/dports/security/acmetool/acmetool-0.2.1/vendor/github.com/hlandau/acmetool/_doc/contrib/ |
H A D | tinydns.hook | 155 CHALLENGE="${2}" 163 if [ -z "${CHALLENGE}" ]; then 178 HOST="${1}"; DOMAIN="${2}"; CHALLENGE="${3}" 181 [ "${TXT_RECORD}" = "${CHALLENGE}" ] && return 0 # challenge already there 183 set_txt_record "${TXT_HOST}" "${CHALLENGE}" 184 reload "${TXT_HOST}" "${CHALLENGE}" \ 190 HOST="${1}"; DOMAIN="${2}"; CHALLENGE="${3}" 192 [ "$(get_txt_record "${TXT_HOST}" )" = "${CHALLENGE}" ] 195 || (set_txt_record "${TXT_HOST}" "${CHALLENGE}" ; update; return 1) 208 CHALLENGE="${4}" [all …]
|
/dports/security/acmetool/acmetool-0.2.1/_doc/contrib/ |
H A D | tinydns.hook | 155 CHALLENGE="${2}" 163 if [ -z "${CHALLENGE}" ]; then 178 HOST="${1}"; DOMAIN="${2}"; CHALLENGE="${3}" 181 [ "${TXT_RECORD}" = "${CHALLENGE}" ] && return 0 # challenge already there 183 set_txt_record "${TXT_HOST}" "${CHALLENGE}" 184 reload "${TXT_HOST}" "${CHALLENGE}" \ 190 HOST="${1}"; DOMAIN="${2}"; CHALLENGE="${3}" 192 [ "$(get_txt_record "${TXT_HOST}" )" = "${CHALLENGE}" ] 195 || (set_txt_record "${TXT_HOST}" "${CHALLENGE}" ; update; return 1) 208 CHALLENGE="${4}" [all …]
|
/dports/irc/ratbox-respond/ratbox-respond-1.0/client-scripts/ |
H A D | challenge-epic.irc | 16 # Location and filename of the CHALLENGE respond binary 19 # Location and filename of the CHALLENGE private key 22 # Require a CHALLENGE passphrase (0 = no | 1 = yes) 41 input -noecho "Enter passphrase for CHALLENGE: " {
|
/dports/irc/ircd-ratbox/ircd-ratbox-3.0.10/help/opers/ |
H A D | challenge | 1 CHALLENGE <nick|+response> 3 CHALLENGE is used in the RSA controlled 4 oper {} system. CHALLENGE requires you to
|
/dports/irc/ircd-ratbox-devel/ircd-ratbox-3.0.7/help/opers/ |
H A D | challenge | 1 CHALLENGE <nick|+response> 3 CHALLENGE is used in the RSA controlled 4 oper {} system. CHALLENGE requires you to
|
/dports/devel/poco/poco-1.10.1-all/Net/testsuite/src/ |
H A D | NTLMCredentialsTest.cpp | 61 static const unsigned char CHALLENGE[] = {0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef}; in testLMv2Response() local 64 std::vector<unsigned char> challenge(CHALLENGE, CHALLENGE + 8); in testLMv2Response() 77 static const unsigned char CHALLENGE[] = {0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef}; in testNTLMv2Response() local 95 std::vector<unsigned char> challenge(CHALLENGE, CHALLENGE + 8); in testNTLMv2Response()
|
/dports/net/gnu-radius/radius-1.6.1/radscm/ |
H A D | rscm_hash.c | 98 (SCM PASSWORD, SCM CHALLENGE), 104 SCM_ASSERT(scm_is_string(CHALLENGE), CHALLENGE, SCM_ARG2, FUNC_NAME); 106 scm_i_string_chars(CHALLENGE),
|
/dports/devel/py-curio/curio-1.5/curio/ |
H A D | channel.py | 31 CHALLENGE = mpc.CHALLENGE # b'#CHALLENGE#' variable 170 await self.send_bytes(CHALLENGE + message) 181 assert message[:len(CHALLENGE)] == CHALLENGE, f'message = {message!r}' 182 message = message[len(CHALLENGE):]
|
/dports/www/zend-framework/ZendFramework-2.4.13/library/Zend/Captcha/ |
H A D | ReCaptcha.php | 28 protected $CHALLENGE = 'recaptcha_challenge_field'; variable in Zend\\Captcha\\ReCaptcha 215 if (empty($value[$this->CHALLENGE]) || empty($value[$this->RESPONSE])) { 222 $res = $service->verify($value[$this->CHALLENGE], $value[$this->RESPONSE]);
|
/dports/net/hostapd/hostapd-2.9/src/eap_server/ |
H A D | eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator 38 case CHALLENGE: in eap_sake_state_txt() 68 data->state = CHALLENGE; in eap_sake_init() 222 case CHALLENGE: in eap_sake_buildReq() 271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check() 297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity() 309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator 38 case CHALLENGE: in eap_sake_state_txt() 68 data->state = CHALLENGE; in eap_sake_init() 222 case CHALLENGE: in eap_sake_buildReq() 271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check() 297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity() 309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator 38 case CHALLENGE: in eap_sake_state_txt() 68 data->state = CHALLENGE; in eap_sake_init() 222 case CHALLENGE: in eap_sake_buildReq() 271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check() 297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity() 309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator 38 case CHALLENGE: in eap_sake_state_txt() 68 data->state = CHALLENGE; in eap_sake_init() 222 case CHALLENGE: in eap_sake_buildReq() 271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check() 297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity() 309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator 38 case CHALLENGE: in eap_sake_state_txt() 68 data->state = CHALLENGE; in eap_sake_init() 222 case CHALLENGE: in eap_sake_buildReq() 271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check() 297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity() 309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
|
/dports/games/tomenet/tomenet-4.6.0/src/updater/updater/dl_posix/modules/ |
H A D | mediafire.sh | 262 local FORM_CAPTCHA PUBKEY CHALLENGE ID RESP CAPTCHA_DATA 272 { read WORD; read CHALLENGE; read ID; } <<< "$RESP" 274 CAPTCHA_DATA="-d recaptcha_challenge_field=$CHALLENGE -d recaptcha_response_field=$WORD" 281 { read CHALLENGE; read ID; } <<< "$RESP" 283 … CAPTCHA_DATA="--data-urlencode adcopy_challenge=$CHALLENGE -d adcopy_response=manual_challenge"
|
/dports/security/py-stem/stem-1.8.0/test/unit/client/ |
H A D | cell.py | 29 CHALLENGE = b'\x89Y\t\x99\xb2\x1e\xd9*V\xb6\x1bn\n\x05\xd8/\xe3QH\x85\x13Z\x17\xfc\x1c\x00{\xa9\xae… variable 88 b'\x00\x00\x82\x00\x26' + CHALLENGE + b'\x00\x02\x00\x01\x00\x03': (CHALLENGE, [1, 3], b'', 2), 89 …b'\x00\x00\x82\x00\x28' + CHALLENGE + b'\x00\x02\x00\x01\x00\x03' + b'\x01\x02': (CHALLENGE, [1, 3… 348 …payload of 38 bytes, but only had 16', Cell.pop, b'\x00\x00\x82\x00&' + CHALLENGE[:10] + b'\x00\x0… 349 …methods, but only had 4 bytes for it', Cell.pop, b'\x00\x00\x82\x00&' + CHALLENGE + b'\x00\x03\x00…
|
/dports/irc/srain/srain-1.1.0/doc/ |
H A D | support.rst | 64 SASL v3.1 PLAIN,ECDSA-NIST256P-CHALLENGE 65 SASL v3.2 PLAIN,ECDSA-NIST256P-CHALLENGE
|
/dports/lang/python27/Python-2.7.18/Lib/multiprocessing/ |
H A D | connection.py | 412 CHALLENGE = b'#CHALLENGE#' variable 420 connection.send_bytes(CHALLENGE + message) 433 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 434 message = message[len(CHALLENGE):]
|
/dports/lang/python-legacy/Python-2.7.18/Lib/multiprocessing/ |
H A D | connection.py | 412 CHALLENGE = b'#CHALLENGE#' variable 420 connection.send_bytes(CHALLENGE + message) 433 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 434 message = message[len(CHALLENGE):]
|
/dports/devel/py-multiprocess/multiprocess-0.70.12.2/py3.2/multiprocess/ |
H A D | connection.py | 418 CHALLENGE = b'#CHALLENGE#' variable 426 connection.send_bytes(CHALLENGE + message) 439 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 440 message = message[len(CHALLENGE):]
|
/dports/devel/py-multiprocess/multiprocess-0.70.12.2/py2.7/multiprocess/ |
H A D | connection.py | 418 CHALLENGE = b'#CHALLENGE#' variable 426 connection.send_bytes(CHALLENGE + message) 439 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 440 message = message[len(CHALLENGE):]
|
/dports/devel/py-multiprocess/multiprocess-0.70.12.2/pypy2.7/multiprocess/ |
H A D | connection.py | 418 CHALLENGE = b'#CHALLENGE#' variable 426 connection.send_bytes(CHALLENGE + message) 439 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 440 message = message[len(CHALLENGE):]
|
/dports/devel/py-multiprocess/multiprocess-0.70.12.2/py2.6/multiprocess/ |
H A D | connection.py | 369 CHALLENGE = b'#CHALLENGE#' variable 377 connection.send_bytes(CHALLENGE + message) 390 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 391 message = message[len(CHALLENGE):]
|
/dports/devel/py-multiprocess/multiprocess-0.70.12.2/py3.1/multiprocess/ |
H A D | connection.py | 395 CHALLENGE = b'#CHALLENGE#' variable 403 connection.send_bytes(CHALLENGE + message) 416 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 417 message = message[len(CHALLENGE):]
|
/dports/security/openssl-unsafe/openssl-c9ba19c/bugs/ |
H A D | sslref.dif | 5 KEY-MATERIAL-0 = MD5[MASTER-KEY,"0",CHALLENGE,CONNECTION-ID] 7 KEY-MATERIAL-0 = MD5[MASTER-KEY,CHALLENGE,CONNECTION-ID]
|