/external/openssh/ |
auth-bsdauth.c | 55 char *challenge = NULL; local 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 60 if (challenge == NULL) { 66 if (challenge == NULL) { 71 authctxt->style, "auth-ssh", &challenge); 73 challenge = NULL; 74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 77 if (challenge == NULL) 85 (*prompts)[0] = xstrdup(challenge); [all...] |
auth-skey.c | 56 char challenge[1024]; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 60 sizeof(challenge)) == -1) 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
|
auth-chall.c | 48 char *challenge, *name, *info, **prompts; local 70 challenge = xstrdup(prompts[0]); 78 return (challenge);
|
auth-rsa.c | 73 BIGNUM *challenge; local 76 if ((challenge = BN_new()) == NULL) 78 /* Generate a random challenge. */ 79 if (BN_rand(challenge, 256, 0, 0) == 0) 83 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0) 87 return challenge; 91 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) 104 /* The response is MD5 of decrypted challenge plus session id. */ 105 len = BN_num_bytes(challenge); 133 BIGNUM *challenge, *encrypted_challenge; local [all...] |
/external/chromium/net/http/ |
http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon5492 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon5493 178 std::string challenge = tests[i].challenge; local [all...] |
http_auth_handler_unittest.cc | 22 std::string challenge = "Mock asdf"; local 39 challenge.begin(), challenge.end());
|
http_auth.cc | 35 // Choose the challenge whose authentication handler gives the maximum score. 46 << ErrorToString(rv) << " Challenge: " << cur_challenge; 73 std::string challenge; local 76 while (headers->EnumerateHeader(&iter, header_name, &challenge)) { 77 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end()); 82 *challenge_used = challenge;
|
http_auth_handler.h | 28 // Initializes the handler using a challenge issued by a server. 29 // |challenge| must be non-NULL and have already tokenized the 32 // for later use, and are not part of the initial challenge. 33 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge, 43 // NTLM+Negotiate it may indicate that another round of challenge+response 46 // be made with a different nonce provided in the challenge. 48 // |challenge| must be non-NULL and have already tokenized the 52 HttpAuth::ChallengeTokenizer* challenge) = 0; 88 // The challenge which was issued when creating the handler. 89 const std::string challenge() const function in class:net::HttpAuthHandler [all...] |
http_auth_handler_digest_unittest.cc | 24 // |challenge|, and generates a response to the challenge which is returned in 30 // of the |challenge|. Otherwise, the scheme and host and port of |request_url| 31 // indicates the origin of the challenge. 35 const std::string& challenge, 44 EXPECT_FALSE(challenge.empty()); 54 // Create a handler for a particular challenge. 57 challenge, target, url_origin.GetOrigin(), BoundNetLog(), &handler); 63 // Create a token in response to the challenge. 87 // The challenge string 88 const char* challenge; member in struct:net::__anon5495 374 const char* challenge; member in struct:net::__anon5496 [all...] |
/external/chromium_org/net/http/ |
http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon11146 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon11147 186 std::string challenge = tests[i].challenge; local [all...] |
http_auth_handler_unittest.cc | 21 std::string challenge = "Mock asdf"; local 37 challenge.begin(), challenge.end());
|
http_auth.cc | 35 // Choose the challenge whose authentication handler gives the maximum score. 46 << ErrorToString(rv) << " Challenge: " << cur_challenge; 73 std::string challenge; local 76 while (headers->EnumerateHeader(&iter, header_name, &challenge)) { 77 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end()); 82 *challenge_used = challenge;
|
http_auth_handler.h | 27 // Initializes the handler using a challenge issued by a server. 28 // |challenge| must be non-NULL and have already tokenized the 31 // for later use, and are not part of the initial challenge. 32 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge, 42 // NTLM+Negotiate it may indicate that another round of challenge+response 45 // be made with a different nonce provided in the challenge. 47 // |challenge| must be non-NULL and have already tokenized the 51 HttpAuth::ChallengeTokenizer* challenge) = 0; 88 // The challenge which was issued when creating the handler. 89 const std::string challenge() const function in class:net::HttpAuthHandler [all...] |
http_auth_handler_digest_unittest.cc | 24 // |challenge|, and generates a response to the challenge which is returned in 30 // of the |challenge|. Otherwise, the scheme and host and port of |request_url| 31 // indicates the origin of the challenge. 35 const std::string& challenge, 44 EXPECT_FALSE(challenge.empty()); 54 // Create a handler for a particular challenge. 57 challenge, target, url_origin.GetOrigin(), BoundNetLog(), &handler); 63 // Create a token in response to the challenge. 86 // The challenge string 87 const char* challenge; member in struct:net::__anon11149 387 const char* challenge; member in struct:net::__anon11150 [all...] |
/external/chromium_org/net/websockets/ |
websocket_handshake_handler_spdy_unittest.cc | 54 std::string challenge; local 58 &challenge, 79 EXPECT_EQ(expected_challenge, challenge); 90 headers, challenge, spdy_util_.spdy_version())); 128 std::string challenge; local 132 &challenge, 155 EXPECT_EQ(expected_challenge, challenge); 171 headers, challenge, spdy_util_.spdy_version()));
|
websocket_handshake_handler_unittest.cc | 34 // The object is default-initialised with an empty challenge and the example 44 // Read current challenge. 45 const std::string& challenge() const { return challenge_; } function in class:__anon11630::WebSocketHandshakeGetKeyNumberTest 47 // Overwrite challenge. 48 void set_challenge(const std::string& challenge) { challenge_ = challenge; } 50 // Reset the challenge to be empty. 368 std::string challenge; local 370 request_handler.GetRequestInfo(url, &challenge); 389 EXPECT_EQ(expected_challenge, challenge); 451 std::string challenge; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 34 const u8 *pos, *challenge, *password; local 55 * CHAP Challenge: 56 * Value-Size (1 octet) | Value(Challenge) | Name(optional) 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 69 challenge, challenge_len); 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/external/chromium_org/chrome/browser/net/spdyproxy/ |
http_auth_handler_spdyproxy_unittest.cc | 39 // Verifies that challenge parsing is expected as described in individual 44 const char* challenge; member in struct:spdyproxy::__anon7789 49 // A well-formed challenge where a sid is provided produces a valid 77 tests[i].challenge, HttpAuth::AUTH_PROXY, origin, BoundNetLog(), 109 // Verifies that any repeat challenge is treated as a failure. 117 std::string challenge(kValidChallenge); 118 HttpAuth::ChallengeTokenizer tok(challenge.begin(), 119 challenge.end()); 125 // Verifies that various challenge strings are parsed appropriately as 128 const char* challenge; member in struct:spdyproxy::__anon7790 146 std::string challenge = tests[i].challenge; local [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMScheme.java | 59 private String challenge; field in class:NTLMScheme 68 this.challenge = null; 92 String challenge = buffer.substringTrimmed(pos, len); local 93 if (challenge.length() == 0) { 99 this.challenge = null; 102 this.challenge = challenge; 129 this.challenge);
|
/external/apache-http/src/org/apache/http/impl/client/ |
AbstractAuthenticationHandler.java | 134 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local 136 if (challenge != null) { 151 this.log.debug("Challenge for " + id + " authentication scheme not available");
|
/external/chromium/net/websockets/ |
websocket_handshake_handler_unittest.cc | 198 std::string challenge; local 200 request_handler.GetRequestInfo(url, &challenge); 219 EXPECT_EQ(expected_challenge, challenge); 245 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge)); 282 std::string challenge; local 284 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, &headers, &challenge)); 304 EXPECT_EQ(expected_challenge, challenge); 313 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers, challenge)); 352 std::string challenge; local 354 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, &headers, &challenge)); [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 132 else if (strcmp(*argv,"-challenge") == 0) 135 challenge= *(++argv); 174 BIO_printf(bio_err," -challenge arg challenge string\n"); 203 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 204 challenge, (int)strlen(challenge));
|
/external/libppp/src/ |
chap.h | 53 } challenge; member in struct:chap
|
/external/openssl/apps/ |
spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 132 else if (strcmp(*argv,"-challenge") == 0) 135 challenge= *(++argv); 174 BIO_printf(bio_err," -challenge arg challenge string\n"); 203 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 204 challenge, (int)strlen(challenge));
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|