Home
last modified time | relevance | path

Searched refs:CHALLENGE (Results 1 – 25 of 368) sorted by relevance

12345678910>>...15

/dports/security/acmetool/acmetool-0.2.1/vendor/github.com/hlandau/acmetool/_doc/contrib/
H A Dtinydns.hook155 CHALLENGE="${2}"
163 if [ -z "${CHALLENGE}" ]; then
178 HOST="${1}"; DOMAIN="${2}"; CHALLENGE="${3}"
181 [ "${TXT_RECORD}" = "${CHALLENGE}" ] && return 0 # challenge already there
183 set_txt_record "${TXT_HOST}" "${CHALLENGE}"
184 reload "${TXT_HOST}" "${CHALLENGE}" \
190 HOST="${1}"; DOMAIN="${2}"; CHALLENGE="${3}"
192 [ "$(get_txt_record "${TXT_HOST}" )" = "${CHALLENGE}" ]
195 || (set_txt_record "${TXT_HOST}" "${CHALLENGE}" ; update; return 1)
208 CHALLENGE="${4}"
[all …]
/dports/security/acmetool/acmetool-0.2.1/_doc/contrib/
H A Dtinydns.hook155 CHALLENGE="${2}"
163 if [ -z "${CHALLENGE}" ]; then
178 HOST="${1}"; DOMAIN="${2}"; CHALLENGE="${3}"
181 [ "${TXT_RECORD}" = "${CHALLENGE}" ] && return 0 # challenge already there
183 set_txt_record "${TXT_HOST}" "${CHALLENGE}"
184 reload "${TXT_HOST}" "${CHALLENGE}" \
190 HOST="${1}"; DOMAIN="${2}"; CHALLENGE="${3}"
192 [ "$(get_txt_record "${TXT_HOST}" )" = "${CHALLENGE}" ]
195 || (set_txt_record "${TXT_HOST}" "${CHALLENGE}" ; update; return 1)
208 CHALLENGE="${4}"
[all …]
/dports/irc/ratbox-respond/ratbox-respond-1.0/client-scripts/
H A Dchallenge-epic.irc16 # Location and filename of the CHALLENGE respond binary
19 # Location and filename of the CHALLENGE private key
22 # Require a CHALLENGE passphrase (0 = no | 1 = yes)
41 input -noecho "Enter passphrase for CHALLENGE: " {
/dports/irc/ircd-ratbox/ircd-ratbox-3.0.10/help/opers/
H A Dchallenge1 CHALLENGE <nick|+response>
3 CHALLENGE is used in the RSA controlled
4 oper {} system. CHALLENGE requires you to
/dports/irc/ircd-ratbox-devel/ircd-ratbox-3.0.7/help/opers/
H A Dchallenge1 CHALLENGE <nick|+response>
3 CHALLENGE is used in the RSA controlled
4 oper {} system. CHALLENGE requires you to
/dports/devel/poco/poco-1.10.1-all/Net/testsuite/src/
H A DNTLMCredentialsTest.cpp61 static const unsigned char CHALLENGE[] = {0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef}; in testLMv2Response() local
64 std::vector<unsigned char> challenge(CHALLENGE, CHALLENGE + 8); in testLMv2Response()
77 static const unsigned char CHALLENGE[] = {0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef}; in testNTLMv2Response() local
95 std::vector<unsigned char> challenge(CHALLENGE, CHALLENGE + 8); in testNTLMv2Response()
/dports/net/gnu-radius/radius-1.6.1/radscm/
H A Drscm_hash.c98 (SCM PASSWORD, SCM CHALLENGE),
104 SCM_ASSERT(scm_is_string(CHALLENGE), CHALLENGE, SCM_ARG2, FUNC_NAME);
106 scm_i_string_chars(CHALLENGE),
/dports/devel/py-curio/curio-1.5/curio/
H A Dchannel.py31 CHALLENGE = mpc.CHALLENGE # b'#CHALLENGE#' variable
170 await self.send_bytes(CHALLENGE + message)
181 assert message[:len(CHALLENGE)] == CHALLENGE, f'message = {message!r}'
182 message = message[len(CHALLENGE):]
/dports/www/zend-framework/ZendFramework-2.4.13/library/Zend/Captcha/
H A DReCaptcha.php28 protected $CHALLENGE = 'recaptcha_challenge_field'; variable in Zend\\Captcha\\ReCaptcha
215 if (empty($value[$this->CHALLENGE]) || empty($value[$this->RESPONSE])) {
222 $res = $service->verify($value[$this->CHALLENGE], $value[$this->RESPONSE]);
/dports/net/hostapd/hostapd-2.9/src/eap_server/
H A Deap_server_sake.c18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator
38 case CHALLENGE: in eap_sake_state_txt()
68 data->state = CHALLENGE; in eap_sake_init()
222 case CHALLENGE: in eap_sake_buildReq()
271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check()
297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity()
309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/
H A Deap_server_sake.c18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator
38 case CHALLENGE: in eap_sake_state_txt()
68 data->state = CHALLENGE; in eap_sake_init()
222 case CHALLENGE: in eap_sake_buildReq()
271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check()
297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity()
309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_sake.c18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator
38 case CHALLENGE: in eap_sake_state_txt()
68 data->state = CHALLENGE; in eap_sake_init()
222 case CHALLENGE: in eap_sake_buildReq()
271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check()
297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity()
309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_sake.c18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator
38 case CHALLENGE: in eap_sake_state_txt()
68 data->state = CHALLENGE; in eap_sake_init()
222 case CHALLENGE: in eap_sake_buildReq()
271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check()
297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity()
309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/
H A Deap_server_sake.c18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator
38 case CHALLENGE: in eap_sake_state_txt()
68 data->state = CHALLENGE; in eap_sake_init()
222 case CHALLENGE: in eap_sake_buildReq()
271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) in eap_sake_check()
297 eap_sake_state(data, CHALLENGE); in eap_sake_process_identity()
309 if (data->state != CHALLENGE) in eap_sake_process_challenge()
/dports/games/tomenet/tomenet-4.6.0/src/updater/updater/dl_posix/modules/
H A Dmediafire.sh262 local FORM_CAPTCHA PUBKEY CHALLENGE ID RESP CAPTCHA_DATA
272 { read WORD; read CHALLENGE; read ID; } <<< "$RESP"
274 CAPTCHA_DATA="-d recaptcha_challenge_field=$CHALLENGE -d recaptcha_response_field=$WORD"
281 { read CHALLENGE; read ID; } <<< "$RESP"
283 … CAPTCHA_DATA="--data-urlencode adcopy_challenge=$CHALLENGE -d adcopy_response=manual_challenge"
/dports/security/py-stem/stem-1.8.0/test/unit/client/
H A Dcell.py29 CHALLENGE = b'\x89Y\t\x99\xb2\x1e\xd9*V\xb6\x1bn\n\x05\xd8/\xe3QH\x85\x13Z\x17\xfc\x1c\x00{\xa9\xae… variable
88 b'\x00\x00\x82\x00\x26' + CHALLENGE + b'\x00\x02\x00\x01\x00\x03': (CHALLENGE, [1, 3], b'', 2),
89 …b'\x00\x00\x82\x00\x28' + CHALLENGE + b'\x00\x02\x00\x01\x00\x03' + b'\x01\x02': (CHALLENGE, [1, 3…
348 …payload of 38 bytes, but only had 16', Cell.pop, b'\x00\x00\x82\x00&' + CHALLENGE[:10] + b'\x00\x0…
349 …methods, but only had 4 bytes for it', Cell.pop, b'\x00\x00\x82\x00&' + CHALLENGE + b'\x00\x03\x00…
/dports/irc/srain/srain-1.1.0/doc/
H A Dsupport.rst64 SASL v3.1 PLAIN,ECDSA-NIST256P-CHALLENGE
65 SASL v3.2 PLAIN,ECDSA-NIST256P-CHALLENGE
/dports/lang/python27/Python-2.7.18/Lib/multiprocessing/
H A Dconnection.py412 CHALLENGE = b'#CHALLENGE#' variable
420 connection.send_bytes(CHALLENGE + message)
433 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
434 message = message[len(CHALLENGE):]
/dports/lang/python-legacy/Python-2.7.18/Lib/multiprocessing/
H A Dconnection.py412 CHALLENGE = b'#CHALLENGE#' variable
420 connection.send_bytes(CHALLENGE + message)
433 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
434 message = message[len(CHALLENGE):]
/dports/devel/py-multiprocess/multiprocess-0.70.12.2/py3.2/multiprocess/
H A Dconnection.py418 CHALLENGE = b'#CHALLENGE#' variable
426 connection.send_bytes(CHALLENGE + message)
439 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
440 message = message[len(CHALLENGE):]
/dports/devel/py-multiprocess/multiprocess-0.70.12.2/py2.7/multiprocess/
H A Dconnection.py418 CHALLENGE = b'#CHALLENGE#' variable
426 connection.send_bytes(CHALLENGE + message)
439 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
440 message = message[len(CHALLENGE):]
/dports/devel/py-multiprocess/multiprocess-0.70.12.2/pypy2.7/multiprocess/
H A Dconnection.py418 CHALLENGE = b'#CHALLENGE#' variable
426 connection.send_bytes(CHALLENGE + message)
439 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
440 message = message[len(CHALLENGE):]
/dports/devel/py-multiprocess/multiprocess-0.70.12.2/py2.6/multiprocess/
H A Dconnection.py369 CHALLENGE = b'#CHALLENGE#' variable
377 connection.send_bytes(CHALLENGE + message)
390 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
391 message = message[len(CHALLENGE):]
/dports/devel/py-multiprocess/multiprocess-0.70.12.2/py3.1/multiprocess/
H A Dconnection.py395 CHALLENGE = b'#CHALLENGE#' variable
403 connection.send_bytes(CHALLENGE + message)
416 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
417 message = message[len(CHALLENGE):]
/dports/security/openssl-unsafe/openssl-c9ba19c/bugs/
H A Dsslref.dif5 KEY-MATERIAL-0 = MD5[MASTER-KEY,"0",CHALLENGE,CONNECTION-ID]
7 KEY-MATERIAL-0 = MD5[MASTER-KEY,CHALLENGE,CONNECTION-ID]

12345678910>>...15