/external/webkit/Tools/DumpRenderTree/mac/ |
LayoutTestControllerMac.mm | [all...] |
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/ |
Sasl4Test.java | 331 public byte[] evaluateResponse(byte[] challenge) throws SaslException {
|
Sasl3Test.java | 351 public byte[] evaluateChallenge(byte[] challenge) throws SaslException {
|
/external/chromium/chrome/browser/sync/resources/ |
gaia_login.js | 5 // Variable to track if a captcha challenge was issued. If this gets set to 197 return; // No blurb in captcha challenge mode.
|
/external/chromium/net/http/ |
http_auth_handler_factory_unittest.cc | 24 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge,
|
http_auth_cache_unittest.cc | 34 HttpAuth::ChallengeTokenizer* challenge) { 39 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge) {
|
http_auth_controller.cc | 26 // challenge. 223 // Try to create a handler using the previous auth challenge. 269 // challenge appeared to be rejected, or is using a stale nonce in the Digest 300 // subsequent challenge, invalidate cached credentials for the 320 // Find the best authentication challenge that we support. 342 // We found no supported challenge -- let the transaction continue 360 // pass the challenge information back to the client. 404 handler_->auth_scheme(), handler_->challenge(), 492 // Populates response_.auth_challenge with the authentication challenge info.
|
/external/openssl/ssl/ |
s2_lib.c | 493 EVP_DigestUpdate(&ctx,s->s2->challenge,s->s2->challenge_length);
|
s2_srvr.c | 683 /* challenge */ 684 if (s->s2->challenge_length > sizeof s->s2->challenge) 690 memcpy(s->s2->challenge,p,(unsigned int)s->s2->challenge_length); 878 if (s->s2->challenge_length > sizeof s->s2->challenge) 883 memcpy(p,s->s2->challenge,(unsigned int)s->s2->challenge_length);
|
s2_clnt.c | 596 s2n(SSL2_CHALLENGE_LENGTH,p); /* challenge length */ 597 /*challenge id data*/ 598 if (RAND_pseudo_bytes(s->s2->challenge,SSL2_CHALLENGE_LENGTH) <= 0) 600 memcpy(d,s->s2->challenge,SSL2_CHALLENGE_LENGTH); 940 if (memcmp(p,s->s2->challenge,s->s2->challenge_length) != 0)
|
/external/qemu/ |
vnc.h | 137 char challenge[VNC_AUTH_CHALLENGE_SIZE]; member in struct:VncState
|
vnc-android.c | [all...] |
vnc.c | [all...] |
/external/quake/quake/src/QW/client/ |
client.h | 197 int challenge; member in struct:__anon11523
|
/external/quake/quake/src/QW/server/ |
server.h | 224 int challenge; member in struct:__anon11778
|
/external/tcpdump/ |
ieee802_11.h | 237 struct challenge_t challenge; member in struct:mgmt_body_t
|
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.c | 202 elems->challenge = pos;
|
/hardware/ti/wlan/wl1271/stad/src/Sta_Management/ |
mlmeApi.h | 209 dot11_CHALLENGE_t challenge; member in struct:__anon19304
|
/external/openssh/ |
authfd.c | 357 * Generates a random challenge, sends it to the agent, and waits for 366 Key* key, BIGNUM *challenge, 387 buffer_put_bignum(&buffer, challenge);
|
/external/webkit/Source/WebCore/platform/mac/ |
WebCoreSystemInterface.mm | 51 CFStringRef (*wkSignedPublicKeyAndChallengeString)(unsigned keySize, CFStringRef challenge, CFStringRef keyDescription);
|
WebCoreSystemInterface.h | 120 extern CFStringRef (*wkSignedPublicKeyAndChallengeString)(unsigned keySize, CFStringRef challenge, CFStringRef keyDescription);
|
/external/webkit/Source/WebKit/mac/WebView/ |
WebViewPrivate.h | 453 - (void)handleAuthenticationForResource:(id)identifier challenge:(NSURLAuthenticationChallenge *)challenge fromDataSource:(WebDataSource *)dataSource;
|
/external/webkit/Source/WebCore/platform/chromium/ |
PlatformBridge.h | 185 static String signedPublicKeyAndChallengeString(unsigned keySizeIndex, const String& challenge, const KURL&);
|
/external/apache-http/src/org/apache/http/impl/client/ |
DefaultRequestDirector.java | 1063 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local [all...] |
/external/mdnsresponder/mDNSShared/ |
dnsextd.c | 2208 PktMsg challenge; local [all...] |