/external/webkit/Source/WebKit2/UIProcess/API/C/ |
WKAuthenticationChallenge.cpp | 41 WKAuthenticationDecisionListenerRef WKAuthenticationChallengeGetDecisionListener(WKAuthenticationChallengeRef challenge) 43 return toAPI(toImpl(challenge)->listener()); 46 WKProtectionSpaceRef WKAuthenticationChallengeGetProtectionSpace(WKAuthenticationChallengeRef challenge) 48 return toAPI(toImpl(challenge)->protectionSpace()); 51 WKCredentialRef WKAuthenticationChallengeGetProposedCredential(WKAuthenticationChallengeRef challenge) 53 return toAPI(toImpl(challenge)->proposedCredential()); 56 int WKAuthenticationChallengeGetPreviousFailureCount(WKAuthenticationChallengeRef challenge) 58 return toImpl(challenge)->previousFailureCount();
|
/external/chromium/net/base/ |
keygen_handler.cc | 14 const std::string& challenge, 17 challenge_(challenge),
|
/external/webkit/Source/WebCore/platform/android/ |
SSLKeyGeneratorAndroid.cpp | 38 String signedPublicKeyAndChallengeString(unsigned index, const String& challenge, const KURL& url) 40 return PlatformBridge::getSignedPublicKeyAndChallengeString(index, challenge, url);
|
/external/webkit/Source/WebKit/mac/Panels/ |
WebPanelAuthenticationHandler.m | 68 -(void)enqueueChallenge:(NSURLAuthenticationChallenge *)challenge forWindow:(id)window 76 [queue addObject:challenge]; 86 NSURLAuthenticationChallenge *challenge = [[queue objectAtIndex:0] retain]; 92 NSURLCredential *latestCredential = [[NSURLCredentialStorage sharedCredentialStorage] defaultCredentialForProtectionSpace:[challenge protectionSpace]]; 95 [[challenge sender] useCredential:latestCredential forAuthenticationChallenge:challenge]; 96 [challenge release]; 100 [self startAuthentication:challenge window:(window == WebModalDialogPretendWindow ? nil : window)]; 101 [challenge release]; 105 -(void)startAuthentication:(NSURLAuthenticationChallenge *)challenge window:(NSWindow *) [all...] |
WebPanelAuthenticationHandler.h | 42 - (void)startAuthentication:(NSURLAuthenticationChallenge *)challenge window:(NSWindow *)w; 43 - (void)cancelAuthentication:(NSURLAuthenticationChallenge *)challenge;
|
/external/webkit/Source/WebKit2/WebProcess/Authentication/ |
AuthenticationManager.cpp | 86 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 87 ASSERT(!challenge.isNull()); 88 AuthenticationClient* coreClient = challenge.authenticationClient(); 90 // This authentication challenge comes from a download. 91 Download::receivedCredential(challenge, credential); 96 coreClient->receivedCredential(challenge, credential); 101 AuthenticationChallenge challenge = m_challenges.take(challengeID); local 102 ASSERT(!challenge.isNull()); 103 AuthenticationClient* coreClient = challenge.authenticationClient(); 105 // This authentication challenge comes from a download 115 AuthenticationChallenge challenge = m_challenges.take(challengeID); local [all...] |
/external/webkit/Source/WebKit/win/ |
WebURLAuthenticationChallengeSenderCFNet.cpp | 42 /* [in] */ IWebURLAuthenticationChallenge* challenge) 44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 53 /* [in] */ IWebURLAuthenticationChallenge* challenge) 55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); 65 /* [in] */ IWebURLAuthenticationChallenge* challenge) 67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge);
|
WebURLAuthenticationChallengeSenderCurl.cpp | 43 /* [in] */ IWebURLAuthenticationChallenge* challenge) 50 /* [in] */ IWebURLAuthenticationChallenge* challenge) 58 /* [in] */ IWebURLAuthenticationChallenge* challenge)
|
WebURLAuthenticationChallengeSender.h | 54 /* [in] */ IWebURLAuthenticationChallenge* challenge); 57 /* [in] */ IWebURLAuthenticationChallenge* challenge); 61 /* [in] */ IWebURLAuthenticationChallenge* challenge);
|
/external/chromium/net/http/ |
http_auth_handler_basic.h | 25 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge, 35 HttpAuth::ChallengeTokenizer* challenge); 38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge); 49 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
|
http_auth_handler_basic.cc | 21 // production of challenge that realm is required. 25 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) { 29 return ParseChallenge(challenge); 33 HttpAuth::ChallengeTokenizer* challenge) { 34 // Verify the challenge's auth-scheme. 35 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic")) 38 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); 55 HttpAuth::ChallengeTokenizer* challenge) { 57 // should be treated as a rejection. However, if the new challenge 59 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs() [all...] |
http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon4073 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon4074 178 std::string challenge = tests[i].challenge; local [all...] |
http_auth_unittest.cc | 31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge, 72 // Basic is the only challenge type, pick it. 80 // Fake is the only challenge type, but it is unsupported. 245 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 247 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 250 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 261 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 263 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 266 EXPECT_EQ(std::string("Basic"), challenge.scheme()) [all...] |
http_auth_handler.h | 28 // Initializes the handler using a challenge issued by a server. 29 // |challenge| must be non-NULL and have already tokenized the 32 // for later use, and are not part of the initial challenge. 33 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge, 43 // NTLM+Negotiate it may indicate that another round of challenge+response 46 // be made with a different nonce provided in the challenge. 48 // |challenge| must be non-NULL and have already tokenized the 52 HttpAuth::ChallengeTokenizer* challenge) = 0; 88 // The challenge which was issued when creating the handler. 89 const std::string challenge() const function in class:net::HttpAuthHandler [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
chap.c | 22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 32 addr[2] = challenge;
|
chap.h | 20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 25 addr[2] = challenge;
|
chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/openssh/ |
auth-bsdauth.c | 55 char *challenge = NULL; local 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 60 if (challenge == NULL) { 66 if (challenge == NULL) { 71 authctxt->style, "auth-ssh", &challenge); 73 challenge = NULL; 74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 77 if (challenge == NULL) 85 (*prompts)[0] = xstrdup(challenge); [all...] |
/external/webkit/Source/WebCore/platform/brew/ |
SSLKeyGeneratorBrew.cpp | 32 String signedPublicKeyAndChallengeString(unsigned index, const String& challenge, const KURL& url)
|
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
KeyGeneratorClient.h | 43 const String& challenge, const KURL& url) = 0;
|
/external/ppp/pppd/ |
chap-md5.c | 59 unsigned char *challenge, unsigned char *response, 67 challenge_len = *challenge++; 70 /* Generate hash of ID, secret, challenge */ 74 MD5_Update(&ctx, challenge, challenge_len); 89 unsigned char *challenge, char *secret, int secret_len, 94 int challenge_len = *challenge++; 99 MD5_Update(&ctx, challenge, challenge_len);
|
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMScheme.java | 59 private String challenge; field in class:NTLMScheme 68 this.challenge = null; 92 String challenge = buffer.substringTrimmed(pos, len); local 93 if (challenge.length() == 0) { 99 this.challenge = null; 102 this.challenge = challenge; 129 this.challenge);
|
NTLMEngine.java | 36 * Type2 challenge. 59 * authentication challenge. 65 * @param challenge Type2 challenge. 74 String challenge) throws NTLMEngineException;
|
/external/chromium/net/websockets/ |
websocket_handshake_handler.h | 48 // Also, fill challange data in |challenge|. 49 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge); 51 // Also, fill challenge data in |challenge|. 54 std::string* challenge); 88 const std::string& challenge); 91 const std::string& challenge);
|