Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 5531) sorted by relevance

12345678910>>...222

/dports/irc/ratbox-respond/ratbox-respond-1.0/client-scripts/
H A Dchallenge-epic.irc23 @ challenge.pass = 1;
30 quote challenge $nick;
34 @ challenge.recv #= *1;
38 if (fexist($challenge.bin) == 1 && fexist($challenge.key) == 1) {
39 ^exec -name challenge $challenge.bin $challenge.key;
40 if (challenge.pass) {
42 ^msg %challenge $*;
43 ^msg %challenge $challenge.recv;
46 ^msg %challenge \n;
47 ^msg %challenge $challenge.recv;
[all …]
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/ooni/psiphon/oopsi/github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/upstreamproxy/go-ntlm/ntlm/
H A Dmessage_challenge_test.go21 challenge, err := ParseChallengeMessage(challengeData)
23 if err != nil || challenge == nil {
27 …if challenge.TargetName.Len != 0 || challenge.TargetName.MaxLen != 0 || challenge.TargetName.Offse…
28 …tf("TargetName Len:%v MaxLen:%v Offset:%v", challenge.TargetName.Len, challenge.TargetName.MaxLen,…
32 if challenge.NegotiateFlags != uint32(3801645811) {
38 hex := hex.EncodeToString(challenge.ServerChallenge)
42 …if challenge.Version.ProductMajorVersion != 5 || challenge.Version.ProductMinorVersion != 2 || cha…
46 if len(challenge.Payload) != int(challenge.TargetInfoPayloadStruct.Len) {
50 challenge.String()
52 outBytes := challenge.Bytes()
[all …]
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/ooni/psiphon/oopsi/github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/upstreamproxy/go-ntlm/ntlm/
H A Dmessage_challenge_test.go21 challenge, err := ParseChallengeMessage(challengeData)
23 if err != nil || challenge == nil {
27 …if challenge.TargetName.Len != 0 || challenge.TargetName.MaxLen != 0 || challenge.TargetName.Offse…
28 …tf("TargetName Len:%v MaxLen:%v Offset:%v", challenge.TargetName.Len, challenge.TargetName.MaxLen,…
32 if challenge.NegotiateFlags != uint32(3801645811) {
38 hex := hex.EncodeToString(challenge.ServerChallenge)
42 …if challenge.Version.ProductMajorVersion != 5 || challenge.Version.ProductMinorVersion != 2 || cha…
46 if len(challenge.Payload) != int(challenge.TargetInfoPayloadStruct.Len) {
50 challenge.String()
52 outBytes := challenge.Bytes()
[all …]
/dports/finance/odoo/odoo-19d77c2a03335eb95a686bd69a1b56b38e87d609/odoo/addons/gamification/models/
H A Dchallenge.py143 for challenge in self:
263 for challenge in self:
314 for challenge in self:
329 …(start_date, end_date) = start_end_date_for_period(challenge.period, challenge.start_date, challen…
551 challenge = self
622 …(start_date, end_date) = start_end_date_for_period(challenge.period, challenge.start_date, challen…
627 if challenge.reward_id and (challenge_ended or challenge.reward_realtime):
647 challenge._reward_user(user, challenge.reward_id)
671 challenge._reward_user(first_user, challenge.reward_first_id)
682 challenge._reward_user(second_user, challenge.reward_second_id)
[all …]
/dports/security/pear-Auth_SASL2/Auth_SASL2-0.2.0/Auth/SASL2/
H A DDigestMD5.php57 * @param string $challenge The digest challenge sent by the server
64 function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = '') argument
66 $challenge = $this->_parseChallenge($challenge);
72 if (!empty($challenge)) {
75 …$response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce…
77 if ($challenge['realm']) {
79 …onse=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $res…
91 * @param string $challenge The digest challenge
96 function _parseChallenge($challenge) argument
103 $challenge = substr($challenge, strlen($matches[0]) + 1);
[all …]
/dports/lang/mono/mono-5.10.1.57/mcs/class/referencesource/System/net/System/Net/
H A DAuthenticationManager.cs275 if (challenge != null && signature != null && challenge.Length >= signature.Length) in FindSubstringNotInQuotes()
281 if (challenge[i] == '\"') in FindSubstringNotInQuotes()
289 … if (i == challenge.Length - 1 || (challenge[i] == '\"' && firstQuote > secondQuote)) in FindSubstringNotInQuotes()
293 if (i == challenge.Length - 1) in FindSubstringNotInQuotes()
294 firstQuote = challenge.Length; in FindSubstringNotInQuotes()
309 … if ((index == 0 || challenge[index - 1] == ' ' || challenge[index - 1] == ',') && in FindSubstringNotInQuotes()
310 …(index + signature.Length == challenge.Length || challenge[index + signature.Length] == ' ' || cha… in FindSubstringNotInQuotes()
366 if (challenge != null && realOffset < challenge.Length) in SplitNoQuotes()
370 for (int i = realOffset; i < challenge.Length; i++) in SplitNoQuotes()
375 …if (firstQuote > secondQuote && challenge[i] == '\\' && i + 1 < challenge.Length && challenge[i + … in SplitNoQuotes()
[all …]
/dports/security/p5-Crypt-LE/Crypt-LE-0.38/lib/Crypt/LE/Challenge/
H A DSimple.pm40 my ($challenge, $params) = @_;
42 …$challenge->{logger}->info("Processing the 'http' challenge for '$challenge->{domain}' with " . __…
43 … for '$challenge->{domain}' requires a file '$challenge->{token}' in '/.well-known/acme-challenge/…
56 my ($challenge, $params) = @_;
58 …$challenge->{logger}->info("Processing the 'dns' challenge for '$challenge->{domain}' with " . __P…
59 my $value = encode_base64url(sha256("$challenge->{token}.$challenge->{fingerprint}"));
60 my (undef, $host) = $challenge->{domain}=~/^(\*\.)?(.+)$/;
61 print "Challenge for '$challenge->{domain}' requires the following DNS record to be created:\n";
/dports/mail/roundcube/roundcubemail-1.5.1/vendor/pear/auth_sasl/Auth/SASL/
H A DDigestMD5.php57 * @param string $challenge The digest challenge sent by the server
64 function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = '') argument
66 $challenge = $this->_parseChallenge($challenge);
72 if (!empty($challenge)) {
75 …$response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce…
77 if ($challenge['realm']) {
79 …onse=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $res…
91 * @param string $challenge The digest challenge
96 function _parseChallenge($challenge) argument
103 $challenge = substr($challenge, strlen($matches[0]) + 1);
[all …]
/dports/deskutils/egroupware/egroupware/vendor/egroupware/z-push-dev/src/backend/imap/Auth/SASL/
H A DDigestMD5.php55 * @param string $challenge The digest challenge sent by the server
62 function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = '') argument
64 $challenge = $this->_parseChallenge($challenge);
70 if (!empty($challenge)) {
73 …$response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce…
75 if ($challenge['realm']) {
77 …onse=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $res…
89 * @param string $challenge The digest challenge
94 function _parseChallenge($challenge) argument
101 $challenge = substr($challenge, strlen($matches[0]) + 1);
[all …]
/dports/deskutils/egroupware/egroupware/vendor/pear/auth_sasl/Auth/SASL/
H A DDigestMD5.php57 * @param string $challenge The digest challenge sent by the server
64 function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = '') argument
66 $challenge = $this->_parseChallenge($challenge);
72 if (!empty($challenge)) {
75 …$response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce…
77 if ($challenge['realm']) {
79 …onse=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $res…
91 * @param string $challenge The digest challenge
96 function _parseChallenge($challenge) argument
103 $challenge = substr($challenge, strlen($matches[0]) + 1);
[all …]
/dports/security/pear-Auth_SASL/Auth_SASL-1.1.0/Auth/SASL/
H A DDigestMD5.php57 * @param string $challenge The digest challenge sent by the server
64 function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = '') argument
66 $challenge = $this->_parseChallenge($challenge);
72 if (!empty($challenge)) {
75 …$response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce…
77 if ($challenge['realm']) {
79 …onse=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $res…
91 * @param string $challenge The digest challenge
96 function _parseChallenge($challenge) argument
103 $challenge = substr($challenge, strlen($matches[0]) + 1);
[all …]
/dports/www/groupoffice/groupoffice-6.4.231-php-71/go/vendor/pear/Auth/SASL/
H A DDigestMD5.php57 * @param string $challenge The digest challenge sent by the server
66 $challenge = $this->parseChallenge($challenge);
72 if (!empty($challenge)) {
75 …$response_value = $this->getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce'…
77 if ($challenge['realm']) {
79 …onse=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $res…
91 * @param string $challenge The digest challenge
96 private function parseChallenge($challenge) argument
99 while (preg_match('/^([a-z-]+)=("[^"]+(?<!\\\)"|[^,]+)/i', $challenge, $matches)) {
103 $challenge = substr($challenge, strlen($matches[0]) + 1);
[all …]
/dports/www/groupoffice/groupoffice-6.4.231-php-71/modules/z-push/vendor/z-push/backend/imap/Auth/SASL/
H A DDigestMD5.php55 * @param string $challenge The digest challenge sent by the server
62 function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = '') argument
64 $challenge = $this->_parseChallenge($challenge);
70 if (!empty($challenge)) {
73 …$response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce…
75 if ($challenge['realm']) {
77 …onse=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $res…
89 * @param string $challenge The digest challenge
94 function _parseChallenge($challenge) argument
101 $challenge = substr($challenge, strlen($matches[0]) + 1);
[all …]
/dports/www/tikiwiki/tiki-21.2/vendor_bundled/vendor/candy-chat/xmpp-prebind-php/lib/Auth/SASL/
H A DDigestMD5.php57 * @param string $challenge The digest challenge sent by the server
66 $challenge = $this->parseChallenge($challenge);
72 if (!empty($challenge)) {
75 …$response_value = $this->getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce'…
77 if ($challenge['realm']) {
79 …onse=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $res…
91 * @param string $challenge The digest challenge
96 private function parseChallenge($challenge) argument
99 while (preg_match('/^([a-z-]+)=("[^"]+(?<!\\\)"|[^,]+)/i', $challenge, $matches)) {
103 $challenge = substr($challenge, strlen($matches[0]) + 1);
[all …]
/dports/databases/mantis/mantisbt-2.25.2/plugins/EmailReporting/core_pear/Auth/SASL/
H A DDigestMD5.php59 * @param string $challenge The digest challenge sent by the server
66 function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = '') argument
68 $challenge = $this->_parseChallenge($challenge);
74 if (!empty($challenge)) {
77 …$response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce…
79 if ($challenge['realm']) {
81 …onse=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $res…
93 * @param string $challenge The digest challenge
98 function _parseChallenge($challenge) argument
105 $challenge = substr($challenge, strlen($matches[0]) + 1);
[all …]
/dports/www/osticket/upload/include/pear/Auth/SASL/
H A DDigestMD5.php57 * @param string $challenge The digest challenge sent by the server
64 function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = '') argument
66 $challenge = $this->_parseChallenge($challenge);
72 if (!empty($challenge)) {
75 …$response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce…
77 if ($challenge['realm']) {
79 …onse=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $res…
91 * @param string $challenge The digest challenge
96 function _parseChallenge($challenge) argument
103 $challenge = substr($challenge, strlen($matches[0]) + 1);
[all …]
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/crypto/tests/unit/plugins/module_utils/acme/
H A Dtest_challenges.py47 assert challenge.data == data
48 assert challenge.type == 'type'
49 assert challenge.url == 'xxx'
51 assert challenge.token is None
60 assert challenge.data == data
61 assert challenge.type == 'type'
62 assert challenge.url == 'xxx'
64 assert challenge.token == 'foo'
74 assert challenge.data == data
76 assert challenge.url == 'xxx'
[all …]
/dports/mail/squirrelmail/squirrelmail.stable/squirrelmail/functions/
H A Dauth.php142 $challenge=base64_decode($challenge);
227 $challenge=base64_decode($challenge);
229 while (!empty($challenge)) {
231 $challenge=substr($challenge,1);
233 $key=explode('=',$challenge,2);
234 $challenge=$key[1];
236 if ($challenge[0] == '"') {
239 $challenge=substr($challenge,1);
241 $val=explode('"',$challenge,2);
252 $challenge=$val[1];
[all …]
/dports/www/p5-Gungho/Gungho-0.09008/lib/Gungho/Component/
H A DAuthentication.pm34 my @challenge = $res->header($ch_header);
36 if (! @challenge) {
42 for my $challenge (@challenge) {
43 $challenge =~ tr/,/;/; # "," is used to separate auth-params!!
44 ($challenge) = HTTP::Headers::Util::split_header_words($challenge);
45 my $scheme = lc(shift(@$challenge));
46 shift(@$challenge); # no value
47 $challenge = { @$challenge }; # make rest into a hash
48 for (keys %$challenge) { # make sure all keys are lower case
49 $challenge->{lc $_} = delete $challenge->{$_};
[all …]
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/http/
H A Dhttp_auth_challenge_tokenizer_unittest.cc12 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), in TEST() local
17 EXPECT_EQ(std::string("basic"), challenge.auth_scheme()); in TEST()
28 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), in TEST() local
33 EXPECT_EQ(std::string("basic"), challenge.auth_scheme()); in TEST()
44 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), in TEST() local
49 EXPECT_EQ(std::string("basic"), challenge.auth_scheme()); in TEST()
65 EXPECT_EQ(std::string("basic"), challenge.auth_scheme()); in TEST()
82 EXPECT_EQ(std::string("basic"), challenge.auth_scheme()); in TEST()
118 HttpAuthChallengeTokenizer challenge( in TEST() local
157 HttpAuthChallengeTokenizer challenge( in TEST() local
[all …]
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/http/
H A Dhttp_auth_challenge_tokenizer_unittest.cc12 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), in TEST() local
17 EXPECT_EQ(std::string("basic"), challenge.auth_scheme()); in TEST()
28 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), in TEST() local
33 EXPECT_EQ(std::string("basic"), challenge.auth_scheme()); in TEST()
44 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), in TEST() local
49 EXPECT_EQ(std::string("basic"), challenge.auth_scheme()); in TEST()
65 EXPECT_EQ(std::string("basic"), challenge.auth_scheme()); in TEST()
82 EXPECT_EQ(std::string("basic"), challenge.auth_scheme()); in TEST()
118 HttpAuthChallengeTokenizer challenge( in TEST() local
157 HttpAuthChallengeTokenizer challenge( in TEST() local
[all …]
/dports/games/stendhal/stendhal-1.35/tests/games/stendhal/server/core/rp/pvp/
H A DPlayerVsPlayerChallengeManagerTest.java38 assertThat(challenge, notNullValue()); in testCreateChallenge()
39 assertThat(challenge.isAccepted(), is(Boolean.FALSE)); in testCreateChallenge()
40 assertThat(challenge.getOpened(), is(Long.valueOf(0))); in testCreateChallenge()
48 assertThat(challenge, notNullValue()); in testCreateChallengeAndAccept()
49 assertThat(challenge.isAccepted(), is(Boolean.FALSE)); in testCreateChallengeAndAccept()
50 assertThat(challenge.getOpened(), is(Long.valueOf(0))); in testCreateChallengeAndAccept()
54 assertThat(challenge, nullValue()); in testCreateChallengeAndAccept()
64 assertThat(challenge, notNullValue()); in testCreateChallengeAndTimeout()
70 assertThat(challenge, nullValue()); in testCreateChallengeAndTimeout()
78 assertThat(challenge, notNullValue()); in testCreateChallengeAndLogout()
[all …]
/dports/irc/srain/srain-1.1.0/src/lib/libecdsaauth/
H A Dop.c117 challenge->key = key; in libecdsaauth_challenge_new()
118 RAND_pseudo_bytes(challenge->blob, sizeof(challenge->blob)); in libecdsaauth_challenge_new()
120 return challenge; in libecdsaauth_challenge_new()
126 void libecdsaauth_challenge_free(libecdsaauth_challenge_t *challenge) in libecdsaauth_challenge_free() argument
128 free(challenge); in libecdsaauth_challenge_free()
136 if (challenge->key == NULL) in libecdsaauth_challenge_bytes()
139 return challenge->blob; in libecdsaauth_challenge_bytes()
145 size_t libecdsaauth_challenge_size(libecdsaauth_challenge_t *challenge) in libecdsaauth_challenge_size() argument
147 return sizeof(challenge->blob); in libecdsaauth_challenge_size()
155 return libecdsaauth_verify(challenge->key, challenge->blob, sizeof(challenge->blob), blob, len); in libecdsaauth_challenge_verify()
[all …]
/dports/lang/nim/nim-1.6.2/tests/manyloc/keineschweine/enet_server/
H A Dserver_utils.nim61 inc(challenge.index)
68 challenge.file = addr myAssets[challenge.index]
69 client.send HFileChallenge, challenge.file.challenge # :rolleyes:
70 echo "sent challenge"
73 let size = min(FileChunkSize, challenge.transfer.fileSize - challenge.transfer.pos)
77 addr challenge.file.file.compressed[challenge.transfer.pos],
83 challenge.transfer.fileSize = challenge.file.file.compressed.len().int32
84 challenge.transfer.pos = 0
85 challenge.transfer.data = ""
87 challenge.sendChunk(client)
[all …]
/dports/x11/mlterm/mlterm-3.9.1/vtemu/
H A Dvt_config_proto.c23 static char *challenge; variable
42 free(challenge); in read_challenge()
48 fread(challenge, st.st_size, 1, file); in read_challenge()
49 challenge[st.st_size] = '\0'; in read_challenge()
70 free(challenge); in vt_config_proto_final()
82 free(challenge); in vt_gen_proto_challenge()
88 srand((u_int)(time(NULL) + (int)challenge)); in vt_gen_proto_challenge()
89 sprintf(challenge, "%d", rand()); in vt_gen_proto_challenge()
91 write(fd, challenge, strlen(challenge)); in vt_gen_proto_challenge()
118 if ((challenge && strcmp(chal, challenge) == 0) || in vt_parse_proto_prefix()
[all …]

12345678910>>...222