/external/chromium_org/net/http/ |
http_auth_gssapi_posix_unittest.cc | 184 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 187 auth_gssapi.ParseChallenge(&challenge)); 216 // If the first round challenge has an additional authentication token, it 217 // should be treated as an invalid challenge from the server. 222 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), 225 auth_gssapi.ParseChallenge(&challenge)); 229 // If a later-round challenge is simply "Negotiate", it should be treated as 230 // an authentication challenge rejection from the server or proxy. 252 // If a later-round challenge has an invalid base64 encoded token, it should 253 // be treated as an invalid challenge [all...] |
http_auth_controller_unittest.cc | 130 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge) OVERRIDE { 131 HttpAuthHandlerMock::Init(challenge); 136 if (challenge->scheme() == "Basic") {
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
t_spki.c | 90 chal = spki->spkac->challenge; 92 BIO_printf(out, " Challenge String: %s\n", chal->data);
|
/external/openssl/crypto/asn1/ |
t_spki.c | 90 chal = spki->spkac->challenge; 92 BIO_printf(out, " Challenge String: %s\n", chal->data);
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
AuthenticationHelperImpl.java | 125 public ClientTransaction handleChallenge(Response challenge, 130 sipStack.getStackLogger().logDebug("handleChallenge: " + challenge); 149 * in-dialog challenge. 171 if (challenge == null || reoriginatedRequest == null) { 172 throw new NullPointerException("A null argument was passed to handle challenge."); 177 if (challenge.getStatusCode() == Response.UNAUTHORIZED) { 178 authHeaders = challenge.getHeaders(WWWAuthenticateHeader.NAME); 179 } else if (challenge.getStatusCode() == Response.PROXY_AUTHENTICATION_REQUIRED) { 180 authHeaders = challenge.getHeaders(ProxyAuthenticateHeader.NAME); 288 * @param authHeader the challenge that we should respond t [all...] |
/external/ppp/pppd/ |
chap-new.c | 51 /* Hook for a plugin to validate CHAP challenge */ 54 unsigned char *challenge, unsigned char *response, 70 { "chap-max-challenge", o_int, &chap_max_transmits, 71 "Set max #xmits for challenge", OPT_PRIO }, 88 * These limits apply to challenge and response packets we send. 101 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state 124 unsigned char *challenge, unsigned char *response, 226 * There isn't much to do until we receive a challenge. 251 * chap_timeout - It's time to send another challenge to the peer. 252 * This could be either a retransmission of a previous challenge, [all...] |
/external/chromium/net/websockets/ |
websocket_handshake.cc | 261 uint8 challenge[kExpectedResponseSize]; local 262 SetChallengeNumber(&challenge[0], number_1_); 263 SetChallengeNumber(&challenge[4], number_2_); 264 memcpy(&challenge[8], key_3_.data(), kKey3Size); 266 MD5Sum(challenge, kExpectedResponseSize, &digest);
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
platform_verification_flow.cc | 86 const std::string& challenge, 90 challenge(challenge), 138 const std::string& challenge, 156 ChallengeContext context(web_contents, service_id, challenge, callback); 299 context.challenge, 315 LOG(ERROR) << "PlatformVerificationFlow: Failed to sign challenge.";
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " 102 challenge = pos; 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 105 challenge, LEAP_CHALLENGE_LEN); 107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 167 "for challenge"); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 245 "EAP-TTLS: CHAP-Challenge (CHAP)", 259 "EAP-TTLS: MS-CHAP-Challenge", 305 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", 526 const u8 *challenge, 533 if (challenge == NULL || password == NULL || 537 "(challenge len %lu password len %lu)", 556 "challenge from TLS data"); 561 if (os_memcmp(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) != 0 || 563 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Challenge mismatch"); 570 /* MD5(Ident + Password + Challenge) */ [all...] |
/external/apache-http/src/org/apache/http/impl/client/ |
AbstractAuthenticationHandler.java | 134 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local 136 if (challenge != null) { 151 this.log.debug("Challenge for " + id + " authentication scheme not available");
|
/external/chromium/net/base/ |
keygen_handler_win.cc | 61 // signing key of |prov| and the specified ASCII |challenge| string and 65 const std::string& challenge, 67 std::wstring wide_challenge = ASCIIToWide(challenge); 75 // challenge IA5STRING 209 "and challenge";
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/example/ |
echo_client.py | 430 'Response for challenge : %r (%s)', 438 'Expected response for challenge: %r (%s)', 630 # 4.1 42. let /challenge/ be the concatenation of /number_1/, 634 challenge = struct.pack('!I', self._number1) 635 challenge += struct.pack('!I', self._number2) 636 challenge += self._key3 639 'Challenge: %r (%s)', challenge, util.hexify(challenge)) 641 # 4.1 43. let /expected/ be the MD5 fingerprint of /challenge/ as [all...] |
/external/chromium_org/net/base/ |
keygen_handler_win.cc | 61 // signing key of |prov| and the specified ASCII |challenge| string and 65 const std::string& challenge, 67 std::wstring wide_challenge = ASCIIToWide(challenge); 75 // challenge IA5STRING 209 "and challenge";
|
/external/chromium_org/net/websockets/ |
websocket_handshake_handler.cc | 200 const GURL& url, std::string* challenge) { 218 *challenge = key; 225 std::string* challenge, 254 *challenge = iter.values(); 359 const std::string& challenge) { 376 ComputeSecWebSocketAccept(challenge, &websocket_accept); 394 const std::string& challenge, 405 base::SHA1HashString(challenge + websockets::kWebSocketGuid);
|
/external/chromium_org/chromeos/cryptohome/ |
async_method_caller.cc | 194 const std::string& challenge, 204 challenge, 209 "Couldn't initiate async attestation enterprise challenge.")); 216 const std::string& challenge, 223 challenge, 228 "Couldn't initiate async attestation simple challenge."));
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 143 * @param challenge -- 144 * the challenge from which the parameters are extracted. 146 public void setChallenge(Challenge challenge) { 147 this.scheme = challenge.scheme; 148 super.parameters = challenge.authParams; 162 * Sets the scheme of the challenge information for this 166 * the new string value that identifies the challenge information 174 * Returns the scheme of the challenge information for this 177 * @return the string value of the challenge information [all...] |
/external/ppp/pppd/plugins/radius/ |
radius.c | 77 unsigned char *challenge, 86 unsigned char *challenge, 320 * id -- the ID byte in the challenge 322 * challenge -- the challenge string we sent (length in first byte) 334 unsigned char *challenge, unsigned char *response, 350 challenge_len = *challenge++; 367 error("RADIUS: Challenge type %u unsupported", digest->code); 393 * add the challenge and response fields 397 /* CHAP-Challenge and CHAP-Password * [all...] |
/external/smack/src/org/jivesoftware/smack/sasl/ |
SASLFacebookConnect.java | 104 public void challengeReceived(String challenge) throws IOException { 105 // Build the challenge response stanza encoding the response text 109 if (challenge != null) { 110 String decodedResponse = new String(Base64.decode(challenge));
|
SASLMechanism.java | 52 * <li>{@link #challengeReceived(String)} -- Handle a challenge from the server.</li>
131 * response to the server's challenge.
133 * @param challenge a base64 encoded string representing the challenge.
136 public void challengeReceived(String challenge) throws IOException {
138 if(challenge != null) {
139 response = sc.evaluateChallenge(StringUtils.decodeBase64(challenge));
220 * A SASL challenge stanza.
222 public static class Challenge extends Packet {
225 public Challenge(String data) { [all...] |
/external/tcpdump/ |
print-802_11.c | 118 "Authentication rejected because of challenge failure", /* 15 */ 198 memcpy(&pbody->challenge, p + offset, 2); 200 if (pbody->challenge.length != 0) { 201 if (pbody->challenge.length > 202 sizeof(pbody->challenge.text) - 1) 204 if (!TTEST2(*(p + offset), pbody->challenge.length)) 206 memcpy(&pbody->challenge.text, p + offset, 207 pbody->challenge.length); 208 offset += pbody->challenge.length; 210 pbody->challenge.text[pbody->challenge.length] = '\0' [all...] |
/external/openssh/ |
monitor_wrap.c | 954 char *challenge; local 965 debug3("%s: no challenge", __func__); 970 /* Get the challenge, and format the response */ 971 challenge = buffer_get_string(&m, NULL); 975 (*prompts)[0] = challenge; 977 debug3("%s: received challenge: %s", __func__, challenge); 1012 char *challenge; local 1023 debug3("%s: no challenge", __func__); 1028 /* Get the challenge, and format the response * 1122 BIGNUM *challenge; local [all...] |
/external/chromium/webkit/glue/ |
webkitclient_impl.h | 40 unsigned key_size_index, const WebKit::WebString& challenge,
|
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.h | 21 const u8 *challenge; member in struct:ieee802_11_elems
|
/external/chromium_org/chromeos/dbus/ |
cryptohome_client.h | 355 // Asynchronously signs an enterprise challenge with the key specified by 357 // the challenge response. |options| control how the challenge response is 358 // generated. |challenge| must be a valid enterprise attestation challenge. 371 const std::string& challenge, 374 // Asynchronously signs a simple challenge with the key specified by 375 // |key_type| and |key_name|. |challenge| can be any set of arbitrary bytes. 376 // A nonce will be appended to the challenge before signing; this method 386 const std::string& challenge, [all...] |