| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | response_items.c | 33 char **challenges; member 65 zapfreestr(ri->challenges[i]); in k5_response_items_reset() 66 free(ri->challenges); in k5_response_items_reset() 67 ri->challenges = NULL; in k5_response_items_reset() 125 tmp = realloc(ri->challenges, size); in push_question() 128 ri->challenges = tmp; in push_question() 129 ri->challenges[ri->count] = NULL; in push_question() 130 ri->challenges[ri->count + 1] = NULL; in push_question() 144 ri->challenges[ri->count] = strdup(challenge); in push_question() 145 if (ri->challenges[ri->count] == NULL) { in push_question() [all …]
|
| H A D | preauth_otp.c | 745 /* Count how many challenges we have. */ in prompt_for_token() 888 /* Remove tokeninfos with non-printable challenges. */ in is_tokeninfo_supported()
|
| /freebsd/lib/libfetch/ |
| H A D | http.c | 667 /* Data holder for an array of challenges offered in an http response. */ 670 http_auth_challenge_t *challenges[MAX_CHALLENGES]; member 671 int count; /* Number of parsed challenges in the array */ 680 cs->challenges[i] = NULL; in init_http_auth_challenges() 690 if (cs->challenges[i] != NULL) { in clean_http_auth_challenges() 691 clean_http_auth_challenge(cs->challenges[i]); in clean_http_auth_challenges() 692 free(cs->challenges[i]); in clean_http_auth_challenges() 740 * Read challenges from http xxx-authenticate header and accumulate them 741 * in the challenges list structure. 743 * Headers with multiple challenges are specified by rfc2617, but [all …]
|
| /freebsd/contrib/ntp/libntp/lib/isc/ |
| H A D | tsmemcmp.c | 27 * once for every byte without early-out shortcut has a few challenges.
|
| /freebsd/contrib/wpa/src/eap_peer/ |
| H A D | mschapv2.c | 62 * here so that challenges need not be saved. */ in mschapv2_derive_response()
|
| H A D | eap_mschapv2.c | 34 * for challenges, but not for success/failure */ 114 " with preset challenges" : "", in eap_mschapv2_init() 610 * here so that challenges need not be saved. */ in eap_mschapv2_change_password()
|
| H A D | eap_sim.c | 143 "challenges to %lu", in eap_sim_init() 871 wpa_printf(MSG_DEBUG, "EAP-SIM: %lu challenges", in eap_sim_process_challenge() 875 "challenges (%lu)", (unsigned long) attr->num_chal); in eap_sim_process_challenge() 880 wpa_printf(MSG_INFO, "EAP-SIM: Too many challenges " in eap_sim_process_challenge()
|
| H A D | eap_i.h | 365 /* Optional challenges generated in Phase 1 (EAP-FAST) */
|
| H A D | eap_config.h | 449 * challenges (by default, it accepts 2 or 3).
|
| /freebsd/contrib/pam-krb5/ |
| H A D | TODO | 49 This poses some challenges due to the two-step ticket cache mechanism
|
| /freebsd/contrib/wpa/src/eap_server/ |
| H A D | eap_server_mschapv2.c | 19 u8 mschapv2_id; /* must be changed for challenges, but not for 70 " with preset challenges" : "", in eap_mschapv2_init()
|
| H A D | eap_i.h | 180 /* Optional challenges generated in Phase 1 (EAP-FAST) */
|
| H A D | eap_sim_db.c | 964 "%d challenges", entry->u.sim.num_chal); in eap_sim_db_get_gsm_triplets()
|
| /freebsd/crypto/openssh/ |
| H A D | PROTOCOL.certkeys | 29 public key that is used to sign challenges. In OpenSSH, ssh-keygen
|
| H A D | ssh-keygen.1 | 1081 the real key that is used to sign authentication challenges.
|
| /freebsd/contrib/ntp/util/ |
| H A D | ntp-keygen.texi | 219 challenges have a par subtype, as in the IFF challenge IFFpar, while
|
| H A D | ntp-keygen.c | 1135 * Alice challenges Bob to confirm identity using the protocol described 1309 * scheme. Alice challenges Bob to confirm identity using the protocol
|
| /freebsd/usr.sbin/wpa/wpa_supplicant/ |
| H A D | wpa_supplicant.conf.5 | 372 challenges (by default, it accepts 2 or 3).
|
| /freebsd/crypto/openssl/doc/designs/quic-design/ |
| H A D | quic-concurrency.md | 151 Supporting both CCM and WCM creates significant architectural challenges. Under
|
| /freebsd/contrib/llvm-project/llvm/lib/CodeGen/ |
| H A D | BasicBlockSections.cpp | 40 // There are a couple of challenges to be addressed:
|
| /freebsd/contrib/ntp/html/ |
| H A D | keygen.html | 266 challenges have a <tt>par</tt> subtype, as in the IFF
|
| /freebsd/usr.sbin/ppp/ |
| H A D | ppp.8 | 2667 Subsequent challenges may occur. 2848 except that it issues challenges of a fixed 16 bytes in length and uses a 2858 except that it issues challenges of a fixed 8 bytes in length and uses a 2880 the protocols are used alternately in response to challenges.
|
| H A D | chap.c | 512 *cp++ = 16; /* MS-CHAP-V2 does 16 bytes challenges */ in chap_ChallengeInit()
|
| /freebsd/share/doc/papers/devfs/ |
| H A D | paper.me | 661 Most of the rest of the paper will be about the various challenges
|
| /freebsd/contrib/llvm-project/llvm/lib/Transforms/Scalar/ |
| H A D | LoopPredication.cpp | 1038 // unanalyzeable exits, side effects, exceptional exits, and other challenges in isLoopProfitableToPredicate()
|