/external/chromium_org/net/base/ |
H A D | keygen_handler.cc | 18 const std::string& challenge, 21 challenge_(challenge), 17 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
|
H A D | keygen_handler_unittest.cc | 40 // Assert that |result| is a valid output for KeygenHandler given challenge 41 // string of |challenge|. 43 const std::string& challenge) { 67 // Challenge String: some challenge 77 KeygenHandler handler(768, "some challenge", GURL("http://www.example.com")); 81 AssertValidSignedPublicKeyAndChallenge(result, "some challenge"); 85 const std::string& challenge, 90 KeygenHandler handler(768, challenge, GURL("http://www.example.com")); 116 base::Bind(ConcurrencyTestCallback, events[i], "some challenge", 128 AssertValidSignedPublicKeyAndChallenge(results[i], "some challenge"); 42 AssertValidSignedPublicKeyAndChallenge(const std::string& result, const std::string& challenge) argument 84 ConcurrencyTestCallback(base::WaitableEvent* event, const std::string& challenge, std::string* result) argument [all...] |
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
H A D | webrequest.js | 201 if (!incomingChallenge.hasOwnProperty('challenge')) 322 * @param {!string} serverChallenge The server's challenge, as a base64- 331 'challenge' : serverChallenge, 340 * @param {!string} serverChallenge The server's challenge, as a base64- 354 * @param {!string} serverChallenge The server's challenge, as a base64- 377 var challenge = { 383 challenge['version'] = (version || 'U2F_V1'); 384 return challenge;
|
H A D | singlesigner.js | 7 * signing each challenge in an array of challenges until a success condition 15 * operation using each challenge in an array of challenges until its success 20 * For enroll, success is defined as each challenge yielding wrong data. This 22 * challenge. 24 * For sign, success is defined as any challenge yielding ok or waiting for 89 /** The signer is currently signing a challenge. */ 171 // the appId for some challenge. 265 * @param {number} challengeIndex Index of challenge to sign 287 var challenge = this.challenges_[challengeIndex]; 288 var challengeHash = challenge [all...] |
/external/chromium_org/net/http/ |
H A D | http_log_util.cc | 15 bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) { argument 18 if (challenge->challenge_text().find(',') != std::string::npos) 21 std::string scheme = StringToLowerASCII(challenge->scheme()); 65 HttpAuthChallengeTokenizer challenge(value.begin(), value.end()); 66 if (ShouldRedactChallenge(&challenge)) { 67 redact_begin = challenge.params_begin(); 68 redact_end = challenge.params_end();
|
H A D | http_auth_handler_basic_unittest.cc | 36 std::string challenge = "Basic realm=\"Atlantis\""; local 39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 53 const char* challenge; member in struct:net::__anon8661 56 // The handler is initialized using this challenge. The first 58 // to treat the second challenge as a rejection since it is for 65 // A challenge for a different realm. 73 // challenge should be treated as being for "First" realm. 90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 94 std::string challenge(tests[i].challenge); 103 const char* challenge; member in struct:net::__anon8662 187 std::string challenge = tests[i].challenge; local [all...] |
H A D | http_auth_handler_ntlm.cc | 20 HttpAuthChallengeTokenizer* challenge) { 21 return ParseChallenge(challenge, false); 70 // Initial challenge. 101 // The NTLM challenge header looks like: 106 // auth_sspi_ contains state for whether or not this is the initial challenge. 111 // there was previously a challenge round. 116 // Verify the challenge's auth-scheme. 19 HandleAnotherChallenge( HttpAuthChallengeTokenizer* challenge) argument
|
H A D | http_auth_handler_unittest.cc | 22 std::string challenge = "Mock asdf"; local 39 challenge.begin(), challenge.end());
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMEngine.java | 36 * Type2 challenge. 59 * authentication challenge. 65 * @param challenge Type2 challenge. 74 String challenge) throws NTLMEngineException; 69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
/external/chromium_org/net/websockets/ |
H A D | websocket_handshake_handler_spdy_test.cc | 53 std::string challenge; local 57 &challenge, 78 EXPECT_EQ(expected_challenge, challenge); 88 headers, challenge, spdy_util_.spdy_version())); 125 std::string challenge; local 129 &challenge, 152 EXPECT_EQ(expected_challenge, challenge); 167 headers, challenge, spdy_util_.spdy_version()));
|
H A D | websocket_handshake_handler_test.cc | 186 std::string challenge; local 188 request_handler.GetRequestInfo(url, &challenge); 205 EXPECT_EQ("dGhlIHNhbXBsZSBub25jZQ==", challenge); 227 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge));
|
/external/chromium_org/ppapi/cpp/private/ |
H A D | platform_verification.cc | 41 const Var& challenge, 50 pp_resource(), service_id.pp_var(), challenge.pp_var(), 39 ChallengePlatform( const Var& service_id, const Var& challenge, Var* signed_data, Var* signed_data_signature, Var* platform_key_certificate, const CompletionCallback& callback) argument
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_platform_verification_private_thunk.cc | 37 struct PP_Var challenge, 48 challenge, 35 ChallengePlatform(PP_Resource instance, struct PP_Var service_id, struct PP_Var challenge, struct PP_Var* signed_data, struct PP_Var* signed_data_signature, struct PP_Var* platform_key_certificate, struct PP_CompletionCallback callback) argument
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | saslmechanism.cc | 43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
H A D | AuthenticationHelper.java | 35 * @param challenge 36 * the 401/407 challenge response 55 public abstract ClientTransaction handleChallenge(Response challenge, argument
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
H A D | ChallengeParser.java | 33 * Parser for the challenge portion of the authentication header. 47 * @param String challenge message to parse to set 49 protected ChallengeParser(String challenge) { argument 50 super(challenge); 55 * @param String challenge message to parse to set 62 * Get the parameter of the challenge string
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
H A D | SASLAnonymous.java | 55 public void challengeReceived(String challenge) throws IOException {
argument 56 // Build the challenge response stanza encoding the response text
|
/external/chromium_org/chrome/browser/renderer_host/pepper/ |
H A D | pepper_platform_verification_message_filter.cc | 57 const std::vector<uint8_t>& challenge) { 80 std::string(challenge.begin(), challenge.end()), 54 OnChallengePlatform( ppapi::host::HostMessageContext* context, const std::string& service_id, const std::vector<uint8_t>& challenge) argument
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
H A D | serverpairingsession.cc | 26 PoloChallengeResponse* challenge, 28 : PairingSession(wire, context, challenge), 24 ServerPairingSession(wire::PoloWireAdapter *wire, PairingContext *context, PoloChallengeResponse* challenge, const std::string& server_name) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|