Searched defs:challenge (Results 1 - 25 of 124) sorted by relevance

12345

/external/chromium_org/net/base/
H A Dkeygen_handler.cc18 const std::string& challenge,
21 challenge_(challenge),
17 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
H A Dkeygen_handler_unittest.cc57 768, "some challenge", GURL("http://www.example.com")));
73 // Assert that |result| is a valid output for KeygenHandler given challenge
74 // string of |challenge|.
76 const std::string& challenge) {
100 // Challenge String: some challenge
114 AssertValidSignedPublicKeyAndChallenge(result, "some challenge");
117 void ConcurrencyTestCallback(const std::string& challenge, argument
150 "some challenge",
164 AssertValidSignedPublicKeyAndChallenge(results[i], "some challenge");
75 AssertValidSignedPublicKeyAndChallenge(const std::string& result, const std::string& challenge) argument
/external/chromium_org/chrome/browser/chromeos/login/easy_unlock/
H A Deasy_unlock_types.h31 std::string challenge; member in struct:chromeos::EasyUnlockDeviceKeyData
/external/chromium_org/net/http/
H A Dhttp_log_util.cc16 bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) { argument
19 if (challenge->challenge_text().find(',') != std::string::npos)
22 std::string scheme = base::StringToLowerASCII(challenge->scheme());
60 HttpAuthChallengeTokenizer challenge(value.begin(), value.end());
61 if (ShouldRedactChallenge(&challenge)) {
62 redact_begin = challenge.params_begin();
63 redact_end = challenge.params_end();
H A Dhttp_auth_handler_basic_unittest.cc36 std::string challenge = "Basic realm=\"Atlantis\""; local
39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
53 const char* challenge; member in struct:net::__anon9267
56 // The handler is initialized using this challenge. The first
58 // to treat the second challenge as a rejection since it is for
65 // A challenge for a different realm.
73 // challenge should be treated as being for "First" realm.
90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
94 std::string challenge(tests[i].challenge);
103 const char* challenge; member in struct:net::__anon9268
187 std::string challenge = tests[i].challenge; local
[all...]
H A Dhttp_auth_handler_ntlm.cc20 HttpAuthChallengeTokenizer* challenge) {
21 return ParseChallenge(challenge, false);
70 // Initial challenge.
101 // The NTLM challenge header looks like:
106 // auth_sspi_ contains state for whether or not this is the initial challenge.
111 // there was previously a challenge round.
116 // Verify the challenge's auth-scheme.
19 HandleAnotherChallenge( HttpAuthChallengeTokenizer* challenge) argument
H A Dhttp_auth_handler_unittest.cc22 std::string challenge = "Mock asdf"; local
39 challenge.begin(), challenge.end());
H A Dhttp_auth.cc36 // Choose the challenge whose authentication handler gives the maximum score.
74 std::string challenge; local
77 while (headers->EnumerateHeader(&iter, header_name, &challenge)) {
78 HttpAuthChallengeTokenizer props(challenge.begin(), challenge.end());
83 *challenge_used = challenge;
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
/external/apache-http/src/org/apache/http/impl/auth/
H A DNTLMEngine.java36 * Type2 challenge.
64 * authentication challenge.
70 * @param challenge Type2 challenge.
79 String challenge) throws NTLMEngineException;
74 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
/external/chromium_org/net/websockets/
H A Dwebsocket_handshake_handler_spdy_test.cc53 std::string challenge; local
57 &challenge,
78 EXPECT_EQ(expected_challenge, challenge);
88 headers, challenge, spdy_util_.spdy_version()));
125 std::string challenge; local
129 &challenge,
152 EXPECT_EQ(expected_challenge, challenge);
167 headers, challenge, spdy_util_.spdy_version()));
H A Dwebsocket_handshake_handler_test.cc186 std::string challenge; local
188 request_handler.GetRequestInfo(url, &challenge);
205 EXPECT_EQ("dGhlIHNhbXBsZSBub25jZQ==", challenge);
227 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge));
/external/chromium_org/ppapi/cpp/private/
H A Dplatform_verification.cc41 const Var& challenge,
50 pp_resource(), service_id.pp_var(), challenge.pp_var(),
39 ChallengePlatform( const Var& service_id, const Var& challenge, Var* signed_data, Var* signed_data_signature, Var* platform_key_certificate, const CompletionCallback& callback) argument
/external/chromium_org/ppapi/thunk/
H A Dppb_platform_verification_private_thunk.cc37 struct PP_Var challenge,
48 challenge,
35 ChallengePlatform(PP_Resource instance, struct PP_Var service_id, struct PP_Var challenge, struct PP_Var* signed_data, struct PP_Var* signed_data_signature, struct PP_Var* platform_key_certificate, struct PP_CompletionCallback callback) argument
/external/chromium_org/third_party/libjingle/source/talk/xmpp/
H A Dsaslmechanism.cc43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
H A DAuthenticationHelper.java35 * @param challenge
36 * the 401/407 challenge response
55 public abstract ClientTransaction handleChallenge(Response challenge, argument
/external/nist-sip/java/gov/nist/javax/sip/parser/
H A DChallengeParser.java33 * Parser for the challenge portion of the authentication header.
47 * @param String challenge message to parse to set
49 protected ChallengeParser(String challenge) { argument
50 super(challenge);
55 * @param String challenge message to parse to set
62 * Get the parameter of the challenge string
/external/smack/src/org/jivesoftware/smack/sasl/
H A DSASLAnonymous.java55 public void challengeReceived(String challenge) throws IOException { argument
56 // Build the challenge response stanza encoding the response text
/external/chromium_org/chrome/browser/renderer_host/pepper/
H A Dpepper_platform_verification_message_filter.cc57 const std::vector<uint8_t>& challenge) {
80 std::string(challenge.begin(), challenge.end()),
54 OnChallengePlatform( ppapi::host::HostMessageContext* context, const std::string& service_id, const std::vector<uint8_t>& challenge) argument
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/
H A Dserverpairingsession.cc26 PoloChallengeResponse* challenge,
28 : PairingSession(wire, context, challenge),
24 ServerPairingSession(wire::PoloWireAdapter *wire, PairingContext *context, PoloChallengeResponse* challenge, const std::string& server_name) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
69 challenge, challenge_len);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,

Completed in 526 milliseconds

12345