/external/chromium/net/http/ |
http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon3680 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon3681 178 std::string challenge = tests[i].challenge; local [all...] |
http_auth_handler_unittest.cc | 22 std::string challenge = "Mock asdf"; local 39 challenge.begin(), challenge.end());
|
http_auth.cc | 35 // Choose the challenge whose authentication handler gives the maximum score. 46 << ErrorToString(rv) << " Challenge: " << cur_challenge; 73 std::string challenge; local 76 while (headers->EnumerateHeader(&iter, header_name, &challenge)) { 77 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end()); 82 *challenge_used = challenge;
|
http_auth_handler.h | 28 // Initializes the handler using a challenge issued by a server. 29 // |challenge| must be non-NULL and have already tokenized the 32 // for later use, and are not part of the initial challenge. 33 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge, 43 // NTLM+Negotiate it may indicate that another round of challenge+response 46 // be made with a different nonce provided in the challenge. 48 // |challenge| must be non-NULL and have already tokenized the 52 HttpAuth::ChallengeTokenizer* challenge) = 0; 88 // The challenge which was issued when creating the handler. 89 const std::string challenge() const function in class:net::HttpAuthHandler [all...] |
http_auth_handler_digest_unittest.cc | 24 // |challenge|, and generates a response to the challenge which is returned in 30 // of the |challenge|. Otherwise, the scheme and host and port of |request_url| 31 // indicates the origin of the challenge. 35 const std::string& challenge, 44 EXPECT_FALSE(challenge.empty()); 54 // Create a handler for a particular challenge. 57 challenge, target, url_origin.GetOrigin(), BoundNetLog(), &handler); 63 // Create a token in response to the challenge. 87 // The challenge string 88 const char* challenge; member in struct:net::__anon3683 374 const char* challenge; member in struct:net::__anon3684 [all...] |
/external/webkit/Source/WebKit/mac/Panels/ |
WebAuthenticationPanel.h | 48 NSURLAuthenticationChallenge *challenge; variable
|
/external/webkit/Source/WebKit2/WebProcess/Authentication/ |
AuthenticationManager.cpp | 86 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 87 ASSERT(!challenge.isNull()); 88 AuthenticationClient* coreClient = challenge.authenticationClient(); 90 // This authentication challenge comes from a download. 91 Download::receivedCredential(challenge, credential); 96 coreClient->receivedCredential(challenge, credential); 101 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 102 ASSERT(!challenge.isNull()); 103 AuthenticationClient* coreClient = challenge.authenticationClient(); 105 // This authentication challenge comes from a download 115 AuthenticationChallenge challenge = m_challenges.take(challengeID); local [all...] |
/external/wpa_supplicant/tests/ |
test_ms_funcs.c | 31 u8 challenge[] = { 0xD0, 0x2E, 0x43, 0x86, 0xBC, 0xE9, 0x12, 0x26 }; local 67 if (memcmp(challenge, buf, sizeof(challenge)) != 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_md5.c | 40 const u8 *pos, *challenge, *password; local 61 * CHAP Challenge: 62 * Value-Size (1 octet) | Value(Challenge) | Name(optional) 66 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 73 challenge = pos; 74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 75 challenge, challenge_len); 77 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_ms_funcs.c | 31 u8 challenge[] = { 0xD0, 0x2E, 0x43, 0x86, 0xBC, 0xE9, 0x12, 0x26 }; local 67 if (memcmp(challenge, buf, sizeof(challenge)) != 0) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 40 const u8 *pos, *challenge, *password; local 61 * CHAP Challenge: 62 * Value-Size (1 octet) | Value(Challenge) | Name(optional) 66 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 73 challenge = pos; 74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 75 challenge, challenge_len); 77 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
/external/wpa_supplicant/ |
eap_md5.c | 43 const u8 *pos, *challenge, *password; local 67 * CHAP Challenge: 68 * Value-Size (1 octet) | Value(Challenge) | Name(optional) 73 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 80 challenge = pos; 81 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 82 challenge, challenge_len); 84 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 105 addr[2] = challenge;
|
ms_funcs.c | 30 * @challenge: 8-octet Challenge (OUT) 34 u8 *challenge) 48 os_memcpy(challenge, hash, 8); 93 * @challenge: 8-octet Challenge (IN) 97 void challenge_response(const u8 *challenge, const u8 *password_hash, 101 des_encrypt(challenge, password_hash, response); 102 des_encrypt(challenge, password_hash + 7, response + 8); 106 des_encrypt(challenge, zpwd, response + 16) 125 u8 challenge[8]; local 150 u8 challenge[8]; local 189 u8 password_hash_hash[16], challenge[8]; local [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMScheme.java | 59 private String challenge; field in class:NTLMScheme 68 this.challenge = null; 92 String challenge = buffer.substringTrimmed(pos, len); local 93 if (challenge.length() == 0) { 99 this.challenge = null; 102 this.challenge = challenge; 129 this.challenge);
|
/external/apache-http/src/org/apache/http/impl/client/ |
AbstractAuthenticationHandler.java | 134 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local 136 if (challenge != null) { 151 this.log.debug("Challenge for " + id + " authentication scheme not available");
|
/external/bluetooth/bluez/gdbus/ |
polkit.c | 98 dbus_bool_t authorized, challenge; local 103 dbus_message_iter_get_basic(&result, &challenge);
|
/external/chromium/net/websockets/ |
websocket_handshake_handler_unittest.cc | 198 std::string challenge; local 200 request_handler.GetRequestInfo(url, &challenge); 219 EXPECT_EQ(expected_challenge, challenge); 245 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge)); 282 std::string challenge; local 284 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, &headers, &challenge)); 304 EXPECT_EQ(expected_challenge, challenge); 313 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers, challenge)); 352 std::string challenge; local 354 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, &headers, &challenge)); [all...] |
/external/openssl/apps/ |
spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 132 else if (strcmp(*argv,"-challenge") == 0) 135 challenge= *(++argv); 174 BIO_printf(bio_err," -challenge arg challenge string\n"); 203 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 204 challenge, (int)strlen(challenge));
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_md5.c | 25 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 55 if (os_get_random(data->challenge, CHALLENGE_LEN)) { 71 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 72 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 128 data->challenge, CHALLENGE_LEN, hash);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_md5.c | 26 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 56 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 72 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 73 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 129 data->challenge, CHALLENGE_LEN, hash);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.c | 30 * @challenge: 8-octet Challenge (OUT) 34 u8 *challenge) 48 os_memcpy(challenge, hash, 8); 93 * @challenge: 8-octet Challenge (IN) 97 void challenge_response(const u8 *challenge, const u8 *password_hash, 101 des_encrypt(challenge, password_hash, response); 102 des_encrypt(challenge, password_hash + 7, response + 8); 106 des_encrypt(challenge, zpwd, response + 16) 125 u8 challenge[8]; local 150 u8 challenge[8]; local 189 u8 password_hash_hash[16], challenge[8]; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 29 * @challenge: 8-octet Challenge (OUT) 34 u8 *challenge) 49 os_memcpy(challenge, hash, 8); 97 * @challenge: 8-octet Challenge (IN) 101 void challenge_response(const u8 *challenge, const u8 *password_hash, 105 des_encrypt(challenge, password_hash, response); 106 des_encrypt(challenge, password_hash + 7, response + 8); 110 des_encrypt(challenge, zpwd, response + 16) 130 u8 challenge[8]; local 158 u8 challenge[8]; local 201 u8 password_hash_hash[16], challenge[8]; local [all...] |
/frameworks/base/core/tests/coretests/src/android/net/http/ |
DefaultHttpClientTest.java | 126 String challenge = "Digest realm=\"protected area\", " local 130 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge));
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 50 String challenge; field in class:NetscapeCertRequest 95 // challenge IA5STRING 106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); 130 String challenge, 136 this.challenge = challenge; 143 content_der.add(new DERIA5String(challenge)); 150 return challenge; 155 challenge = value; 188 public boolean verify(String challenge) throws NoSuchAlgorithmException [all...] |
/external/chromium/chrome/browser/ui/login/ |
login_prompt_browsertest.cc | 52 const net::AuthChallengeInfo* challenge = handler->auth_info(); local 54 ASSERT_TRUE(challenge); 56 auth_map_.find(challenge->realm);
|