HomeSort by relevance Sort by last modified time
    Searched refs:challenge (Results 126 - 150 of 246) sorted by null

1 2 3 4 56 7 8 910

  /external/chromium_org/net/http/
http_auth_gssapi_posix_unittest.cc 184 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(),
187 auth_gssapi.ParseChallenge(&challenge));
216 // If the first round challenge has an additional authentication token, it
217 // should be treated as an invalid challenge from the server.
222 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(),
225 auth_gssapi.ParseChallenge(&challenge));
229 // If a later-round challenge is simply "Negotiate", it should be treated as
230 // an authentication challenge rejection from the server or proxy.
252 // If a later-round challenge has an invalid base64 encoded token, it should
253 // be treated as an invalid challenge
    [all...]
http_auth_controller_unittest.cc 130 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge) OVERRIDE {
131 HttpAuthHandlerMock::Init(challenge);
136 if (challenge->scheme() == "Basic") {
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
t_spki.c 90 chal = spki->spkac->challenge;
92 BIO_printf(out, " Challenge String: %s\n", chal->data);
  /external/openssl/crypto/asn1/
t_spki.c 90 chal = spki->spkac->challenge;
92 BIO_printf(out, " Challenge String: %s\n", chal->data);
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
AuthenticationHelperImpl.java 125 public ClientTransaction handleChallenge(Response challenge,
130 sipStack.getStackLogger().logDebug("handleChallenge: " + challenge);
149 * in-dialog challenge.
171 if (challenge == null || reoriginatedRequest == null) {
172 throw new NullPointerException("A null argument was passed to handle challenge.");
177 if (challenge.getStatusCode() == Response.UNAUTHORIZED) {
178 authHeaders = challenge.getHeaders(WWWAuthenticateHeader.NAME);
179 } else if (challenge.getStatusCode() == Response.PROXY_AUTHENTICATION_REQUIRED) {
180 authHeaders = challenge.getHeaders(ProxyAuthenticateHeader.NAME);
288 * @param authHeader the challenge that we should respond t
    [all...]
  /external/ppp/pppd/
chap-new.c 51 /* Hook for a plugin to validate CHAP challenge */
54 unsigned char *challenge, unsigned char *response,
70 { "chap-max-challenge", o_int, &chap_max_transmits,
71 "Set max #xmits for challenge", OPT_PRIO },
88 * These limits apply to challenge and response packets we send.
101 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state
124 unsigned char *challenge, unsigned char *response,
226 * There isn't much to do until we receive a challenge.
251 * chap_timeout - It's time to send another challenge to the peer.
252 * This could be either a retransmission of a previous challenge,
    [all...]
  /external/chromium/net/websockets/
websocket_handshake.cc 261 uint8 challenge[kExpectedResponseSize]; local
262 SetChallengeNumber(&challenge[0], number_1_);
263 SetChallengeNumber(&challenge[4], number_2_);
264 memcpy(&challenge[8], key_3_.data(), kKey3Size);
266 MD5Sum(challenge, kExpectedResponseSize, &digest);
  /external/chromium_org/chrome/browser/chromeos/attestation/
platform_verification_flow.cc 86 const std::string& challenge,
90 challenge(challenge),
138 const std::string& challenge,
156 ChallengeContext context(web_contents, service_id, challenge, callback);
299 context.challenge,
315 LOG(ERROR) << "PlatformVerificationFlow: Failed to sign challenge.";
  /external/wpa_supplicant_8/src/eap_peer/
eap_leap.c 65 const u8 *pos, *challenge, *identity, *password; local
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge "
102 challenge = pos;
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP",
105 challenge, LEAP_CHALLENGE_LEN);
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
119 challenge_response(challenge, password, rpos);
121 nt_challenge_response(challenge, password, password_len, rpos);
167 "for challenge");
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 245 "EAP-TTLS: CHAP-Challenge (CHAP)",
259 "EAP-TTLS: MS-CHAP-Challenge",
305 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge",
526 const u8 *challenge,
533 if (challenge == NULL || password == NULL ||
537 "(challenge len %lu password len %lu)",
556 "challenge from TLS data");
561 if (os_memcmp(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) != 0 ||
563 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Challenge mismatch");
570 /* MD5(Ident + Password + Challenge) */
    [all...]
  /external/apache-http/src/org/apache/http/impl/client/
AbstractAuthenticationHandler.java 134 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local
136 if (challenge != null) {
151 this.log.debug("Challenge for " + id + " authentication scheme not available");
  /external/chromium/net/base/
keygen_handler_win.cc 61 // signing key of |prov| and the specified ASCII |challenge| string and
65 const std::string& challenge,
67 std::wstring wide_challenge = ASCIIToWide(challenge);
75 // challenge IA5STRING
209 "and challenge";
  /external/chromium-trace/trace-viewer/third_party/pywebsocket/src/example/
echo_client.py 430 'Response for challenge : %r (%s)',
438 'Expected response for challenge: %r (%s)',
630 # 4.1 42. let /challenge/ be the concatenation of /number_1/,
634 challenge = struct.pack('!I', self._number1)
635 challenge += struct.pack('!I', self._number2)
636 challenge += self._key3
639 'Challenge: %r (%s)', challenge, util.hexify(challenge))
641 # 4.1 43. let /expected/ be the MD5 fingerprint of /challenge/ as
    [all...]
  /external/chromium_org/net/base/
keygen_handler_win.cc 61 // signing key of |prov| and the specified ASCII |challenge| string and
65 const std::string& challenge,
67 std::wstring wide_challenge = ASCIIToWide(challenge);
75 // challenge IA5STRING
209 "and challenge";
  /external/chromium_org/net/websockets/
websocket_handshake_handler.cc 200 const GURL& url, std::string* challenge) {
218 *challenge = key;
225 std::string* challenge,
254 *challenge = iter.values();
359 const std::string& challenge) {
376 ComputeSecWebSocketAccept(challenge, &websocket_accept);
394 const std::string& challenge,
405 base::SHA1HashString(challenge + websockets::kWebSocketGuid);
  /external/chromium_org/chromeos/cryptohome/
async_method_caller.cc 194 const std::string& challenge,
204 challenge,
209 "Couldn't initiate async attestation enterprise challenge."));
216 const std::string& challenge,
223 challenge,
228 "Couldn't initiate async attestation simple challenge."));
  /external/nist-sip/java/gov/nist/javax/sip/header/
AuthenticationHeader.java 143 * @param challenge --
144 * the challenge from which the parameters are extracted.
146 public void setChallenge(Challenge challenge) {
147 this.scheme = challenge.scheme;
148 super.parameters = challenge.authParams;
162 * Sets the scheme of the challenge information for this
166 * the new string value that identifies the challenge information
174 * Returns the scheme of the challenge information for this
177 * @return the string value of the challenge information
    [all...]
  /external/ppp/pppd/plugins/radius/
radius.c 77 unsigned char *challenge,
86 unsigned char *challenge,
320 * id -- the ID byte in the challenge
322 * challenge -- the challenge string we sent (length in first byte)
334 unsigned char *challenge, unsigned char *response,
350 challenge_len = *challenge++;
367 error("RADIUS: Challenge type %u unsupported", digest->code);
393 * add the challenge and response fields
397 /* CHAP-Challenge and CHAP-Password *
    [all...]
  /external/smack/src/org/jivesoftware/smack/sasl/
SASLFacebookConnect.java 104 public void challengeReceived(String challenge) throws IOException {
105 // Build the challenge response stanza encoding the response text
109 if (challenge != null) {
110 String decodedResponse = new String(Base64.decode(challenge));
SASLMechanism.java 52 * <li>{@link #challengeReceived(String)} -- Handle a challenge from the server.</li>
131 * response to the server's challenge.
133 * @param challenge a base64 encoded string representing the challenge.
136 public void challengeReceived(String challenge) throws IOException {
138 if(challenge != null) {
139 response = sc.evaluateChallenge(StringUtils.decodeBase64(challenge));
220 * A SASL challenge stanza.
222 public static class Challenge extends Packet {
225 public Challenge(String data) {
    [all...]
  /external/tcpdump/
print-802_11.c 118 "Authentication rejected because of challenge failure", /* 15 */
198 memcpy(&pbody->challenge, p + offset, 2);
200 if (pbody->challenge.length != 0) {
201 if (pbody->challenge.length >
202 sizeof(pbody->challenge.text) - 1)
204 if (!TTEST2(*(p + offset), pbody->challenge.length))
206 memcpy(&pbody->challenge.text, p + offset,
207 pbody->challenge.length);
208 offset += pbody->challenge.length;
210 pbody->challenge.text[pbody->challenge.length] = '\0'
    [all...]
  /external/openssh/
monitor_wrap.c 954 char *challenge; local
965 debug3("%s: no challenge", __func__);
970 /* Get the challenge, and format the response */
971 challenge = buffer_get_string(&m, NULL);
975 (*prompts)[0] = challenge;
977 debug3("%s: received challenge: %s", __func__, challenge);
1012 char *challenge; local
1023 debug3("%s: no challenge", __func__);
1028 /* Get the challenge, and format the response *
1122 BIGNUM *challenge; local
    [all...]
  /external/chromium/webkit/glue/
webkitclient_impl.h 40 unsigned key_size_index, const WebKit::WebString& challenge,
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.h 21 const u8 *challenge; member in struct:ieee802_11_elems
  /external/chromium_org/chromeos/dbus/
cryptohome_client.h 355 // Asynchronously signs an enterprise challenge with the key specified by
357 // the challenge response. |options| control how the challenge response is
358 // generated. |challenge| must be a valid enterprise attestation challenge.
371 const std::string& challenge,
374 // Asynchronously signs a simple challenge with the key specified by
375 // |key_type| and |key_name|. |challenge| can be any set of arbitrary bytes.
376 // A nonce will be appended to the challenge before signing; this method
386 const std::string& challenge,
    [all...]

Completed in 396 milliseconds

1 2 3 4 56 7 8 910