/external/chromium_org/net/base/ |
H A D | keygen_handler.cc | 18 const std::string& challenge, 21 challenge_(challenge), 17 KeygenHandler(int key_size_in_bits, const std::string& challenge, const GURL& url) argument
|
H A D | keygen_handler_unittest.cc | 57 768, "some challenge", GURL("http://www.example.com"))); 73 // Assert that |result| is a valid output for KeygenHandler given challenge 74 // string of |challenge|. 76 const std::string& challenge) { 100 // Challenge String: some challenge 114 AssertValidSignedPublicKeyAndChallenge(result, "some challenge"); 117 void ConcurrencyTestCallback(const std::string& challenge, argument 150 "some challenge", 164 AssertValidSignedPublicKeyAndChallenge(results[i], "some challenge"); 75 AssertValidSignedPublicKeyAndChallenge(const std::string& result, const std::string& challenge) argument
|
/external/chromium_org/chrome/browser/chromeos/login/easy_unlock/ |
H A D | easy_unlock_types.h | 31 std::string challenge; member in struct:chromeos::EasyUnlockDeviceKeyData
|
/external/chromium_org/net/http/ |
H A D | http_log_util.cc | 16 bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) { argument 19 if (challenge->challenge_text().find(',') != std::string::npos) 22 std::string scheme = base::StringToLowerASCII(challenge->scheme()); 60 HttpAuthChallengeTokenizer challenge(value.begin(), value.end()); 61 if (ShouldRedactChallenge(&challenge)) { 62 redact_begin = challenge.params_begin(); 63 redact_end = challenge.params_end();
|
H A D | http_auth_handler_basic_unittest.cc | 36 std::string challenge = "Basic realm=\"Atlantis\""; local 39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 53 const char* challenge; member in struct:net::__anon9267 56 // The handler is initialized using this challenge. The first 58 // to treat the second challenge as a rejection since it is for 65 // A challenge for a different realm. 73 // challenge should be treated as being for "First" realm. 90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 94 std::string challenge(tests[i].challenge); 103 const char* challenge; member in struct:net::__anon9268 187 std::string challenge = tests[i].challenge; local [all...] |
H A D | http_auth_handler_ntlm.cc | 20 HttpAuthChallengeTokenizer* challenge) { 21 return ParseChallenge(challenge, false); 70 // Initial challenge. 101 // The NTLM challenge header looks like: 106 // auth_sspi_ contains state for whether or not this is the initial challenge. 111 // there was previously a challenge round. 116 // Verify the challenge's auth-scheme. 19 HandleAnotherChallenge( HttpAuthChallengeTokenizer* challenge) argument
|
H A D | http_auth_handler_unittest.cc | 22 std::string challenge = "Mock asdf"; local 39 challenge.begin(), challenge.end());
|
H A D | http_auth.cc | 36 // Choose the challenge whose authentication handler gives the maximum score. 74 std::string challenge; local 77 while (headers->EnumerateHeader(&iter, header_name, &challenge)) { 78 HttpAuthChallengeTokenizer props(challenge.begin(), challenge.end()); 83 *challenge_used = challenge;
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 25 addr[2] = challenge;
|
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMEngine.java | 36 * Type2 challenge. 64 * authentication challenge. 70 * @param challenge Type2 challenge. 79 String challenge) throws NTLMEngineException; 74 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
/external/chromium_org/net/websockets/ |
H A D | websocket_handshake_handler_spdy_test.cc | 53 std::string challenge; local 57 &challenge, 78 EXPECT_EQ(expected_challenge, challenge); 88 headers, challenge, spdy_util_.spdy_version())); 125 std::string challenge; local 129 &challenge, 152 EXPECT_EQ(expected_challenge, challenge); 167 headers, challenge, spdy_util_.spdy_version()));
|
H A D | websocket_handshake_handler_test.cc | 186 std::string challenge; local 188 request_handler.GetRequestInfo(url, &challenge); 205 EXPECT_EQ("dGhlIHNhbXBsZSBub25jZQ==", challenge); 227 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge));
|
/external/chromium_org/ppapi/cpp/private/ |
H A D | platform_verification.cc | 41 const Var& challenge, 50 pp_resource(), service_id.pp_var(), challenge.pp_var(), 39 ChallengePlatform( const Var& service_id, const Var& challenge, Var* signed_data, Var* signed_data_signature, Var* platform_key_certificate, const CompletionCallback& callback) argument
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_platform_verification_private_thunk.cc | 37 struct PP_Var challenge, 48 challenge, 35 ChallengePlatform(PP_Resource instance, struct PP_Var service_id, struct PP_Var challenge, struct PP_Var* signed_data, struct PP_Var* signed_data_signature, struct PP_Var* platform_key_certificate, struct PP_CompletionCallback callback) argument
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | saslmechanism.cc | 43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) { argument
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
H A D | AuthenticationHelper.java | 35 * @param challenge 36 * the 401/407 challenge response 55 public abstract ClientTransaction handleChallenge(Response challenge, argument
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
H A D | ChallengeParser.java | 33 * Parser for the challenge portion of the authentication header. 47 * @param String challenge message to parse to set 49 protected ChallengeParser(String challenge) { argument 50 super(challenge); 55 * @param String challenge message to parse to set 62 * Get the parameter of the challenge string
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
H A D | SASLAnonymous.java | 55 public void challengeReceived(String challenge) throws IOException {
argument 56 // Build the challenge response stanza encoding the response text
|
/external/chromium_org/chrome/browser/renderer_host/pepper/ |
H A D | pepper_platform_verification_message_filter.cc | 57 const std::vector<uint8_t>& challenge) { 80 std::string(challenge.begin(), challenge.end()), 54 OnChallengePlatform( ppapi::host::HostMessageContext* context, const std::string& service_id, const std::vector<uint8_t>& challenge) argument
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
H A D | serverpairingsession.cc | 26 PoloChallengeResponse* challenge, 28 : PairingSession(wire, context, challenge), 24 ServerPairingSession(wire::PoloWireAdapter *wire, PairingContext *context, PoloChallengeResponse* challenge, const std::string& server_name) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|