/external/chromium_org/net/http/ |
H A D | http_auth_handler_ntlm_win.cc | 55 HttpAuth::ChallengeTokenizer* challenge, 77 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 54 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
|
H A D | http_auth.cc | 35 // Choose the challenge whose authentication handler gives the maximum score. 73 std::string challenge; local 76 while (headers->EnumerateHeader(&iter, header_name, &challenge)) { 77 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end()); 82 *challenge_used = challenge;
|
H A D | http_auth_handler_digest.cc | 91 HttpAuth::ChallengeTokenizer* challenge, 102 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 109 HttpAuth::ChallengeTokenizer* challenge) { 114 if (!LowerCaseEqualsASCII(challenge->scheme(), "digest")) 117 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); 120 // for the new challenge. 135 bool HttpAuthHandlerDigest::Init(HttpAuth::ChallengeTokenizer* challenge) { argument 136 return ParseChallenge(challenge); 169 // The digest challenge header looks like: 186 // webserver was not sending the realm with a BASIC challenge) 90 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument 108 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument 187 ParseChallenge( HttpAuth::ChallengeTokenizer* challenge) argument [all...] |
H A D | http_auth_handler_negotiate.cc | 42 HttpAuth::ChallengeTokenizer* challenge, 66 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 83 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 167 HttpAuth::ChallengeTokenizer* challenge) { 168 return auth_system_.ParseChallenge(challenge); 188 // The Negotiate challenge header looks like: 190 bool HttpAuthHandlerNegotiate::Init(HttpAuth::ChallengeTokenizer* challenge) { argument 209 auth_system_.ParseChallenge(challenge); 41 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument 166 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
|
H A D | http_auth_handler_negotiate.h | 73 HttpAuth::ChallengeTokenizer* challenge, 110 HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 116 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge) OVERRIDE;
|
H A D | http_auth_handler_digest.h | 68 HttpAuth::ChallengeTokenizer* challenge, 81 HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 84 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 125 // Parse the challenge, saving the results into this instance. 127 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge); 160 // Information parsed from the challenge. 169 // challenge text, rather than |realm_| which has been converted to
|
H A D | http_auth_handler_ntlm_portable.cc | 157 // be included in response to a NTLM challenge. 300 // challenge from the Type-2 message. 304 // param challenge 305 // 8-byte challenge from Type-2 message 309 const uint8* challenge, 320 DESEncrypt(k1, challenge, response); 321 DESEncrypt(k2, challenge, response + 8); 322 DESEncrypt(k3, challenge, response + 16); 370 uint8 challenge[8]; // 8 byte challenge member in struct:net::Type2Msg 308 LM_Response(const uint8* hash, const uint8* challenge, uint8* response) argument 709 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument [all...] |
H A D | http_auth_sspi_win_unittest.cc | 65 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 68 auth_sspi.ParseChallenge(&challenge)); 96 // If the first round challenge has an additional authentication token, it 97 // should be treated as an invalid challenge from the server. 102 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 105 auth_sspi.ParseChallenge(&challenge)); 109 // If a later-round challenge is simply "Negotiate", it should be treated as 110 // an authentication challenge rejection from the server or proxy. 131 // If a later-round challenge has an invalid base64 encoded token, it should 132 // be treated as an invalid challenge [all...] |
/external/chromium_org/third_party/WebKit/Source/core/html/ |
H A D | HTMLKeygenElement.idl | 33 [Reflect] attribute DOMString challenge;
|
/external/chromium/net/http/ |
H A D | http_auth.cc | 35 // Choose the challenge whose authentication handler gives the maximum score. 73 std::string challenge; local 76 while (headers->EnumerateHeader(&iter, header_name, &challenge)) { 77 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end()); 82 *challenge_used = challenge;
|
H A D | http_auth_handler_mock.cc | 75 HttpAuth::ChallengeTokenizer* challenge) { 78 if (!LowerCaseEqualsASCII(challenge->scheme(), "mock")) 87 bool HttpAuthHandlerMock::Init(HttpAuth::ChallengeTokenizer* challenge) { argument 152 HttpAuth::ChallengeTokenizer* challenge, 163 !tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 74 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument 151 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
|
H A D | http_auth_handler_negotiate.cc | 39 HttpAuth::ChallengeTokenizer* challenge, 63 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 74 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 161 HttpAuth::ChallengeTokenizer* challenge) { 162 return auth_system_.ParseChallenge(challenge); 178 // The Negotiate challenge header looks like: 180 bool HttpAuthHandlerNegotiate::Init(HttpAuth::ChallengeTokenizer* challenge) { argument 199 auth_system_.ParseChallenge(challenge); 38 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument 160 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument
|
H A D | http_auth_handler_negotiate.h | 73 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge, 110 HttpAuth::ChallengeTokenizer* challenge); 115 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge);
|
H A D | http_auth_handler_ntlm_portable.cc | 156 // be included in response to a NTLM challenge. 313 // challenge from the Type-2 message. 317 // param challenge 318 // 8-byte challenge from Type-2 message 322 const uint8* challenge, 333 DESEncrypt(k1, challenge, response); 334 DESEncrypt(k2, challenge, response + 8); 335 DESEncrypt(k3, challenge, response + 16); 383 uint8 challenge[8]; // 8 byte challenge member in struct:net::Type2Msg 321 LM_Response(const uint8* hash, const uint8* challenge, uint8* response) argument 722 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument [all...] |
H A D | http_auth_sspi_win_unittest.cc | 65 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 68 auth_sspi.ParseChallenge(&challenge)); 97 // If the first round challenge has an additional authentication token, it 98 // should be treated as an invalid challenge from the server. 103 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 106 auth_sspi.ParseChallenge(&challenge)); 110 // If a later-round challenge is simply "Negotiate", it should be treated as 111 // an authentication challenge rejection from the server or proxy. 133 // If a later-round challenge has an invalid base64 encoded token, it should 134 // be treated as an invalid challenge [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 100 unsigned char *challenge, 254 const u_char *challenge, 361 sprintf(challenge_hex + i * 2, "%02X", challenge[i]); 519 unsigned char *challenge, 531 challenge_len = *challenge++; 587 challenge, 595 mppe_set_keys(challenge, session_key); 605 challenge_len, challenge); 621 ChallengeHash(rmd->PeerChallenge, challenge, user, Challenge); 641 challenge, use 250 run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) argument 517 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument [all...] |
/external/ppp/pppd/ |
H A D | chap_ms.c | 154 { "mschap-challenge", o_string, &mschap_challenge, 155 "specify CHAP challenge" }, 156 { "mschap2-peer-challenge", o_string, &mschap2_peer_challenge, 157 "specify CHAP peer challenge" }, 163 * chapms_generate_challenge - generate a challenge for MS-CHAP. 164 * For MS-CHAP the challenge length is fixed at 8 bytes. 165 * The length goes in challenge[0] and the actual challenge starts 166 * at challenge[1]. 169 chapms_generate_challenge(unsigned char *challenge) argument 181 chapms2_generate_challenge(unsigned char *challenge) argument 193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 243 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 322 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 332 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 451 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument [all...] |
/external/chromium/net/base/ |
H A D | keygen_handler_openssl.cc | 27 ASN1_STRING_set(spki.get()->spkac->challenge,
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
H A D | saslmechanism.cc | 43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
|
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/ |
H A D | enterprise_platform_keys_private_api.h | 145 void GetDeviceAttestationEnabledCallback(const std::string& challenge, 147 void PrepareKeyCallback(const std::string& challenge, 182 void GetDeviceAttestationEnabledCallback(const std::string& challenge, 186 void PrepareKeyCallback(const std::string& challenge,
|
/external/chromium_org/net/base/ |
H A D | keygen_handler_openssl.cc | 27 ASN1_STRING_set(spki.get()->spkac->challenge,
|
/external/chromium_org/net/websockets/ |
H A D | websocket_handshake_handler.cc | 139 void GetKeyNumber(const std::string& key, std::string* challenge) { argument 166 challenge->append(part, 4); 235 const GURL& url, std::string* challenge) { 254 *challenge = key; 256 challenge->clear(); 262 internal::GetKeyNumber(key, challenge); 268 internal::GetKeyNumber(key, challenge); 270 challenge->append(key3_); 279 std::string* challenge, 309 *challenge 234 GetRequestInfo( const GURL& url, std::string* challenge) argument 276 GetRequestHeaderBlock( const GURL& url, SpdyHeaderBlock* headers, std::string* challenge, int spdy_protocol_version) argument 422 ParseResponseInfo( const HttpResponseInfo& response_info, const std::string& challenge) argument 465 ParseResponseHeaderBlock( const SpdyHeaderBlock& headers, const std::string& challenge, int spdy_protocol_version) argument [all...] |