/external/webkit/Source/WebKit2/UIProcess/API/C/ |
H A D | WKAuthenticationChallenge.cpp | 41 WKAuthenticationDecisionListenerRef WKAuthenticationChallengeGetDecisionListener(WKAuthenticationChallengeRef challenge) argument 43 return toAPI(toImpl(challenge)->listener()); 46 WKProtectionSpaceRef WKAuthenticationChallengeGetProtectionSpace(WKAuthenticationChallengeRef challenge) argument 48 return toAPI(toImpl(challenge)->protectionSpace()); 51 WKCredentialRef WKAuthenticationChallengeGetProposedCredential(WKAuthenticationChallengeRef challenge) argument 53 return toAPI(toImpl(challenge)->proposedCredential()); 56 int WKAuthenticationChallengeGetPreviousFailureCount(WKAuthenticationChallengeRef challenge) argument 58 return toImpl(challenge)->previousFailureCount();
|
/external/chromium/net/base/ |
H A D | keygen_handler.cc | 14 const std::string& challenge, 17 challenge_(challenge), 13 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
|
/external/webkit/Source/WebCore/platform/android/ |
H A D | SSLKeyGeneratorAndroid.cpp | 38 String signedPublicKeyAndChallengeString(unsigned index, const String& challenge, const KURL& url) argument 40 return PlatformBridge::getSignedPublicKeyAndChallengeString(index, challenge, url);
|
/external/webkit/Source/WebKit/mac/Panels/ |
H A D | WebPanelAuthenticationHandler.m | 68 -(void)enqueueChallenge:(NSURLAuthenticationChallenge *)challenge forWindow:(id)window 76 [queue addObject:challenge]; 86 NSURLAuthenticationChallenge *challenge = [[queue objectAtIndex:0] retain]; 92 NSURLCredential *latestCredential = [[NSURLCredentialStorage sharedCredentialStorage] defaultCredentialForProtectionSpace:[challenge protectionSpace]]; 95 [[challenge sender] useCredential:latestCredential forAuthenticationChallenge:challenge]; 96 [challenge release]; 100 [self startAuthentication:challenge window:(window == WebModalDialogPretendWindow ? nil : window)]; 101 [challenge release]; 105 -(void)startAuthentication:(NSURLAuthenticationChallenge *)challenge windo [all...] |
H A D | WebPanelAuthenticationHandler.h | 42 - (void)startAuthentication:(NSURLAuthenticationChallenge *)challenge window:(NSWindow *)w; 43 - (void)cancelAuthentication:(NSURLAuthenticationChallenge *)challenge;
|
/external/webkit/Source/WebKit2/WebProcess/Authentication/ |
H A D | AuthenticationManager.cpp | 86 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 87 ASSERT(!challenge.isNull()); 88 AuthenticationClient* coreClient = challenge.authenticationClient(); 90 // This authentication challenge comes from a download. 91 Download::receivedCredential(challenge, credential); 96 coreClient->receivedCredential(challenge, credential); 101 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 102 ASSERT(!challenge.isNull()); 103 AuthenticationClient* coreClient = challenge.authenticationClient(); 105 // This authentication challenge come 115 AuthenticationChallenge challenge = m_challenges.take(challengeID); local [all...] |
/external/webkit/Source/WebKit/win/ |
H A D | WebURLAuthenticationChallengeSenderCFNet.cpp | 42 /* [in] */ IWebURLAuthenticationChallenge* challenge) 44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 53 /* [in] */ IWebURLAuthenticationChallenge* challenge) 55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 65 /* [in] */ IWebURLAuthenticationChallenge* challenge) 67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 41 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 52 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 63 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
|
H A D | WebURLAuthenticationChallengeSenderCurl.cpp | 43 /* [in] */ IWebURLAuthenticationChallenge* challenge) 50 /* [in] */ IWebURLAuthenticationChallenge* challenge) 58 /* [in] */ IWebURLAuthenticationChallenge* challenge) 42 cancelAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 49 continueWithoutCredentialForAuthenticationChallenge( IWebURLAuthenticationChallenge* challenge) argument 56 useCredential( IWebURLCredential* credential, IWebURLAuthenticationChallenge* challenge) argument
|
H A D | WebURLAuthenticationChallengeSender.h | 54 /* [in] */ IWebURLAuthenticationChallenge* challenge); 57 /* [in] */ IWebURLAuthenticationChallenge* challenge); 61 /* [in] */ IWebURLAuthenticationChallenge* challenge);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 32 addr[2] = challenge;
|
H A D | chap.h | 20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 21 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 31 addr[2] = challenge;
|
H A D | chap.h | 20 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 21 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 31 addr[2] = challenge;
|
H A D | chap.h | 20 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 21 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 31 addr[2] = challenge;
|
H A D | chap.h | 20 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/chromium/net/http/ |
H A D | http_auth_handler_basic.cc | 21 // production of challenge that realm is required. 25 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) { argument 29 return ParseChallenge(challenge); 33 HttpAuth::ChallengeTokenizer* challenge) { 34 // Verify the challenge's auth-scheme. 35 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic")) 38 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); 55 HttpAuth::ChallengeTokenizer* challenge) { 57 // should be treated as a rejection. However, if the new challenge 59 HttpUtil::NameValuePairsIterator parameters = challenge 32 ParseChallenge( HttpAuth::ChallengeTokenizer* challenge) argument 54 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument 93 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument [all...] |
H A D | http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon2199 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon2200 178 std::string challenge = tests[i].challenge; local [all...] |
H A D | http_auth_handler_basic.h | 25 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge, 35 HttpAuth::ChallengeTokenizer* challenge); 38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge); 49 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
|
H A D | http_auth_unittest.cc | 31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge, 72 // Basic is the only challenge type, pick it. 80 // Fake is the only challenge type, but it is unsupported. 245 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 247 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 250 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 261 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 263 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 266 EXPECT_EQ(std::string("Basic"), challenge [all...] |
/external/webkit/Source/WebCore/platform/brew/ |
H A D | SSLKeyGeneratorBrew.cpp | 32 String signedPublicKeyAndChallengeString(unsigned index, const String& challenge, const KURL& url) argument
|
/external/ppp/pppd/ |
H A D | chap-md5.c | 59 unsigned char *challenge, unsigned char *response, 67 challenge_len = *challenge++; 70 /* Generate hash of ID, secret, challenge */ 74 MD5_Update(&ctx, challenge, challenge_len); 89 unsigned char *challenge, char *secret, int secret_len, 94 int challenge_len = *challenge++; 99 MD5_Update(&ctx, challenge, challenge_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMScheme.java | 59 private String challenge; field in class:NTLMScheme 68 this.challenge = null; 92 String challenge = buffer.substringTrimmed(pos, len); 93 if (challenge.length() == 0) { 99 this.challenge = null; 102 this.challenge = challenge; 129 this.challenge);
|
H A D | NTLMEngine.java | 36 * Type2 challenge. 59 * authentication challenge. 65 * @param challenge Type2 challenge. 74 String challenge) throws NTLMEngineException; 69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|