Home
last modified time | relevance | path

Searched full:challenges (Results 1 – 25 of 39) sorted by relevance

12

/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dresponse_items.c33 char **challenges; member
65 zapfreestr(ri->challenges[i]); in k5_response_items_reset()
66 free(ri->challenges); in k5_response_items_reset()
67 ri->challenges = NULL; in k5_response_items_reset()
125 tmp = realloc(ri->challenges, size); in push_question()
128 ri->challenges = tmp; in push_question()
129 ri->challenges[ri->count] = NULL; in push_question()
130 ri->challenges[ri->count + 1] = NULL; in push_question()
144 ri->challenges[ri->count] = strdup(challenge); in push_question()
145 if (ri->challenges[ri->count] == NULL) { in push_question()
[all …]
H A Dpreauth_otp.c745 /* Count how many challenges we have. */ in prompt_for_token()
888 /* Remove tokeninfos with non-printable challenges. */ in is_tokeninfo_supported()
/freebsd/lib/libfetch/
H A Dhttp.c667 /* Data holder for an array of challenges offered in an http response. */
670 http_auth_challenge_t *challenges[MAX_CHALLENGES]; member
671 int count; /* Number of parsed challenges in the array */
680 cs->challenges[i] = NULL; in init_http_auth_challenges()
690 if (cs->challenges[i] != NULL) { in clean_http_auth_challenges()
691 clean_http_auth_challenge(cs->challenges[i]); in clean_http_auth_challenges()
692 free(cs->challenges[i]); in clean_http_auth_challenges()
740 * Read challenges from http xxx-authenticate header and accumulate them
741 * in the challenges list structure.
743 * Headers with multiple challenges are specified by rfc2617, but
[all …]
/freebsd/contrib/ntp/libntp/lib/isc/
H A Dtsmemcmp.c27 * once for every byte without early-out shortcut has a few challenges.
/freebsd/contrib/wpa/src/eap_peer/
H A Dmschapv2.c62 * here so that challenges need not be saved. */ in mschapv2_derive_response()
H A Deap_mschapv2.c34 * for challenges, but not for success/failure */
114 " with preset challenges" : "", in eap_mschapv2_init()
610 * here so that challenges need not be saved. */ in eap_mschapv2_change_password()
H A Deap_sim.c143 "challenges to %lu", in eap_sim_init()
871 wpa_printf(MSG_DEBUG, "EAP-SIM: %lu challenges", in eap_sim_process_challenge()
875 "challenges (%lu)", (unsigned long) attr->num_chal); in eap_sim_process_challenge()
880 wpa_printf(MSG_INFO, "EAP-SIM: Too many challenges " in eap_sim_process_challenge()
H A Deap_i.h365 /* Optional challenges generated in Phase 1 (EAP-FAST) */
H A Deap_config.h449 * challenges (by default, it accepts 2 or 3).
/freebsd/contrib/pam-krb5/
H A DTODO49 This poses some challenges due to the two-step ticket cache mechanism
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_mschapv2.c19 u8 mschapv2_id; /* must be changed for challenges, but not for
70 " with preset challenges" : "", in eap_mschapv2_init()
H A Deap_i.h180 /* Optional challenges generated in Phase 1 (EAP-FAST) */
H A Deap_sim_db.c964 "%d challenges", entry->u.sim.num_chal); in eap_sim_db_get_gsm_triplets()
/freebsd/crypto/openssh/
H A DPROTOCOL.certkeys29 public key that is used to sign challenges. In OpenSSH, ssh-keygen
H A Dssh-keygen.11081 the real key that is used to sign authentication challenges.
/freebsd/contrib/ntp/util/
H A Dntp-keygen.texi219 challenges have a par subtype, as in the IFF challenge IFFpar, while
H A Dntp-keygen.c1135 * Alice challenges Bob to confirm identity using the protocol described
1309 * scheme. Alice challenges Bob to confirm identity using the protocol
/freebsd/usr.sbin/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf.5372 challenges (by default, it accepts 2 or 3).
/freebsd/crypto/openssl/doc/designs/quic-design/
H A Dquic-concurrency.md151 Supporting both CCM and WCM creates significant architectural challenges. Under
/freebsd/contrib/llvm-project/llvm/lib/CodeGen/
H A DBasicBlockSections.cpp40 // There are a couple of challenges to be addressed:
/freebsd/contrib/ntp/html/
H A Dkeygen.html266 challenges have a <tt>par</tt> subtype, as in the IFF
/freebsd/usr.sbin/ppp/
H A Dppp.82667 Subsequent challenges may occur.
2848 except that it issues challenges of a fixed 16 bytes in length and uses a
2858 except that it issues challenges of a fixed 8 bytes in length and uses a
2880 the protocols are used alternately in response to challenges.
H A Dchap.c512 *cp++ = 16; /* MS-CHAP-V2 does 16 bytes challenges */ in chap_ChallengeInit()
/freebsd/share/doc/papers/devfs/
H A Dpaper.me661 Most of the rest of the paper will be about the various challenges
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Scalar/
H A DLoopPredication.cpp1038 // unanalyzeable exits, side effects, exceptional exits, and other challenges in isLoopProfitableToPredicate()

12