/external/chromium/net/base/ |
H A D | keygen_handler.cc | 14 const std::string& challenge, 17 challenge_(challenge), 13 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
|
/external/chromium_org/net/base/ |
H A D | keygen_handler.cc | 14 const std::string& challenge, 17 challenge_(challenge), 13 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/openssh/ |
H A D | auth-bsdauth.c | 55 char *challenge = NULL; local 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 60 if (challenge == NULL) { 66 if (challenge == NULL) { 71 authctxt->style, "auth-ssh", &challenge); 73 challenge = NULL; 74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 77 if (challenge == NULL) 85 (*prompts)[0] = xstrdup(challenge); [all...] |
/external/chromium/net/http/ |
H A D | http_auth_handler_basic.cc | 21 // production of challenge that realm is required. 25 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) { argument 29 return ParseChallenge(challenge); 33 HttpAuth::ChallengeTokenizer* challenge) { 34 // Verify the challenge's auth-scheme. 35 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic")) 38 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); 55 HttpAuth::ChallengeTokenizer* challenge) { 57 // should be treated as a rejection. However, if the new challenge 59 HttpUtil::NameValuePairsIterator parameters = challenge 32 ParseChallenge( HttpAuth::ChallengeTokenizer* challenge) argument 54 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument 93 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument [all...] |
H A D | http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon3086 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon3087 178 std::string challenge = tests[i].challenge; local [all...] |
H A D | http_auth_handler_basic.h | 25 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge, 35 HttpAuth::ChallengeTokenizer* challenge); 38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge); 49 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
|
H A D | http_auth_unittest.cc | 31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge, 72 // Basic is the only challenge type, pick it. 80 // Fake is the only challenge type, but it is unsupported. 245 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 247 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 250 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 261 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 263 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 266 EXPECT_EQ(std::string("Basic"), challenge [all...] |
H A D | http_auth_handler.h | 28 // Initializes the handler using a challenge issued by a server. 29 // |challenge| must be non-NULL and have already tokenized the 32 // for later use, and are not part of the initial challenge. 33 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge, 43 // NTLM+Negotiate it may indicate that another round of challenge+response 46 // be made with a different nonce provided in the challenge. 48 // |challenge| must be non-NULL and have already tokenized the 52 HttpAuth::ChallengeTokenizer* challenge) = 0; 88 // The challenge which was issued when creating the handler. 89 const std::string challenge() cons function in class:net::HttpAuthHandler [all...] |
/external/chromium_org/net/http/ |
H A D | http_auth_handler_basic.cc | 20 // Parses a realm from an auth challenge, and converts to UTF8-encoding. 27 // production of challenge that realm is required. 54 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) { argument 58 return ParseChallenge(challenge); 62 HttpAuth::ChallengeTokenizer* challenge) { 63 // Verify the challenge's auth-scheme. 64 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic")) 68 if (!ParseRealm(*challenge, &realm)) 76 HttpAuth::ChallengeTokenizer* challenge) { 78 // should be treated as a rejection. However, if the new challenge 61 ParseChallenge( HttpAuth::ChallengeTokenizer* challenge) argument 75 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument 111 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument [all...] |
H A D | http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon8740 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon8741 186 std::string challenge = tests[i].challenge; local [all...] |
H A D | http_auth_handler_basic.h | 25 HttpAuth::ChallengeTokenizer* challenge, 35 HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 48 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
|
H A D | http_auth_unittest.cc | 31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge, 72 // Basic is the only challenge type, pick it. 80 // Fake is the only challenge type, but it is unsupported. 250 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 252 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 255 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 266 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 268 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 271 EXPECT_EQ(std::string("Basic"), challenge [all...] |
H A D | http_auth_handler.h | 27 // Initializes the handler using a challenge issued by a server. 28 // |challenge| must be non-NULL and have already tokenized the 31 // for later use, and are not part of the initial challenge. 32 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge, 42 // NTLM+Negotiate it may indicate that another round of challenge+response 45 // be made with a different nonce provided in the challenge. 47 // |challenge| must be non-NULL and have already tokenized the 51 HttpAuth::ChallengeTokenizer* challenge) = 0; 88 // The challenge which was issued when creating the handler. 89 const std::string challenge() cons function in class:net::HttpAuthHandler [all...] |
/external/ppp/pppd/ |
H A D | chap-md5.c | 59 unsigned char *challenge, unsigned char *response, 67 challenge_len = *challenge++; 70 /* Generate hash of ID, secret, challenge */ 74 MD5_Update(&ctx, challenge, challenge_len); 89 unsigned char *challenge, char *secret, int secret_len, 94 int challenge_len = *challenge++; 99 MD5_Update(&ctx, challenge, challenge_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMScheme.java | 59 private String challenge; field in class:NTLMScheme 68 this.challenge = null; 92 String challenge = buffer.substringTrimmed(pos, len); 93 if (challenge.length() == 0) { 99 this.challenge = null; 102 this.challenge = challenge; 129 this.challenge);
|
H A D | NTLMEngine.java | 36 * Type2 challenge. 59 * authentication challenge. 65 * @param challenge Type2 challenge. 74 String challenge) throws NTLMEngineException; 69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
/external/chromium_org/chrome/browser/net/spdyproxy/ |
H A D | http_auth_handler_spdyproxy.cc | 37 HttpAuth::ChallengeTokenizer* challenge, 53 // sniffed by a malicious proxy that presents an appropriate challenge. 67 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 81 HttpAuth::ChallengeTokenizer* challenge) { 100 HttpAuth::ChallengeTokenizer* challenge) { 104 return ParseChallenge(challenge); 122 HttpAuth::ChallengeTokenizer* challenge) { 124 // Verify the challenge's auth-scheme. 125 if (!LowerCaseEqualsASCII(challenge->scheme(), "spdyproxy")) { 126 VLOG(1) << "Parsed challenge withou 36 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument 80 HandleAnotherChallenge( HttpAuth::ChallengeTokenizer* challenge) argument 99 Init( HttpAuth::ChallengeTokenizer* challenge) argument 121 ParseChallenge( HttpAuth::ChallengeTokenizer* challenge) argument [all...] |
H A D | http_auth_handler_spdyproxy.h | 27 net::HttpAuth::ChallengeTokenizer* challenge, 47 net::HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 57 virtual bool Init(net::HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 64 bool ParseChallenge(net::HttpAuth::ChallengeTokenizer* challenge);
|
/external/chromium/net/websockets/ |
H A D | websocket_handshake_handler.h | 48 // Also, fill challange data in |challenge|. 49 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge); 51 // Also, fill challenge data in |challenge|. 54 std::string* challenge); 88 const std::string& challenge); 91 const std::string& challenge);
|