Searched refs:challenge (Results 1 - 25 of 213) sorted by relevance

123456789

/external/webkit/Source/WebKit2/UIProcess/API/C/
H A DWKAuthenticationChallenge.cpp41 WKAuthenticationDecisionListenerRef WKAuthenticationChallengeGetDecisionListener(WKAuthenticationChallengeRef challenge) argument
43 return toAPI(toImpl(challenge)->listener());
46 WKProtectionSpaceRef WKAuthenticationChallengeGetProtectionSpace(WKAuthenticationChallengeRef challenge) argument
48 return toAPI(toImpl(challenge)->protectionSpace());
51 WKCredentialRef WKAuthenticationChallengeGetProposedCredential(WKAuthenticationChallengeRef challenge) argument
53 return toAPI(toImpl(challenge)->proposedCredential());
56 int WKAuthenticationChallengeGetPreviousFailureCount(WKAuthenticationChallengeRef challenge) argument
58 return toImpl(challenge)->previousFailureCount();
/external/chromium/net/base/
H A Dkeygen_handler.cc14 const std::string& challenge,
17 challenge_(challenge),
13 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
/external/webkit/Source/WebCore/platform/android/
H A DSSLKeyGeneratorAndroid.cpp38 String signedPublicKeyAndChallengeString(unsigned index, const String& challenge, const KURL& url) argument
40 return PlatformBridge::getSignedPublicKeyAndChallengeString(index, challenge, url);
/external/webkit/Source/WebKit/mac/Panels/
H A DWebPanelAuthenticationHandler.m68 -(void)enqueueChallenge:(NSURLAuthenticationChallenge *)challenge forWindow:(id)window
76 [queue addObject:challenge];
86 NSURLAuthenticationChallenge *challenge = [[queue objectAtIndex:0] retain];
92 NSURLCredential *latestCredential = [[NSURLCredentialStorage sharedCredentialStorage] defaultCredentialForProtectionSpace:[challenge protectionSpace]];
95 [[challenge sender] useCredential:latestCredential forAuthenticationChallenge:challenge];
96 [challenge release];
100 [self startAuthentication:challenge window:(window == WebModalDialogPretendWindow ? nil : window)];
101 [challenge release];
105 -(void)startAuthentication:(NSURLAuthenticationChallenge *)challenge windo
[all...]
H A DWebPanelAuthenticationHandler.h42 - (void)startAuthentication:(NSURLAuthenticationChallenge *)challenge window:(NSWindow *)w;
43 - (void)cancelAuthentication:(NSURLAuthenticationChallenge *)challenge;
/external/webkit/Source/WebKit2/WebProcess/Authentication/
H A DAuthenticationManager.cpp86 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
87 ASSERT(!challenge.isNull());
88 AuthenticationClient* coreClient = challenge.authenticationClient();
90 // This authentication challenge comes from a download.
91 Download::receivedCredential(challenge, credential);
96 coreClient->receivedCredential(challenge, credential);
101 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
102 ASSERT(!challenge.isNull());
103 AuthenticationClient* coreClient = challenge.authenticationClient();
105 // This authentication challenge come
115 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
[all...]
/external/webkit/Source/WebKit/win/
H A DWebURLAuthenticationChallengeSenderCFNet.cpp42 /* [in] */ IWebURLAuthenticationChallenge* challenge)
44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
53 /* [in] */ IWebURLAuthenticationChallenge* challenge)
55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
65 /* [in] */ IWebURLAuthenticationChallenge* challenge)
67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
41 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
52 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
63 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
H A DWebURLAuthenticationChallengeSenderCurl.cpp43 /* [in] */ IWebURLAuthenticationChallenge* challenge)
50 /* [in] */ IWebURLAuthenticationChallenge* challenge)
58 /* [in] */ IWebURLAuthenticationChallenge* challenge)
42 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
49 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument
56 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
H A DWebURLAuthenticationChallengeSender.h54 /* [in] */ IWebURLAuthenticationChallenge* challenge);
57 /* [in] */ IWebURLAuthenticationChallenge* challenge);
61 /* [in] */ IWebURLAuthenticationChallenge* challenge);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Dchap.c22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
32 addr[2] = challenge;
H A Dchap.h20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c21 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
31 addr[2] = challenge;
H A Dchap.h20 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c21 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
31 addr[2] = challenge;
H A Dchap.h20 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c21 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
31 addr[2] = challenge;
H A Dchap.h20 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/chromium/net/http/
H A Dhttp_auth_handler_basic.cc21 // production of challenge that realm is required.
25 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) { argument
29 return ParseChallenge(challenge);
33 HttpAuth::ChallengeTokenizer* challenge) {
34 // Verify the challenge's auth-scheme.
35 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic"))
38 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs();
55 HttpAuth::ChallengeTokenizer* challenge) {
57 // should be treated as a rejection. However, if the new challenge
59 HttpUtil::NameValuePairsIterator parameters = challenge
32 ParseChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
54 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
93 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
[all...]
H A Dhttp_auth_handler_basic_unittest.cc35 std::string challenge = "Basic realm=\"Atlantis\""; local
38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
52 const char* challenge; member in struct:net::__anon2199
55 // The handler is initialized using this challenge. The first
57 // to treat the second challenge as a rejection since it is for
64 // A challenge for a different realm.
72 // challenge should be treated as being for "First" realm.
89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
93 std::string challenge(tests[i].challenge);
102 const char* challenge; member in struct:net::__anon2200
178 std::string challenge = tests[i].challenge; local
[all...]
H A Dhttp_auth_handler_basic.h25 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge,
35 HttpAuth::ChallengeTokenizer* challenge);
38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge);
49 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
H A Dhttp_auth_unittest.cc31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(),
34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge,
72 // Basic is the only challenge type, pick it.
80 // Fake is the only challenge type, but it is unsupported.
245 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(),
247 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
250 EXPECT_EQ(std::string("Basic"), challenge.scheme());
261 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(),
263 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
266 EXPECT_EQ(std::string("Basic"), challenge
[all...]
/external/webkit/Source/WebCore/platform/brew/
H A DSSLKeyGeneratorBrew.cpp32 String signedPublicKeyAndChallengeString(unsigned index, const String& challenge, const KURL& url) argument
/external/ppp/pppd/
H A Dchap-md5.c59 unsigned char *challenge, unsigned char *response,
67 challenge_len = *challenge++;
70 /* Generate hash of ID, secret, challenge */
74 MD5_Update(&ctx, challenge, challenge_len);
89 unsigned char *challenge, char *secret, int secret_len,
94 int challenge_len = *challenge++;
99 MD5_Update(&ctx, challenge, challenge_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
/external/apache-http/src/org/apache/http/impl/auth/
H A DNTLMScheme.java59 private String challenge; field in class:NTLMScheme
68 this.challenge = null;
92 String challenge = buffer.substringTrimmed(pos, len);
93 if (challenge.length() == 0) {
99 this.challenge = null;
102 this.challenge = challenge;
129 this.challenge);
H A DNTLMEngine.java36 * Type2 challenge.
59 * authentication challenge.
65 * @param challenge Type2 challenge.
74 String challenge) throws NTLMEngineException;
69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument

Completed in 891 milliseconds

123456789