Searched refs:challenge (Results 1 - 25 of 210) sorted by relevance

123456789

/external/chromium_org/net/base/
H A Dkeygen_handler.cc18 const std::string& challenge,
21 challenge_(challenge),
17 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
25 addr[2] = challenge;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/chromium_org/net/http/
H A Dhttp_auth_challenge_tokenizer_unittest.cc12 HttpAuthChallengeTokenizer challenge(challenge_str.begin(),
14 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
17 EXPECT_EQ(std::string("Basic"), challenge.scheme());
28 HttpAuthChallengeTokenizer challenge(challenge_str.begin(),
30 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
33 EXPECT_EQ(std::string("Basic"), challenge.scheme());
44 HttpAuthChallengeTokenizer challenge(challenge_str.begin(),
46 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
49 EXPECT_EQ(std::string("Basic"), challenge.scheme());
60 HttpAuthChallengeTokenizer challenge(challenge_st
[all...]
H A Dhttp_log_util.cc16 bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) { argument
19 if (challenge->challenge_text().find(',') != std::string::npos)
22 std::string scheme = base::StringToLowerASCII(challenge->scheme());
60 HttpAuthChallengeTokenizer challenge(value.begin(), value.end());
61 if (ShouldRedactChallenge(&challenge)) {
62 redact_begin = challenge.params_begin();
63 redact_end = challenge.params_end();
H A Dhttp_auth_handler_basic.cc21 // Parses a realm from an auth challenge, and converts to UTF8-encoding.
28 // production of challenge that realm is required.
56 bool HttpAuthHandlerBasic::Init(HttpAuthChallengeTokenizer* challenge) { argument
60 return ParseChallenge(challenge);
64 HttpAuthChallengeTokenizer* challenge) {
65 // Verify the challenge's auth-scheme.
66 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic"))
70 if (!ParseRealm(*challenge, &realm))
78 HttpAuthChallengeTokenizer* challenge) {
80 // should be treated as a rejection. However, if the new challenge
63 ParseChallenge( HttpAuthChallengeTokenizer* challenge) argument
77 HandleAnotherChallenge( HttpAuthChallengeTokenizer* challenge) argument
109 CreateAuthHandler( HttpAuthChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
[all...]
H A Dhttp_auth_handler_basic_unittest.cc36 std::string challenge = "Basic realm=\"Atlantis\""; local
39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
53 const char* challenge; member in struct:net::__anon9267
56 // The handler is initialized using this challenge. The first
58 // to treat the second challenge as a rejection since it is for
65 // A challenge for a different realm.
73 // challenge should be treated as being for "First" realm.
90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
94 std::string challenge(tests[i].challenge);
103 const char* challenge; member in struct:net::__anon9268
187 std::string challenge = tests[i].challenge; local
[all...]
H A Dhttp_auth_handler_basic.h25 HttpAuthChallengeTokenizer* challenge,
35 HttpAuthChallengeTokenizer* challenge) OVERRIDE;
38 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE;
48 bool ParseChallenge(HttpAuthChallengeTokenizer* challenge);
H A Dhttp_auth_handler.h28 // Initializes the handler using a challenge issued by a server.
29 // |challenge| must be non-NULL and have already tokenized the
32 // for later use, and are not part of the initial challenge.
33 bool InitFromChallenge(HttpAuthChallengeTokenizer* challenge,
43 // NTLM+Negotiate it may indicate that another round of challenge+response
46 // be made with a different nonce provided in the challenge.
48 // |challenge| must be non-NULL and have already tokenized the
52 HttpAuthChallengeTokenizer* challenge) = 0;
89 // The challenge which was issued when creating the handler.
90 const std::string challenge() cons function in class:net::HttpAuthHandler
[all...]
/external/ppp/pppd/
H A Dchap-md5.c59 unsigned char *challenge, unsigned char *response,
67 challenge_len = *challenge++;
70 /* Generate hash of ID, secret, challenge */
74 MD5_Update(&ctx, challenge, challenge_len);
89 unsigned char *challenge, char *secret, int secret_len,
94 int challenge_len = *challenge++;
99 MD5_Update(&ctx, challenge, challenge_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap-new.h52 * Semi-arbitrary limits on challenge and response fields.
97 * Note: challenge and response arguments below are formatted as
98 * a length byte followed by the actual challenge/response data.
100 void (*generate_challenge)(unsigned char *challenge);
103 unsigned char *challenge, unsigned char *response,
106 unsigned char *challenge, char *secret, int secret_len,
114 /* Hook for a plugin to validate CHAP challenge */
117 unsigned char *challenge, unsigned char *response,
/external/chromium_org/chrome/browser/resources/cryptotoken/
H A Dusbsignhandler.js96 var challenge = signResult['challenge'];
98 this.notifySuccess_(gnubby, challenge, info);
114 * @param {SignHelperChallenge} challenge Challenge signed
118 UsbSignHandler.prototype.notifySuccess_ = function(gnubby, challenge, info) {
131 'appIdHash': B64_encode(challenge['appIdHash']),
132 'challengeHash': B64_encode(challenge['challengeHash']),
133 'keyHandle': B64_encode(challenge['keyHandle']),
H A Dsigner.js33 function sendSuccessResponse(challenge, info, browserData) {
34 var responseData = makeWebSignResponseDataFromChallenge(challenge);
66 function sendSuccessResponse(challenge, info, browserData) {
67 var responseData = makeU2fSignResponseDataFromChallenge(challenge);
82 * Creates a base U2F responseData object from the server challenge.
83 * @param {SignChallenge} challenge The server challenge.
86 function makeU2fSignResponseDataFromChallenge(challenge) {
88 'keyHandle': challenge['keyHandle']
94 * Creates a base web responseData object from the server challenge
[all...]
/external/apache-http/src/org/apache/http/impl/auth/
H A DNTLMScheme.java65 private String challenge; field in class:NTLMScheme
74 this.challenge = null;
98 String challenge = buffer.substringTrimmed(pos, len);
99 if (challenge.length() == 0) {
105 this.challenge = null;
108 this.challenge = challenge;
135 this.challenge);
H A DNTLMEngine.java36 * Type2 challenge.
64 * authentication challenge.
70 * @param challenge Type2 challenge.
79 String challenge) throws NTLMEngineException;
74 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
/external/chromium_org/net/third_party/mozilla_security_manager/
H A DnsKeygenHandler.h57 // challenge: challenge string sent by server
62 const std::string& challenge,
/external/chromium_org/net/websockets/
H A Dwebsocket_handshake_handler.h49 // Gets request info to open WebSocket connection and fills challenge data in
50 // |challenge|.
51 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge);
53 // Also, fills challenge data in |challenge|.
56 std::string* challenge,
89 const std::string& challenge);
92 const std::string& challenge,
/external/chromium_org/ppapi/c/private/
H A Dppb_platform_verification_private.h68 * Requests a platform challenge for a given service id.
71 * <code>PP_VARTYPE_STRING</code> containing the service_id for the challenge.
73 * @param[in] challenge A <code>PP_Var</code> of type
74 * <code>PP_VARTYPE_ARRAY_BUFFER</code> that contains the challenge data.
89 * the platform challenge has been completed. This callback will only run if
96 struct PP_Var challenge,
/external/chromium_org/ppapi/thunk/
H A Dppb_platform_verification_api.h23 const PP_Var& challenge,
/external/smack/src/org/apache/harmony/javax/security/sasl/
H A DSaslClient.java24 byte[] evaluateChallenge(byte[] challenge) throws SaslException; argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
H A DNetscapeCertRequest.java51 String challenge; field in class:NetscapeCertRequest
96 // challenge IA5STRING
107 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString();
131 String challenge,
137 this.challenge = challenge;
144 content_der.add(new DERIA5String(challenge));
158 return challenge;
163 challenge = value;
196 public boolean verify(String challenge) throw argument
130 NetscapeCertRequest( String challenge, AlgorithmIdentifier signing_alg, PublicKey pub_key) argument
[all...]

Completed in 4708 milliseconds

123456789