HomeSort by relevance Sort by last modified time
    Searched refs:challenge (Results 1 - 25 of 246) sorted by null

1 2 3 4 5 6 7 8 910

  /external/chromium/net/base/
keygen_handler.cc 14 const std::string& challenge,
17 challenge_(challenge),
  /external/chromium_org/net/base/
keygen_handler.cc 18 const std::string& challenge,
21 challenge_(challenge),
  /external/chromium/net/http/
http_auth_handler_basic.h 25 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge,
35 HttpAuth::ChallengeTokenizer* challenge);
38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge);
49 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
http_auth_handler_basic.cc 21 // production of challenge that realm is required.
25 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) {
29 return ParseChallenge(challenge);
33 HttpAuth::ChallengeTokenizer* challenge) {
34 // Verify the challenge's auth-scheme.
35 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic"))
38 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs();
55 HttpAuth::ChallengeTokenizer* challenge) {
57 // should be treated as a rejection. However, if the new challenge
59 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs()
    [all...]
http_auth_handler_basic_unittest.cc 35 std::string challenge = "Basic realm=\"Atlantis\""; local
38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
52 const char* challenge; member in struct:net::__anon5495
55 // The handler is initialized using this challenge. The first
57 // to treat the second challenge as a rejection since it is for
64 // A challenge for a different realm.
72 // challenge should be treated as being for "First" realm.
89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
93 std::string challenge(tests[i].challenge);
102 const char* challenge; member in struct:net::__anon5496
178 std::string challenge = tests[i].challenge; local
    [all...]
http_auth_unittest.cc 31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(),
34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge,
72 // Basic is the only challenge type, pick it.
80 // Fake is the only challenge type, but it is unsupported.
245 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(),
247 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
250 EXPECT_EQ(std::string("Basic"), challenge.scheme());
261 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(),
263 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
266 EXPECT_EQ(std::string("Basic"), challenge.scheme())
    [all...]
http_auth_handler.h 28 // Initializes the handler using a challenge issued by a server.
29 // |challenge| must be non-NULL and have already tokenized the
32 // for later use, and are not part of the initial challenge.
33 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge,
43 // NTLM+Negotiate it may indicate that another round of challenge+response
46 // be made with a different nonce provided in the challenge.
48 // |challenge| must be non-NULL and have already tokenized the
52 HttpAuth::ChallengeTokenizer* challenge) = 0;
88 // The challenge which was issued when creating the handler.
89 const std::string challenge() const function in class:net::HttpAuthHandler
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
chap.c 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
25 addr[2] = challenge;
chap.h 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /external/openssh/
auth-bsdauth.c 55 char *challenge = NULL; local
59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
60 if (challenge == NULL) {
66 if (challenge == NULL) {
71 authctxt->style, "auth-ssh", &challenge);
73 challenge = NULL;
74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
77 if (challenge == NULL)
85 (*prompts)[0] = xstrdup(challenge);
    [all...]
  /external/chromium_org/net/http/
http_auth_handler_basic.cc 20 // Parses a realm from an auth challenge, and converts to UTF8-encoding.
27 // production of challenge that realm is required.
54 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) {
58 return ParseChallenge(challenge);
62 HttpAuth::ChallengeTokenizer* challenge) {
63 // Verify the challenge's auth-scheme.
64 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic"))
68 if (!ParseRealm(*challenge, &realm))
76 HttpAuth::ChallengeTokenizer* challenge) {
78 // should be treated as a rejection. However, if the new challenge
    [all...]
http_auth_handler_basic_unittest.cc 35 std::string challenge = "Basic realm=\"Atlantis\""; local
38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
52 const char* challenge; member in struct:net::__anon11821
55 // The handler is initialized using this challenge. The first
57 // to treat the second challenge as a rejection since it is for
64 // A challenge for a different realm.
72 // challenge should be treated as being for "First" realm.
89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
93 std::string challenge(tests[i].challenge);
102 const char* challenge; member in struct:net::__anon11822
186 std::string challenge = tests[i].challenge; local
    [all...]
http_auth_handler_basic.h 25 HttpAuth::ChallengeTokenizer* challenge,
35 HttpAuth::ChallengeTokenizer* challenge) OVERRIDE;
38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge) OVERRIDE;
48 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
http_auth_unittest.cc 31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(),
34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge,
72 // Basic is the only challenge type, pick it.
80 // Fake is the only challenge type, but it is unsupported.
250 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(),
252 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
255 EXPECT_EQ(std::string("Basic"), challenge.scheme());
266 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(),
268 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
271 EXPECT_EQ(std::string("Basic"), challenge.scheme())
    [all...]
http_auth_handler.h 27 // Initializes the handler using a challenge issued by a server.
28 // |challenge| must be non-NULL and have already tokenized the
31 // for later use, and are not part of the initial challenge.
32 bool InitFromChallenge(HttpAuth::ChallengeTokenizer* challenge,
42 // NTLM+Negotiate it may indicate that another round of challenge+response
45 // be made with a different nonce provided in the challenge.
47 // |challenge| must be non-NULL and have already tokenized the
51 HttpAuth::ChallengeTokenizer* challenge) = 0;
88 // The challenge which was issued when creating the handler.
89 const std::string challenge() const function in class:net::HttpAuthHandler
    [all...]
  /external/ppp/pppd/
chap-md5.c 59 unsigned char *challenge, unsigned char *response,
67 challenge_len = *challenge++;
70 /* Generate hash of ID, secret, challenge */
74 MD5_Update(&ctx, challenge, challenge_len);
89 unsigned char *challenge, char *secret, int secret_len,
94 int challenge_len = *challenge++;
99 MD5_Update(&ctx, challenge, challenge_len);
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMScheme.java 59 private String challenge; field in class:NTLMScheme
68 this.challenge = null;
92 String challenge = buffer.substringTrimmed(pos, len); local
93 if (challenge.length() == 0) {
99 this.challenge = null;
102 this.challenge = challenge;
129 this.challenge);
NTLMEngine.java 36 * Type2 challenge.
59 * authentication challenge.
65 * @param challenge Type2 challenge.
74 String challenge) throws NTLMEngineException;
  /external/chromium_org/chrome/browser/net/spdyproxy/
http_auth_handler_spdyproxy.cc 45 HttpAuth::ChallengeTokenizer* challenge,
59 // sniffed by a malicious proxy that presents an appropriate challenge.
71 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
79 HttpAuth::ChallengeTokenizer* challenge) {
100 HttpAuth::ChallengeTokenizer* challenge) {
104 return ParseChallenge(challenge);
122 HttpAuth::ChallengeTokenizer* challenge) {
124 // Verify the challenge's auth-scheme.
125 if (!LowerCaseEqualsASCII(challenge->scheme(), "spdyproxy")) {
126 VLOG(1) << "Parsed challenge without SpdyProxy type"
    [all...]
http_auth_handler_spdyproxy.h 28 net::HttpAuth::ChallengeTokenizer* challenge,
46 net::HttpAuth::ChallengeTokenizer* challenge) OVERRIDE;
56 virtual bool Init(net::HttpAuth::ChallengeTokenizer* challenge) OVERRIDE;
63 bool ParseChallenge(net::HttpAuth::ChallengeTokenizer* challenge);
  /external/chromium/net/websockets/
websocket_handshake_handler.h 48 // Also, fill challange data in |challenge|.
49 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge);
51 // Also, fill challenge data in |challenge|.
54 std::string* challenge);
88 const std::string& challenge);
91 const std::string& challenge);
  /external/chromium_org/net/third_party/mozilla_security_manager/
nsKeygenHandler.h 57 // challenge: challenge string sent by server
62 const std::string& challenge,
  /external/chromium_org/net/websockets/
websocket_handshake_handler.h 49 // Gets request info to open WebSocket connection and fills challenge data in
50 // |challenge|.
51 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge);
53 // Also, fills challenge data in |challenge|.
56 std::string* challenge,
89 const std::string& challenge);
92 const std::string& challenge,
  /external/chromium_org/ppapi/c/private/
ppb_platform_verification_private.h 68 * Requests a platform challenge for a given service id.
71 * <code>PP_VARTYPE_STRING</code> containing the service_id for the challenge.
73 * @param[in] challenge A <code>PP_Var</code> of type
74 * <code>PP_VARTYPE_ARRAY_BUFFER</code> that contains the challenge data.
89 * the platform challenge has been completed. This callback will only run if
96 struct PP_Var challenge,
  /external/chromium_org/ppapi/cpp/private/
platform_verification.h 22 const Var& challenge,

Completed in 346 milliseconds

1 2 3 4 5 6 7 8 910