Searched refs:challenge (Results 76 - 100 of 245) sorted by relevance

12345678910

/external/chromium_org/net/http/
H A Dhttp_auth_handler_ntlm_win.cc55 HttpAuth::ChallengeTokenizer* challenge,
77 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
54 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
H A Dhttp_auth.cc35 // Choose the challenge whose authentication handler gives the maximum score.
73 std::string challenge; local
76 while (headers->EnumerateHeader(&iter, header_name, &challenge)) {
77 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end());
82 *challenge_used = challenge;
H A Dhttp_auth_handler_digest.cc91 HttpAuth::ChallengeTokenizer* challenge,
102 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
109 HttpAuth::ChallengeTokenizer* challenge) {
114 if (!LowerCaseEqualsASCII(challenge->scheme(), "digest"))
117 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs();
120 // for the new challenge.
135 bool HttpAuthHandlerDigest::Init(HttpAuth::ChallengeTokenizer* challenge) { argument
136 return ParseChallenge(challenge);
169 // The digest challenge header looks like:
186 // webserver was not sending the realm with a BASIC challenge)
90 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
108 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
187 ParseChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
[all...]
H A Dhttp_auth_handler_negotiate.cc42 HttpAuth::ChallengeTokenizer* challenge,
66 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
83 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
167 HttpAuth::ChallengeTokenizer* challenge) {
168 return auth_system_.ParseChallenge(challenge);
188 // The Negotiate challenge header looks like:
190 bool HttpAuthHandlerNegotiate::Init(HttpAuth::ChallengeTokenizer* challenge) { argument
209 auth_system_.ParseChallenge(challenge);
41 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
166 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
H A Dhttp_auth_handler_negotiate.h73 HttpAuth::ChallengeTokenizer* challenge,
110 HttpAuth::ChallengeTokenizer* challenge) OVERRIDE;
116 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge) OVERRIDE;
H A Dhttp_auth_handler_digest.h68 HttpAuth::ChallengeTokenizer* challenge,
81 HttpAuth::ChallengeTokenizer* challenge) OVERRIDE;
84 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge) OVERRIDE;
125 // Parse the challenge, saving the results into this instance.
127 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
160 // Information parsed from the challenge.
169 // challenge text, rather than |realm_| which has been converted to
H A Dhttp_auth_handler_ntlm_portable.cc157 // be included in response to a NTLM challenge.
300 // challenge from the Type-2 message.
304 // param challenge
305 // 8-byte challenge from Type-2 message
309 const uint8* challenge,
320 DESEncrypt(k1, challenge, response);
321 DESEncrypt(k2, challenge, response + 8);
322 DESEncrypt(k3, challenge, response + 16);
370 uint8 challenge[8]; // 8 byte challenge member in struct:net::Type2Msg
308 LM_Response(const uint8* hash, const uint8* challenge, uint8* response) argument
709 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
[all...]
H A Dhttp_auth_sspi_win_unittest.cc65 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(),
68 auth_sspi.ParseChallenge(&challenge));
96 // If the first round challenge has an additional authentication token, it
97 // should be treated as an invalid challenge from the server.
102 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(),
105 auth_sspi.ParseChallenge(&challenge));
109 // If a later-round challenge is simply "Negotiate", it should be treated as
110 // an authentication challenge rejection from the server or proxy.
131 // If a later-round challenge has an invalid base64 encoded token, it should
132 // be treated as an invalid challenge
[all...]
/external/chromium_org/third_party/WebKit/Source/core/html/
H A DHTMLKeygenElement.idl33 [Reflect] attribute DOMString challenge;
/external/chromium/net/http/
H A Dhttp_auth.cc35 // Choose the challenge whose authentication handler gives the maximum score.
73 std::string challenge; local
76 while (headers->EnumerateHeader(&iter, header_name, &challenge)) {
77 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end());
82 *challenge_used = challenge;
H A Dhttp_auth_handler_mock.cc75 HttpAuth::ChallengeTokenizer* challenge) {
78 if (!LowerCaseEqualsASCII(challenge->scheme(), "mock"))
87 bool HttpAuthHandlerMock::Init(HttpAuth::ChallengeTokenizer* challenge) { argument
152 HttpAuth::ChallengeTokenizer* challenge,
163 !tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
74 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
151 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
H A Dhttp_auth_handler_negotiate.cc39 HttpAuth::ChallengeTokenizer* challenge,
63 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
74 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
161 HttpAuth::ChallengeTokenizer* challenge) {
162 return auth_system_.ParseChallenge(challenge);
178 // The Negotiate challenge header looks like:
180 bool HttpAuthHandlerNegotiate::Init(HttpAuth::ChallengeTokenizer* challenge) { argument
199 auth_system_.ParseChallenge(challenge);
38 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
160 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
H A Dhttp_auth_handler_negotiate.h73 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge,
110 HttpAuth::ChallengeTokenizer* challenge);
115 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge);
H A Dhttp_auth_handler_ntlm_portable.cc156 // be included in response to a NTLM challenge.
313 // challenge from the Type-2 message.
317 // param challenge
318 // 8-byte challenge from Type-2 message
322 const uint8* challenge,
333 DESEncrypt(k1, challenge, response);
334 DESEncrypt(k2, challenge, response + 8);
335 DESEncrypt(k3, challenge, response + 16);
383 uint8 challenge[8]; // 8 byte challenge member in struct:net::Type2Msg
321 LM_Response(const uint8* hash, const uint8* challenge, uint8* response) argument
722 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
[all...]
H A Dhttp_auth_sspi_win_unittest.cc65 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(),
68 auth_sspi.ParseChallenge(&challenge));
97 // If the first round challenge has an additional authentication token, it
98 // should be treated as an invalid challenge from the server.
103 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(),
106 auth_sspi.ParseChallenge(&challenge));
110 // If a later-round challenge is simply "Negotiate", it should be treated as
111 // an authentication challenge rejection from the server or proxy.
133 // If a later-round challenge has an invalid base64 encoded token, it should
134 // be treated as an invalid challenge
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_md5.c20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
/external/ppp/pppd/plugins/
H A Dwinbind.c100 unsigned char *challenge,
254 const u_char *challenge,
361 sprintf(challenge_hex + i * 2, "%02X", challenge[i]);
519 unsigned char *challenge,
531 challenge_len = *challenge++;
587 challenge,
595 mppe_set_keys(challenge, session_key);
605 challenge_len, challenge);
621 ChallengeHash(rmd->PeerChallenge, challenge, user, Challenge);
641 challenge, use
250 run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) argument
517 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
[all...]
/external/ppp/pppd/
H A Dchap_ms.c154 { "mschap-challenge", o_string, &mschap_challenge,
155 "specify CHAP challenge" },
156 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge,
157 "specify CHAP peer challenge" },
163 * chapms_generate_challenge - generate a challenge for MS-CHAP.
164 * For MS-CHAP the challenge length is fixed at 8 bytes.
165 * The length goes in challenge[0] and the actual challenge starts
166 * at challenge[1].
169 chapms_generate_challenge(unsigned char *challenge) argument
181 chapms2_generate_challenge(unsigned char *challenge) argument
193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
243 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
322 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
332 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
451 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument
[all...]
/external/chromium/net/base/
H A Dkeygen_handler_openssl.cc27 ASN1_STRING_set(spki.get()->spkac->challenge,
/external/chromium/third_party/libjingle/source/talk/xmpp/
H A Dsaslmechanism.cc43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/
H A Denterprise_platform_keys_private_api.h145 void GetDeviceAttestationEnabledCallback(const std::string& challenge,
147 void PrepareKeyCallback(const std::string& challenge,
182 void GetDeviceAttestationEnabledCallback(const std::string& challenge,
186 void PrepareKeyCallback(const std::string& challenge,
/external/chromium_org/net/base/
H A Dkeygen_handler_openssl.cc27 ASN1_STRING_set(spki.get()->spkac->challenge,
/external/chromium_org/net/websockets/
H A Dwebsocket_handshake_handler.cc139 void GetKeyNumber(const std::string& key, std::string* challenge) { argument
166 challenge->append(part, 4);
235 const GURL& url, std::string* challenge) {
254 *challenge = key;
256 challenge->clear();
262 internal::GetKeyNumber(key, challenge);
268 internal::GetKeyNumber(key, challenge);
270 challenge->append(key3_);
279 std::string* challenge,
309 *challenge
234 GetRequestInfo( const GURL& url, std::string* challenge) argument
276 GetRequestHeaderBlock( const GURL& url, SpdyHeaderBlock* headers, std::string* challenge, int spdy_protocol_version) argument
422 ParseResponseInfo( const HttpResponseInfo& response_info, const std::string& challenge) argument
465 ParseResponseHeaderBlock( const SpdyHeaderBlock& headers, const std::string& challenge, int spdy_protocol_version) argument
[all...]

Completed in 610 milliseconds

12345678910