/external/chromium/net/base/ |
keygen_handler.cc | 14 const std::string& challenge, 17 challenge_(challenge),
|
/external/chromium_org/net/base/ |
keygen_handler.cc | 18 const std::string& challenge, 21 challenge_(challenge),
|
/external/chromium/net/http/ |
http_auth_handler_basic.h | 25 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge, 35 HttpAuth::ChallengeTokenizer* challenge); 38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge); 49 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
|
http_auth_handler_basic.cc | 21 // production of challenge that realm is required. 25 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) { 29 return ParseChallenge(challenge); 33 HttpAuth::ChallengeTokenizer* challenge) { 34 // Verify the challenge's auth-scheme. 35 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic")) 38 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); 55 HttpAuth::ChallengeTokenizer* challenge) { 57 // should be treated as a rejection. However, if the new challenge 59 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs() [all...] |
http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon5495 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon5496 178 std::string challenge = tests[i].challenge; local [all...] |
http_auth_unittest.cc | 31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge, 72 // Basic is the only challenge type, pick it. 80 // Fake is the only challenge type, but it is unsupported. 245 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 247 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 250 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 261 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 263 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 266 EXPECT_EQ(std::string("Basic"), challenge.scheme()) [all...] |
http_auth_handler.h | 28 // Initializes the handler using a challenge issued by a server. 29 // |challenge| must be non-NULL and have already tokenized the 32 // for later use, and are not part of the initial challenge. 33 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge, 43 // NTLM+Negotiate it may indicate that another round of challenge+response 46 // be made with a different nonce provided in the challenge. 48 // |challenge| must be non-NULL and have already tokenized the 52 HttpAuth::ChallengeTokenizer* challenge) = 0; 88 // The challenge which was issued when creating the handler. 89 const std::string challenge() const function in class:net::HttpAuthHandler [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 25 addr[2] = challenge;
|
chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/openssh/ |
auth-bsdauth.c | 55 char *challenge = NULL; local 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 60 if (challenge == NULL) { 66 if (challenge == NULL) { 71 authctxt->style, "auth-ssh", &challenge); 73 challenge = NULL; 74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); 77 if (challenge == NULL) 85 (*prompts)[0] = xstrdup(challenge); [all...] |
/external/chromium_org/net/http/ |
http_auth_handler_basic.cc | 20 // Parses a realm from an auth challenge, and converts to UTF8-encoding. 27 // production of challenge that realm is required. 54 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) { 58 return ParseChallenge(challenge); 62 HttpAuth::ChallengeTokenizer* challenge) { 63 // Verify the challenge's auth-scheme. 64 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic")) 68 if (!ParseRealm(*challenge, &realm)) 76 HttpAuth::ChallengeTokenizer* challenge) { 78 // should be treated as a rejection. However, if the new challenge [all...] |
http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 52 const char* challenge; member in struct:net::__anon11821 55 // The handler is initialized using this challenge. The first 57 // to treat the second challenge as a rejection since it is for 64 // A challenge for a different realm. 72 // challenge should be treated as being for "First" realm. 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 93 std::string challenge(tests[i].challenge); 102 const char* challenge; member in struct:net::__anon11822 186 std::string challenge = tests[i].challenge; local [all...] |
http_auth_handler_basic.h | 25 HttpAuth::ChallengeTokenizer* challenge, 35 HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 48 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
|
http_auth_unittest.cc | 31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge, 72 // Basic is the only challenge type, pick it. 80 // Fake is the only challenge type, but it is unsupported. 250 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 252 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 255 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 266 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), 268 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 271 EXPECT_EQ(std::string("Basic"), challenge.scheme()) [all...] |
http_auth_handler.h | 27 // Initializes the handler using a challenge issued by a server. 28 // |challenge| must be non-NULL and have already tokenized the 31 // for later use, and are not part of the initial challenge. 32 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge, 42 // NTLM+Negotiate it may indicate that another round of challenge+response 45 // be made with a different nonce provided in the challenge. 47 // |challenge| must be non-NULL and have already tokenized the 51 HttpAuth::ChallengeTokenizer* challenge) = 0; 88 // The challenge which was issued when creating the handler. 89 const std::string challenge() const function in class:net::HttpAuthHandler [all...] |
/external/ppp/pppd/ |
chap-md5.c | 59 unsigned char *challenge, unsigned char *response, 67 challenge_len = *challenge++; 70 /* Generate hash of ID, secret, challenge */ 74 MD5_Update(&ctx, challenge, challenge_len); 89 unsigned char *challenge, char *secret, int secret_len, 94 int challenge_len = *challenge++; 99 MD5_Update(&ctx, challenge, challenge_len);
|
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMScheme.java | 59 private String challenge; field in class:NTLMScheme 68 this.challenge = null; 92 String challenge = buffer.substringTrimmed(pos, len); local 93 if (challenge.length() == 0) { 99 this.challenge = null; 102 this.challenge = challenge; 129 this.challenge);
|
NTLMEngine.java | 36 * Type2 challenge. 59 * authentication challenge. 65 * @param challenge Type2 challenge. 74 String challenge) throws NTLMEngineException;
|
/external/chromium_org/chrome/browser/net/spdyproxy/ |
http_auth_handler_spdyproxy.cc | 45 HttpAuth::ChallengeTokenizer* challenge, 59 // sniffed by a malicious proxy that presents an appropriate challenge. 71 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 79 HttpAuth::ChallengeTokenizer* challenge) { 100 HttpAuth::ChallengeTokenizer* challenge) { 104 return ParseChallenge(challenge); 122 HttpAuth::ChallengeTokenizer* challenge) { 124 // Verify the challenge's auth-scheme. 125 if (!LowerCaseEqualsASCII(challenge->scheme(), "spdyproxy")) { 126 VLOG(1) << "Parsed challenge without SpdyProxy type" [all...] |
http_auth_handler_spdyproxy.h | 28 net::HttpAuth::ChallengeTokenizer* challenge, 46 net::HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 56 virtual bool Init(net::HttpAuth::ChallengeTokenizer* challenge) OVERRIDE; 63 bool ParseChallenge(net::HttpAuth::ChallengeTokenizer* challenge);
|
/external/chromium/net/websockets/ |
websocket_handshake_handler.h | 48 // Also, fill challange data in |challenge|. 49 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge); 51 // Also, fill challenge data in |challenge|. 54 std::string* challenge); 88 const std::string& challenge); 91 const std::string& challenge);
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsKeygenHandler.h | 57 // challenge: challenge string sent by server 62 const std::string& challenge,
|
/external/chromium_org/net/websockets/ |
websocket_handshake_handler.h | 49 // Gets request info to open WebSocket connection and fills challenge data in 50 // |challenge|. 51 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge); 53 // Also, fills challenge data in |challenge|. 56 std::string* challenge, 89 const std::string& challenge); 92 const std::string& challenge,
|
/external/chromium_org/ppapi/c/private/ |
ppb_platform_verification_private.h | 68 * Requests a platform challenge for a given service id. 71 * <code>PP_VARTYPE_STRING</code> containing the service_id for the challenge. 73 * @param[in] challenge A <code>PP_Var</code> of type 74 * <code>PP_VARTYPE_ARRAY_BUFFER</code> that contains the challenge data. 89 * the platform challenge has been completed. This callback will only run if 96 struct PP_Var challenge,
|
/external/chromium_org/ppapi/cpp/private/ |
platform_verification.h | 22 const Var& challenge,
|