Searched defs:challenge (Results 1 - 25 of 146) sorted by relevance

123456

/external/chromium/net/base/
H A Dkeygen_handler.cc14 const std::string& challenge,
17 challenge_(challenge),
13 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
/external/chromium_org/net/base/
H A Dkeygen_handler.cc14 const std::string& challenge,
17 challenge_(challenge),
13 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
H A Dkeygen_handler_unittest.cc40 // Assert that |result| is a valid output for KeygenHandler given challenge
41 // string of |challenge|.
43 const std::string& challenge) {
67 // Challenge String: some challenge
77 KeygenHandler handler(768, "some challenge", GURL("http://www.example.com"));
81 AssertValidSignedPublicKeyAndChallenge(result, "some challenge");
85 const std::string& challenge,
90 KeygenHandler handler(768, challenge, GURL("http://www.example.com"));
116 base::Bind(ConcurrencyTestCallback, events[i], "some challenge",
128 AssertValidSignedPublicKeyAndChallenge(results[i], "some challenge");
42 AssertValidSignedPublicKeyAndChallenge(const std::string& result, const std::string& challenge) argument
84 ConcurrencyTestCallback(base::WaitableEvent* event, const std::string& challenge, std::string* result) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/apache-http/src/org/apache/http/impl/auth/
H A DNTLMEngine.java36 * Type2 challenge.
59 * authentication challenge.
65 * @param challenge Type2 challenge.
74 String challenge) throws NTLMEngineException;
69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
/external/chromium/net/http/
H A Dhttp_auth_handler_basic_unittest.cc35 std::string challenge = "Basic realm=\"Atlantis\""; local
38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
52 const char* challenge; member in struct:net::__anon3086
55 // The handler is initialized using this challenge. The first
57 // to treat the second challenge as a rejection since it is for
64 // A challenge for a different realm.
72 // challenge should be treated as being for "First" realm.
89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
93 std::string challenge(tests[i].challenge);
102 const char* challenge; member in struct:net::__anon3087
178 std::string challenge = tests[i].challenge; local
[all...]
H A Dhttp_auth_handler_ntlm.cc19 HttpAuth::ChallengeTokenizer* challenge) {
20 return ParseChallenge(challenge, false);
73 // Initial challenge.
108 // The NTLM challenge header looks like:
113 // auth_sspi_ contains state for whether or not this is the initial challenge.
118 // there was previously a challenge round.
123 // Verify the challenge's auth-scheme.
18 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
H A Dhttp_auth_handler_unittest.cc22 std::string challenge = "Mock asdf"; local
39 challenge.begin(), challenge.end());
/external/chromium/third_party/libjingle/source/talk/xmpp/
H A Dsaslmechanism.cc43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
/external/chromium_org/net/http/
H A Dhttp_auth_handler_basic_unittest.cc35 std::string challenge = "Basic realm=\"Atlantis\""; local
38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
52 const char* challenge; member in struct:net::__anon8740
55 // The handler is initialized using this challenge. The first
57 // to treat the second challenge as a rejection since it is for
64 // A challenge for a different realm.
72 // challenge should be treated as being for "First" realm.
89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
93 std::string challenge(tests[i].challenge);
102 const char* challenge; member in struct:net::__anon8741
186 std::string challenge = tests[i].challenge; local
[all...]
H A Dhttp_auth_handler_ntlm.cc19 HttpAuth::ChallengeTokenizer* challenge) {
20 return ParseChallenge(challenge, false);
69 // Initial challenge.
104 // The NTLM challenge header looks like:
109 // auth_sspi_ contains state for whether or not this is the initial challenge.
114 // there was previously a challenge round.
119 // Verify the challenge's auth-scheme.
18 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
H A Dhttp_auth_handler_unittest.cc21 std::string challenge = "Mock asdf"; local
37 challenge.begin(), challenge.end());
/external/chromium_org/net/websockets/
H A Dwebsocket_handshake_handler_spdy_unittest.cc54 std::string challenge; local
58 &challenge,
79 EXPECT_EQ(expected_challenge, challenge);
90 headers, challenge, spdy_util_.spdy_version()));
128 std::string challenge; local
132 &challenge,
155 EXPECT_EQ(expected_challenge, challenge);
171 headers, challenge, spdy_util_.spdy_version()));
/external/chromium_org/third_party/libjingle/source/talk/xmpp/
H A Dsaslmechanism.cc43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
H A DAuthenticationHelper.java35 * @param challenge
36 * the 401/407 challenge response
55 public abstract ClientTransaction handleChallenge(Response challenge, argument
/external/nist-sip/java/gov/nist/javax/sip/parser/
H A DChallengeParser.java33 * Parser for the challenge portion of the authentication header.
47 * @param String challenge message to parse to set
49 protected ChallengeParser(String challenge) { argument
50 super(challenge);
55 * @param String challenge message to parse to set
62 * Get the parameter of the challenge string
/external/openssh/
H A Dauth-chall.c48 char *challenge, *name, *info, **prompts; local
70 challenge = xstrdup(prompts[0]);
78 return (challenge);
H A Dauth-bsdauth.c55 char *challenge = NULL; local
59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
60 if (challenge == NULL) {
66 if (challenge == NULL) {
71 authctxt->style, "auth-ssh", &challenge);
73 challenge = NULL;
74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
77 if (challenge == NULL)
85 (*prompts)[0] = xstrdup(challenge);
[all...]
H A Dauth-skey.c56 char challenge[1024]; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
60 sizeof(challenge)) == -1)
69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
/external/smack/src/org/jivesoftware/smack/sasl/
H A DSASLAnonymous.java55 public void challengeReceived(String challenge) throws IOException { argument
56 // Build the challenge response stanza encoding the response text
/external/chromium_org/chrome/browser/net/spdyproxy/
H A Dhttp_auth_handler_spdyproxy_unittest.cc39 // Verifies that challenge parsing is expected as described in individual
44 const char* challenge; member in struct:spdyproxy::__anon5383
49 // A well-formed challenge where a sid is provided produces a valid
77 tests[i].challenge, HttpAuth::AUTH_PROXY, origin, BoundNetLog(),
109 // Verifies that any repeat challenge is treated as a failure.
117 std::string challenge(kValidChallenge);
118 HttpAuth::ChallengeTokenizer tok(challenge.begin(),
119 challenge.end());
125 // Verifies that various challenge strings are parsed appropriately as
128 const char* challenge; member in struct:spdyproxy::__anon5384
146 std::string challenge = tests[i].challenge; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,

Completed in 588 milliseconds

123456