Searched defs:challenge (Results 1 - 25 of 128) sorted by relevance

123456

/external/chromium_org/net/base/
H A Dkeygen_handler.cc18 const std::string& challenge,
21 challenge_(challenge),
17 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
H A Dkeygen_handler_unittest.cc40 // Assert that |result| is a valid output for KeygenHandler given challenge
41 // string of |challenge|.
43 const std::string& challenge) {
67 // Challenge String: some challenge
77 KeygenHandler handler(768, "some challenge", GURL("http://www.example.com"));
81 AssertValidSignedPublicKeyAndChallenge(result, "some challenge");
85 const std::string& challenge,
90 KeygenHandler handler(768, challenge, GURL("http://www.example.com"));
116 base::Bind(ConcurrencyTestCallback, events[i], "some challenge",
128 AssertValidSignedPublicKeyAndChallenge(results[i], "some challenge");
42 AssertValidSignedPublicKeyAndChallenge(const std::string& result, const std::string& challenge) argument
84 ConcurrencyTestCallback(base::WaitableEvent* event, const std::string& challenge, std::string* result) argument
[all...]
/external/chromium_org/chrome/browser/resources/cryptotoken/
H A Dwebrequest.js201 if (!incomingChallenge.hasOwnProperty('challenge'))
322 * @param {!string} serverChallenge The server's challenge, as a base64-
331 'challenge' : serverChallenge,
340 * @param {!string} serverChallenge The server's challenge, as a base64-
354 * @param {!string} serverChallenge The server's challenge, as a base64-
377 var challenge = {
383 challenge['version'] = (version || 'U2F_V1');
384 return challenge;
H A Dsinglesigner.js7 * signing each challenge in an array of challenges until a success condition
15 * operation using each challenge in an array of challenges until its success
20 * For enroll, success is defined as each challenge yielding wrong data. This
22 * challenge.
24 * For sign, success is defined as any challenge yielding ok or waiting for
89 /** The signer is currently signing a challenge. */
171 // the appId for some challenge.
265 * @param {number} challengeIndex Index of challenge to sign
287 var challenge = this.challenges_[challengeIndex];
288 var challengeHash = challenge
[all...]
/external/chromium_org/net/http/
H A Dhttp_log_util.cc15 bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) { argument
18 if (challenge->challenge_text().find(',') != std::string::npos)
21 std::string scheme = StringToLowerASCII(challenge->scheme());
65 HttpAuthChallengeTokenizer challenge(value.begin(), value.end());
66 if (ShouldRedactChallenge(&challenge)) {
67 redact_begin = challenge.params_begin();
68 redact_end = challenge.params_end();
H A Dhttp_auth_handler_basic_unittest.cc36 std::string challenge = "Basic realm=\"Atlantis\""; local
39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
53 const char* challenge; member in struct:net::__anon8661
56 // The handler is initialized using this challenge. The first
58 // to treat the second challenge as a rejection since it is for
65 // A challenge for a different realm.
73 // challenge should be treated as being for "First" realm.
90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
94 std::string challenge(tests[i].challenge);
103 const char* challenge; member in struct:net::__anon8662
187 std::string challenge = tests[i].challenge; local
[all...]
H A Dhttp_auth_handler_ntlm.cc20 HttpAuthChallengeTokenizer* challenge) {
21 return ParseChallenge(challenge, false);
70 // Initial challenge.
101 // The NTLM challenge header looks like:
106 // auth_sspi_ contains state for whether or not this is the initial challenge.
111 // there was previously a challenge round.
116 // Verify the challenge's auth-scheme.
19 HandleAnotherChallenge( HttpAuthChallengeTokenizer* challenge) argument
H A Dhttp_auth_handler_unittest.cc22 std::string challenge = "Mock asdf"; local
39 challenge.begin(), challenge.end());
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/apache-http/src/org/apache/http/impl/auth/
H A DNTLMEngine.java36 * Type2 challenge.
59 * authentication challenge.
65 * @param challenge Type2 challenge.
74 String challenge) throws NTLMEngineException;
69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
/external/chromium_org/net/websockets/
H A Dwebsocket_handshake_handler_spdy_test.cc53 std::string challenge; local
57 &challenge,
78 EXPECT_EQ(expected_challenge, challenge);
88 headers, challenge, spdy_util_.spdy_version()));
125 std::string challenge; local
129 &challenge,
152 EXPECT_EQ(expected_challenge, challenge);
167 headers, challenge, spdy_util_.spdy_version()));
H A Dwebsocket_handshake_handler_test.cc186 std::string challenge; local
188 request_handler.GetRequestInfo(url, &challenge);
205 EXPECT_EQ("dGhlIHNhbXBsZSBub25jZQ==", challenge);
227 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge));
/external/chromium_org/ppapi/cpp/private/
H A Dplatform_verification.cc41 const Var& challenge,
50 pp_resource(), service_id.pp_var(), challenge.pp_var(),
39 ChallengePlatform( const Var& service_id, const Var& challenge, Var* signed_data, Var* signed_data_signature, Var* platform_key_certificate, const CompletionCallback& callback) argument
/external/chromium_org/ppapi/thunk/
H A Dppb_platform_verification_private_thunk.cc37 struct PP_Var challenge,
48 challenge,
35 ChallengePlatform(PP_Resource instance, struct PP_Var service_id, struct PP_Var challenge, struct PP_Var* signed_data, struct PP_Var* signed_data_signature, struct PP_Var* platform_key_certificate, struct PP_CompletionCallback callback) argument
/external/chromium_org/third_party/libjingle/source/talk/xmpp/
H A Dsaslmechanism.cc43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
H A DAuthenticationHelper.java35 * @param challenge
36 * the 401/407 challenge response
55 public abstract ClientTransaction handleChallenge(Response challenge, argument
/external/nist-sip/java/gov/nist/javax/sip/parser/
H A DChallengeParser.java33 * Parser for the challenge portion of the authentication header.
47 * @param String challenge message to parse to set
49 protected ChallengeParser(String challenge) { argument
50 super(challenge);
55 * @param String challenge message to parse to set
62 * Get the parameter of the challenge string
/external/smack/src/org/jivesoftware/smack/sasl/
H A DSASLAnonymous.java55 public void challengeReceived(String challenge) throws IOException { argument
56 // Build the challenge response stanza encoding the response text
/external/chromium_org/chrome/browser/renderer_host/pepper/
H A Dpepper_platform_verification_message_filter.cc57 const std::vector<uint8_t>& challenge) {
80 std::string(challenge.begin(), challenge.end()),
54 OnChallengePlatform( ppapi::host::HostMessageContext* context, const std::string& service_id, const std::vector<uint8_t>& challenge) argument
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/
H A Dserverpairingsession.cc26 PoloChallengeResponse* challenge,
28 : PairingSession(wire, context, challenge),
24 ServerPairingSession(wire::PoloWireAdapter *wire, PairingContext *context, PoloChallengeResponse* challenge, const std::string& server_name) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,

Completed in 680 milliseconds

123456