) break; in main()
212 challenge += strlen(DIGEST_AUTH_HEADER); in main()
213 p = strchr(challenge, '\r'); in main()
219 challenge, strlen(challenge), in main()
234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main()
235 if (challenge) { in main()
236 challenge += strlen(DIGEST_OK_HEADER); in main()
237 p = strchr(challenge, '\r'); in main()
[all …]
/dports/security/cyrus-sasl2-sql/cyrus-sasl-2.1.28/sample/
H A Dhttp_digest_client.c82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local
210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main()
211 if (!challenge) break; in main()
212 challenge += strlen(DIGEST_AUTH_HEADER); in main()
213 p = strchr(challenge, '\r'); in main()
219 challenge, strlen(challenge), in main()
234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main()
235 if (challenge) { in main()
236 challenge += strlen(DIGEST_OK_HEADER); in main()
237 p = strchr(challenge, '\r'); in main()
[all …]
/dports/security/cyrus-sasl2-srp/cyrus-sasl-2.1.28/sample/
H A Dhttp_digest_client.c82 char buffer[BUFFER_SIZE+1], *request, *challenge, *p; in main() local
210 challenge = strstr(buffer, DIGEST_AUTH_HEADER); in main()
211 if (!challenge) break; in main()
212 challenge += strlen(DIGEST_AUTH_HEADER); in main()
213 p = strchr(challenge, '\r'); in main()
219 challenge, strlen(challenge), in main()
234 challenge = strstr(buffer, DIGEST_OK_HEADER); in main()
235 if (challenge) { in main()
236 challenge += strlen(DIGEST_OK_HEADER); in main()
237 p = strchr(challenge, '\r'); in main()
[all …]
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/p2p/discover/v5wire/
H A Dencoding_test.go81 challenge := &Whoareyou{
112 challenge := &Whoareyou{
141 challenge := &Whoareyou{
244 challenge := &Whoareyou{
256 Node: challenge.Node,
257 sent: challenge.sent,
339 challenge: &challenge0A,
352 challenge: &challenge1A,
417 if challenge != nil {
527 var challenge *Whoareyou
[all …]
/dports/sysutils/py-azure-cli/azure-cli-2.29.2/azure/cli/command_modules/keyvault/vendored_sdks/azure_keyvault_t1/
H A Dhttp_bearer_challenge.py15 def __init__(self, request_uri, challenge): argument
21 trimmed_challenge = self._validate_challenge(challenge)
74 def _validate_challenge(self, challenge): argument
77 if not challenge:
80 challenge = challenge.strip()
81 if not challenge.startswith(bearer_string):
84 return challenge[len(bearer_string):]
/dports/devel/py-azure-keyvault/azure-keyvault-1.1.0/azure/keyvault/
H A Dhttp_bearer_challenge.py14 def __init__(self, request_uri, challenge): argument
20 trimmed_challenge = self._validate_challenge(challenge)
73 def _validate_challenge(self, challenge): argument
76 if not challenge:
79 challenge = challenge.strip()
80 if not challenge.startswith(bearer_string):
83 return challenge[len(bearer_string):]
/dports/www/matomo/piwik/plugins/Tour/config/
H A Dtest.php8 foreach ($challenges as &$challenge) {
9 $challenge['isSkipped'] = true;
10 $challenge['isCompleted'] = true;
15 foreach ($challenges as &$challenge) {
16 $challenge['isSkipped'] = false;
17 $challenge['isCompleted'] = false;
/dports/security/p5-Authen-NTLM/NTLM-1.09/
H A DNTLM.pm212 sub challenge subroutine
214 my ( $self, $challenge) = @_;
215 $state = defined $challenge;
218 return ntlm($challenge);
275 my ($challenge) = @_;
285 $challenge =~ s/^\s*//;
286 $challenge = decode_base64($challenge);
368 my ($challenge) = @_;
372 my $original = $challenge;
376 $challenge = substr($challenge, 0, $msg2_hlen);
[all …]
/dports/security/zaproxy/zaproxy-2.11.1/zap/src/main/java/org/zaproxy/zap/network/
H A DZapNTLMScheme.java84 private String challenge; field in ZapNTLMScheme
90 this.challenge = null; in ZapNTLMScheme()
116 public void processChallenge(String challenge) throws MalformedChallengeException { in processChallenge() argument
117 String s = AuthChallengeParser.extractScheme(challenge); in processChallenge()
119 throw new MalformedChallengeException("Invalid NTLM challenge: " + challenge); in processChallenge()
121 int i = challenge.indexOf(' '); in processChallenge()
134 this.challenge = challenge.substring(i, challenge.length()).trim(); in processChallenge()
163 this.challenge); in authenticate()
/dports/net/jcifs/jcifs_1.3.19/src/jcifs/smb/
H A DNtlmChallenge.java27 public byte[] challenge; field in NtlmChallenge
30 NtlmChallenge( byte[] challenge, UniAddress dc ) { in NtlmChallenge() argument
31 this.challenge = challenge; in NtlmChallenge()
37 Hexdump.toHexString( challenge, 0, challenge.length * 2 ) + in toString()
/dports/mail/imapsync/imapsync-1d08afa/W/patches/
H A Dimapsync_1.592.kerio.diff21 + # receive a challenge
22 + my $challenge ;
25 + $challenge = $line ;
30 + chomp($challenge) ;
32 + # strip the challenge and return it for debuging
33 + $challenge = substr($challenge, 2) ;
34 + printf("%s: Challenge is '%s'\n", $Side, $challenge ) ;
36 + $challenge .= substr($password,0,24) ;
38 + my $md5pass = md5_hex($challenge) ;
39 + # show the challenge response and send it to the server

1...<<11121314151617181920>>...575