/external/chromium_org/net/base/ |
H A D | keygen_handler.cc | 18 const std::string& challenge, 21 challenge_(challenge), 17 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/chromium_org/net/http/ |
H A D | http_auth_challenge_tokenizer_unittest.cc | 12 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), 14 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 17 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 28 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), 30 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 33 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 44 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), 46 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 49 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 60 HttpAuthChallengeTokenizer challenge(challenge_st [all...] |
H A D | http_log_util.cc | 16 bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) { argument 19 if (challenge->challenge_text().find(',') != std::string::npos) 22 std::string scheme = base::StringToLowerASCII(challenge->scheme()); 60 HttpAuthChallengeTokenizer challenge(value.begin(), value.end()); 61 if (ShouldRedactChallenge(&challenge)) { 62 redact_begin = challenge.params_begin(); 63 redact_end = challenge.params_end();
|
H A D | http_auth_handler_basic.cc | 21 // Parses a realm from an auth challenge, and converts to UTF8-encoding. 28 // production of challenge that realm is required. 56 bool HttpAuthHandlerBasic::Init(HttpAuthChallengeTokenizer* challenge) { argument 60 return ParseChallenge(challenge); 64 HttpAuthChallengeTokenizer* challenge) { 65 // Verify the challenge's auth-scheme. 66 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic")) 70 if (!ParseRealm(*challenge, &realm)) 78 HttpAuthChallengeTokenizer* challenge) { 80 // should be treated as a rejection. However, if the new challenge 63 ParseChallenge( HttpAuthChallengeTokenizer* challenge) argument 77 HandleAnotherChallenge( HttpAuthChallengeTokenizer* challenge) argument 109 CreateAuthHandler( HttpAuthChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument [all...] |
H A D | http_auth_handler_basic_unittest.cc | 36 std::string challenge = "Basic realm=\"Atlantis\""; local 39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 53 const char* challenge; member in struct:net::__anon9267 56 // The handler is initialized using this challenge. The first 58 // to treat the second challenge as a rejection since it is for 65 // A challenge for a different realm. 73 // challenge should be treated as being for "First" realm. 90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 94 std::string challenge(tests[i].challenge); 103 const char* challenge; member in struct:net::__anon9268 187 std::string challenge = tests[i].challenge; local [all...] |
H A D | http_auth_handler_basic.h | 25 HttpAuthChallengeTokenizer* challenge, 35 HttpAuthChallengeTokenizer* challenge) OVERRIDE; 38 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE; 48 bool ParseChallenge(HttpAuthChallengeTokenizer* challenge);
|
H A D | http_auth_handler.h | 28 // Initializes the handler using a challenge issued by a server. 29 // |challenge| must be non-NULL and have already tokenized the 32 // for later use, and are not part of the initial challenge. 33 bool InitFromChallenge(HttpAuthChallengeTokenizer* challenge, 43 // NTLM+Negotiate it may indicate that another round of challenge+response 46 // be made with a different nonce provided in the challenge. 48 // |challenge| must be non-NULL and have already tokenized the 52 HttpAuthChallengeTokenizer* challenge) = 0; 89 // The challenge which was issued when creating the handler. 90 const std::string challenge() cons function in class:net::HttpAuthHandler [all...] |
/external/ppp/pppd/ |
H A D | chap-md5.c | 59 unsigned char *challenge, unsigned char *response, 67 challenge_len = *challenge++; 70 /* Generate hash of ID, secret, challenge */ 74 MD5_Update(&ctx, challenge, challenge_len); 89 unsigned char *challenge, char *secret, int secret_len, 94 int challenge_len = *challenge++; 99 MD5_Update(&ctx, challenge, challenge_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.h | 52 * Semi-arbitrary limits on challenge and response fields. 97 * Note: challenge and response arguments below are formatted as 98 * a length byte followed by the actual challenge/response data. 100 void (*generate_challenge)(unsigned char *challenge); 103 unsigned char *challenge, unsigned char *response, 106 unsigned char *challenge, char *secret, int secret_len, 114 /* Hook for a plugin to validate CHAP challenge */ 117 unsigned char *challenge, unsigned char *response,
|
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
H A D | usbsignhandler.js | 96 var challenge = signResult['challenge']; 98 this.notifySuccess_(gnubby, challenge, info); 114 * @param {SignHelperChallenge} challenge Challenge signed 118 UsbSignHandler.prototype.notifySuccess_ = function(gnubby, challenge, info) { 131 'appIdHash': B64_encode(challenge['appIdHash']), 132 'challengeHash': B64_encode(challenge['challengeHash']), 133 'keyHandle': B64_encode(challenge['keyHandle']),
|
H A D | signer.js | 33 function sendSuccessResponse(challenge, info, browserData) { 34 var responseData = makeWebSignResponseDataFromChallenge(challenge); 66 function sendSuccessResponse(challenge, info, browserData) { 67 var responseData = makeU2fSignResponseDataFromChallenge(challenge); 82 * Creates a base U2F responseData object from the server challenge. 83 * @param {SignChallenge} challenge The server challenge. 86 function makeU2fSignResponseDataFromChallenge(challenge) { 88 'keyHandle': challenge['keyHandle'] 94 * Creates a base web responseData object from the server challenge [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMScheme.java | 65 private String challenge; field in class:NTLMScheme 74 this.challenge = null; 98 String challenge = buffer.substringTrimmed(pos, len); 99 if (challenge.length() == 0) { 105 this.challenge = null; 108 this.challenge = challenge; 135 this.challenge);
|
H A D | NTLMEngine.java | 36 * Type2 challenge. 64 * authentication challenge. 70 * @param challenge Type2 challenge. 79 String challenge) throws NTLMEngineException; 74 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
H A D | nsKeygenHandler.h | 57 // challenge: challenge string sent by server 62 const std::string& challenge,
|
/external/chromium_org/net/websockets/ |
H A D | websocket_handshake_handler.h | 49 // Gets request info to open WebSocket connection and fills challenge data in 50 // |challenge|. 51 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge); 53 // Also, fills challenge data in |challenge|. 56 std::string* challenge, 89 const std::string& challenge); 92 const std::string& challenge,
|
/external/chromium_org/ppapi/c/private/ |
H A D | ppb_platform_verification_private.h | 68 * Requests a platform challenge for a given service id. 71 * <code>PP_VARTYPE_STRING</code> containing the service_id for the challenge. 73 * @param[in] challenge A <code>PP_Var</code> of type 74 * <code>PP_VARTYPE_ARRAY_BUFFER</code> that contains the challenge data. 89 * the platform challenge has been completed. This callback will only run if 96 struct PP_Var challenge,
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_platform_verification_api.h | 23 const PP_Var& challenge,
|
/external/smack/src/org/apache/harmony/javax/security/sasl/ |
H A D | SaslClient.java | 24 byte[] evaluateChallenge(byte[] challenge) throws SaslException; argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
H A D | NetscapeCertRequest.java | 51 String challenge; field in class:NetscapeCertRequest 96 // challenge IA5STRING 107 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); 131 String challenge, 137 this.challenge = challenge; 144 content_der.add(new DERIA5String(challenge)); 158 return challenge; 163 challenge = value; 196 public boolean verify(String challenge) throw argument 130 NetscapeCertRequest( String challenge, AlgorithmIdentifier signing_alg, PublicKey pub_key) argument [all...] |