/external/chromium/net/base/ |
H A D | keygen_handler.cc | 14 const std::string& challenge, 17 challenge_(challenge), 13 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
|
/external/chromium_org/net/base/ |
H A D | keygen_handler.cc | 14 const std::string& challenge, 17 challenge_(challenge), 13 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
|
H A D | keygen_handler_unittest.cc | 40 // Assert that |result| is a valid output for KeygenHandler given challenge 41 // string of |challenge|. 43 const std::string& challenge) { 67 // Challenge String: some challenge 77 KeygenHandler handler(768, "some challenge", GURL("http://www.example.com")); 81 AssertValidSignedPublicKeyAndChallenge(result, "some challenge"); 85 const std::string& challenge, 90 KeygenHandler handler(768, challenge, GURL("http://www.example.com")); 116 base::Bind(ConcurrencyTestCallback, events[i], "some challenge", 128 AssertValidSignedPublicKeyAndChallenge(results[i], "some challenge"); 42 AssertValidSignedPublicKeyAndChallenge(const std::string& result, const std::string& challenge) argument 84 ConcurrencyTestCallback(base::WaitableEvent* event, const std::string& challenge, std::string* result) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMEngine.java | 36 * Type2 challenge. 59 * authentication challenge. 65 * @param challenge Type2 challenge. 74 String challenge) throws NTLMEngineException; 69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
/external/chromium/net/http/ |
H A D | http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon3086 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon3087 178 std::string challenge = tests[i].challenge; local [all...] |
H A D | http_auth_handler_ntlm.cc | 19 HttpAuth::ChallengeTokenizer* challenge) { 20 return ParseChallenge(challenge, false); 73 // Initial challenge. 108 // The NTLM challenge header looks like: 113 // auth_sspi_ contains state for whether or not this is the initial challenge. 118 // there was previously a challenge round. 123 // Verify the challenge's auth-scheme. 18 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
|
H A D | http_auth_handler_unittest.cc | 22 std::string challenge = "Mock asdf"; local 39 challenge.begin(), challenge.end());
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
H A D | saslmechanism.cc | 43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
|
/external/chromium_org/net/http/ |
H A D | http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon8740 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon8741 186 std::string challenge = tests[i].challenge; local [all...] |
H A D | http_auth_handler_ntlm.cc | 19 HttpAuth::ChallengeTokenizer* challenge) { 20 return ParseChallenge(challenge, false); 69 // Initial challenge. 104 // The NTLM challenge header looks like: 109 // auth_sspi_ contains state for whether or not this is the initial challenge. 114 // there was previously a challenge round. 119 // Verify the challenge's auth-scheme. 18 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
|
H A D | http_auth_handler_unittest.cc | 21 std::string challenge = "Mock asdf"; local 37 challenge.begin(), challenge.end());
|
/external/chromium_org/net/websockets/ |
H A D | websocket_handshake_handler_spdy_unittest.cc | 54 std::string challenge; local 58 &challenge, 79 EXPECT_EQ(expected_challenge, challenge); 90 headers, challenge, spdy_util_.spdy_version())); 128 std::string challenge; local 132 &challenge, 155 EXPECT_EQ(expected_challenge, challenge); 171 headers, challenge, spdy_util_.spdy_version()));
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | saslmechanism.cc | 43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
H A D | AuthenticationHelper.java | 35 * @param challenge 36 * the 401/407 challenge response 55 public abstract ClientTransaction handleChallenge(Response challenge, argument
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
H A D | ChallengeParser.java | 33 * Parser for the challenge portion of the authentication header. 47 * @param String challenge message to parse to set 49 protected ChallengeParser(String challenge) { argument 50 super(challenge); 55 * @param String challenge message to parse to set 62 * Get the parameter of the challenge string
|
/external/openssh/ |
H A D | auth-chall.c | 48 char *challenge, *name, *info, **prompts; local 70 challenge = xstrdup(prompts[0]); 78 return (challenge);
|
H A D | auth-bsdauth.c | 55 char *challenge = NULL; local 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 60 if (challenge == NULL) { 66 if (challenge == NULL) { 71 authctxt->style, "auth-ssh", &challenge); 73 challenge = NULL; 74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 77 if (challenge == NULL) 85 (*prompts)[0] = xstrdup(challenge); [all...] |
H A D | auth-skey.c | 56 char challenge[1024]; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 60 sizeof(challenge)) == -1) 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
H A D | SASLAnonymous.java | 55 public void challengeReceived(String challenge) throws IOException {
argument 56 // Build the challenge response stanza encoding the response text
|
/external/chromium_org/chrome/browser/net/spdyproxy/ |
H A D | http_auth_handler_spdyproxy_unittest.cc | 39 // Verifies that challenge parsing is expected as described in individual 44 const char* challenge; member in struct:spdyproxy::__anon5383 49 // A well-formed challenge where a sid is provided produces a valid 77 tests[i].challenge, HttpAuth::AUTH_PROXY, origin, BoundNetLog(), 109 // Verifies that any repeat challenge is treated as a failure. 117 std::string challenge(kValidChallenge); 118 HttpAuth::ChallengeTokenizer tok(challenge.begin(), 119 challenge.end()); 125 // Verifies that various challenge strings are parsed appropriately as 128 const char* challenge; member in struct:spdyproxy::__anon5384 146 std::string challenge = tests[i].challenge; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|