HomeSort by relevance Sort by last modified time
    Searched defs:challenge (Results 1 - 25 of 61) sorted by null

1 2 3

  /external/chromium/net/http/
http_auth_handler_basic_unittest.cc 35 std::string challenge = "Basic realm=\"Atlantis\""; local
38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
52 const char* challenge; member in struct:net::__anon3680
55 // The handler is initialized using this challenge. The first
57 // to treat the second challenge as a rejection since it is for
64 // A challenge for a different realm.
72 // challenge should be treated as being for "First" realm.
89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
93 std::string challenge(tests[i].challenge);
102 const char* challenge; member in struct:net::__anon3681
178 std::string challenge = tests[i].challenge; local
    [all...]
http_auth_handler_unittest.cc 22 std::string challenge = "Mock asdf"; local
39 challenge.begin(), challenge.end());
http_auth.cc 35 // Choose the challenge whose authentication handler gives the maximum score.
46 << ErrorToString(rv) << " Challenge: " << cur_challenge;
73 std::string challenge; local
76 while (headers->EnumerateHeader(&iter, header_name, &challenge)) {
77 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end());
82 *challenge_used = challenge;
http_auth_handler.h 28 // Initializes the handler using a challenge issued by a server.
29 // |challenge| must be non-NULL and have already tokenized the
32 // for later use, and are not part of the initial challenge.
33 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge,
43 // NTLM+Negotiate it may indicate that another round of challenge+response
46 // be made with a different nonce provided in the challenge.
48 // |challenge| must be non-NULL and have already tokenized the
52 HttpAuth::ChallengeTokenizer* challenge) = 0;
88 // The challenge which was issued when creating the handler.
89 const std::string challenge() const function in class:net::HttpAuthHandler
    [all...]
http_auth_handler_digest_unittest.cc 24 // |challenge|, and generates a response to the challenge which is returned in
30 // of the |challenge|. Otherwise, the scheme and host and port of |request_url|
31 // indicates the origin of the challenge.
35 const std::string& challenge,
44 EXPECT_FALSE(challenge.empty());
54 // Create a handler for a particular challenge.
57 challenge, target, url_origin.GetOrigin(), BoundNetLog(), &handler);
63 // Create a token in response to the challenge.
87 // The challenge string
88 const char* challenge; member in struct:net::__anon3683
374 const char* challenge; member in struct:net::__anon3684
    [all...]
  /external/webkit/Source/WebKit/mac/Panels/
WebAuthenticationPanel.h 48 NSURLAuthenticationChallenge *challenge; variable
  /external/webkit/Source/WebKit2/WebProcess/Authentication/
AuthenticationManager.cpp 86 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
87 ASSERT(!challenge.isNull());
88 AuthenticationClient* coreClient = challenge.authenticationClient();
90 // This authentication challenge comes from a download.
91 Download::receivedCredential(challenge, credential);
96 coreClient->receivedCredential(challenge, credential);
101 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
102 ASSERT(!challenge.isNull());
103 AuthenticationClient* coreClient = challenge.authenticationClient();
105 // This authentication challenge comes from a download
115 AuthenticationChallenge challenge = m_challenges.take(challengeID); local
    [all...]
  /external/wpa_supplicant/tests/
test_ms_funcs.c 31 u8 challenge[] = { 0xD0, 0x2E, 0x43, 0x86, 0xBC, 0xE9, 0x12, 0x26 }; local
67 if (memcmp(challenge, buf, sizeof(challenge)) != 0) {
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_md5.c 40 const u8 *pos, *challenge, *password; local
61 * CHAP Challenge:
62 * Value-Size (1 octet) | Value(Challenge) | Name(optional)
66 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
73 challenge = pos;
74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
75 challenge, challenge_len);
77 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_ms_funcs.c 31 u8 challenge[] = { 0xD0, 0x2E, 0x43, 0x86, 0xBC, 0xE9, 0x12, 0x26 }; local
67 if (memcmp(challenge, buf, sizeof(challenge)) != 0) {
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 40 const u8 *pos, *challenge, *password; local
61 * CHAP Challenge:
62 * Value-Size (1 octet) | Value(Challenge) | Name(optional)
66 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
73 challenge = pos;
74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
75 challenge, challenge_len);
77 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
  /external/wpa_supplicant/
eap_md5.c 43 const u8 *pos, *challenge, *password; local
67 * CHAP Challenge:
68 * Value-Size (1 octet) | Value(Challenge) | Name(optional)
73 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
80 challenge = pos;
81 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
82 challenge, challenge_len);
84 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
105 addr[2] = challenge;
ms_funcs.c 30 * @challenge: 8-octet Challenge (OUT)
34 u8 *challenge)
48 os_memcpy(challenge, hash, 8);
93 * @challenge: 8-octet Challenge (IN)
97 void challenge_response(const u8 *challenge, const u8 *password_hash,
101 des_encrypt(challenge, password_hash, response);
102 des_encrypt(challenge, password_hash + 7, response + 8);
106 des_encrypt(challenge, zpwd, response + 16)
125 u8 challenge[8]; local
150 u8 challenge[8]; local
189 u8 password_hash_hash[16], challenge[8]; local
    [all...]
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMScheme.java 59 private String challenge; field in class:NTLMScheme
68 this.challenge = null;
92 String challenge = buffer.substringTrimmed(pos, len); local
93 if (challenge.length() == 0) {
99 this.challenge = null;
102 this.challenge = challenge;
129 this.challenge);
  /external/apache-http/src/org/apache/http/impl/client/
AbstractAuthenticationHandler.java 134 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local
136 if (challenge != null) {
151 this.log.debug("Challenge for " + id + " authentication scheme not available");
  /external/bluetooth/bluez/gdbus/
polkit.c 98 dbus_bool_t authorized, challenge; local
103 dbus_message_iter_get_basic(&result, &challenge);
  /external/chromium/net/websockets/
websocket_handshake_handler_unittest.cc 198 std::string challenge; local
200 request_handler.GetRequestInfo(url, &challenge);
219 EXPECT_EQ(expected_challenge, challenge);
245 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge));
282 std::string challenge; local
284 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, &headers, &challenge));
304 EXPECT_EQ(expected_challenge, challenge);
313 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers, challenge));
352 std::string challenge; local
354 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, &headers, &challenge));
    [all...]
  /external/openssl/apps/
spkac.c 92 char *challenge = NULL, *keyfile = NULL; local
132 else if (strcmp(*argv,"-challenge") == 0)
135 challenge= *(++argv);
174 BIO_printf(bio_err," -challenge arg challenge string\n");
203 if(challenge) ASN1_STRING_set(spki->spkac->challenge,
204 challenge, (int)strlen(challenge));
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_md5.c 25 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
55 if (os_get_random(data->challenge, CHALLENGE_LEN)) {
71 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
72 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
128 data->challenge, CHALLENGE_LEN, hash);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_md5.c 26 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
56 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
72 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
73 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
129 data->challenge, CHALLENGE_LEN, hash);
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
ms_funcs.c 30 * @challenge: 8-octet Challenge (OUT)
34 u8 *challenge)
48 os_memcpy(challenge, hash, 8);
93 * @challenge: 8-octet Challenge (IN)
97 void challenge_response(const u8 *challenge, const u8 *password_hash,
101 des_encrypt(challenge, password_hash, response);
102 des_encrypt(challenge, password_hash + 7, response + 8);
106 des_encrypt(challenge, zpwd, response + 16)
125 u8 challenge[8]; local
150 u8 challenge[8]; local
189 u8 password_hash_hash[16], challenge[8]; local
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.c 29 * @challenge: 8-octet Challenge (OUT)
34 u8 *challenge)
49 os_memcpy(challenge, hash, 8);
97 * @challenge: 8-octet Challenge (IN)
101 void challenge_response(const u8 *challenge, const u8 *password_hash,
105 des_encrypt(challenge, password_hash, response);
106 des_encrypt(challenge, password_hash + 7, response + 8);
110 des_encrypt(challenge, zpwd, response + 16)
130 u8 challenge[8]; local
158 u8 challenge[8]; local
201 u8 password_hash_hash[16], challenge[8]; local
    [all...]
  /frameworks/base/core/tests/coretests/src/android/net/http/
DefaultHttpClientTest.java 126 String challenge = "Digest realm=\"protected area\", " local
130 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge));
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/netscape/
NetscapeCertRequest.java 50 String challenge; field in class:NetscapeCertRequest
95 // challenge IA5STRING
106 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString();
130 String challenge,
136 this.challenge = challenge;
143 content_der.add(new DERIA5String(challenge));
150 return challenge;
155 challenge = value;
188 public boolean verify(String challenge) throws NoSuchAlgorithmException
    [all...]
  /external/chromium/chrome/browser/ui/login/
login_prompt_browsertest.cc 52 const net::AuthChallengeInfo* challenge = handler->auth_info(); local
54 ASSERT_TRUE(challenge);
56 auth_map_.find(challenge->realm);

Completed in 1482 milliseconds

1 2 3