Searched refs:challenges (Results 1 – 7 of 7) sorted by relevance
670 http_auth_challenge_t *challenges[MAX_CHALLENGES]; member680 cs->challenges[i] = NULL; in init_http_auth_challenges()690 if (cs->challenges[i] != NULL) { in clean_http_auth_challenges()691 clean_http_auth_challenge(cs->challenges[i]); in clean_http_auth_challenges()692 free(cs->challenges[i]); in clean_http_auth_challenges()775 cs->challenges[cs->count] = in http_parse_authenticate()777 if (cs->challenges[cs->count] == NULL) { in http_parse_authenticate()781 init_http_auth_challenge(cs->challenges[cs->count]); in http_parse_authenticate()783 cs->challenges[cs->count]->scheme = HTTPAS_BASIC; in http_parse_authenticate()785 cs->challenges[cs->count]->scheme = HTTPAS_DIGEST; in http_parse_authenticate()[all …]
29 public key that is used to sign challenges. In OpenSSH, ssh-keygen
219 challenges have a par subtype, as in the IFF challenge IFFpar, while
2328 * added support for EAP-SIM with two challenges2329 (phase1="sim_min_num_chal=3" can be used to require three challenges)
605 - Only remember {WWW,Proxy}-Authenticate "Basic" challenges; no
1074 For a thorough discussion about cryptography and constant time challenges,
2719 challenges, but nothing insurmountable. This recipe shows you how you can do it.