HomeSort by relevance Sort by last modified time
    Searched defs:challenge (Results 1 - 25 of 68) sorted by null

1 2 3

  /external/chromium_org/chrome/browser/resources/cryptotoken/
webrequest.js 201 if (!incomingChallenge.hasOwnProperty('challenge'))
322 * @param {!string} serverChallenge The server's challenge, as a base64-
331 'challenge' : serverChallenge,
340 * @param {!string} serverChallenge The server's challenge, as a base64-
354 * @param {!string} serverChallenge The server's challenge, as a base64-
370 * @return {SignHelperChallenge} Challenge object
377 var challenge = {
383 challenge['version'] = (version || 'U2F_V1');
384 return challenge;
singlesigner.js 7 * signing each challenge in an array of challenges until a success condition
15 * operation using each challenge in an array of challenges until its success
20 * For enroll, success is defined as each challenge yielding wrong data. This
22 * challenge.
24 * For sign, success is defined as any challenge yielding ok or waiting for
89 /** The signer is currently signing a challenge. */
171 // the appId for some challenge.
265 * @param {number} challengeIndex Index of challenge to sign
287 var challenge = this.challenges_[challengeIndex];
288 var challengeHash = challenge.challengeHash
    [all...]
  /external/chromium_org/net/http/
http_auth_handler_basic_unittest.cc 36 std::string challenge = "Basic realm=\"Atlantis\""; local
39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
53 const char* challenge; member in struct:net::__anon13281
56 // The handler is initialized using this challenge. The first
58 // to treat the second challenge as a rejection since it is for
65 // A challenge for a different realm.
73 // challenge should be treated as being for "First" realm.
90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
94 std::string challenge(tests[i].challenge);
103 const char* challenge; member in struct:net::__anon13282
187 std::string challenge = tests[i].challenge; local
    [all...]
http_auth_handler_unittest.cc 22 std::string challenge = "Mock asdf"; local
39 challenge.begin(), challenge.end());
http_auth.cc 36 // Choose the challenge whose authentication handler gives the maximum score.
47 << ErrorToString(rv) << " Challenge: " << cur_challenge;
74 std::string challenge; local
77 while (headers->EnumerateHeader(&iter, header_name, &challenge)) {
78 HttpAuthChallengeTokenizer props(challenge.begin(), challenge.end());
83 *challenge_used = challenge;
http_auth_handler.h 28 // Initializes the handler using a challenge issued by a server.
29 // |challenge| must be non-NULL and have already tokenized the
32 // for later use, and are not part of the initial challenge.
33 bool InitFromChallenge(HttpAuthChallengeTokenizer* challenge,
43 // NTLM+Negotiate it may indicate that another round of challenge+response
46 // be made with a different nonce provided in the challenge.
48 // |challenge| must be non-NULL and have already tokenized the
52 HttpAuthChallengeTokenizer* challenge) = 0;
89 // The challenge which was issued when creating the handler.
90 const std::string challenge() const function in class:net::HttpAuthHandler
    [all...]
http_auth_handler_digest_unittest.cc 25 // |challenge|, and generates a response to the challenge which is returned in
31 // of the |challenge|. Otherwise, the scheme and host and port of |request_url|
32 // indicates the origin of the challenge.
36 const std::string& challenge,
45 EXPECT_FALSE(challenge.empty());
55 // Create a handler for a particular challenge.
58 challenge, target, url_origin.GetOrigin(), BoundNetLog(), &handler);
64 // Create a token in response to the challenge.
88 // The challenge string
89 const char* challenge; member in struct:net::__anon13284
389 const char* challenge; member in struct:net::__anon13285
    [all...]
  /external/chromium_org/net/websockets/
websocket_handshake_handler_spdy_test.cc 53 std::string challenge; local
57 &challenge,
78 EXPECT_EQ(expected_challenge, challenge);
88 headers, challenge, spdy_util_.spdy_version()));
125 std::string challenge; local
129 &challenge,
152 EXPECT_EQ(expected_challenge, challenge);
167 headers, challenge, spdy_util_.spdy_version()));
websocket_handshake_handler_test.cc 186 std::string challenge; local
188 request_handler.GetRequestInfo(url, &challenge);
205 EXPECT_EQ("dGhlIHNhbXBsZSBub25jZQ==", challenge);
227 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge));
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 34 const u8 *pos, *challenge, *password; local
55 * CHAP Challenge:
56 * Value-Size (1 octet) | Value(Challenge) | Name(optional)
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
69 challenge, challenge_len);
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
eap_leap.c 65 const u8 *pos, *challenge, *identity, *password; local
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge "
102 challenge = pos;
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP",
105 challenge, LEAP_CHALLENGE_LEN);
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
119 challenge_response(challenge, password, rpos);
121 nt_challenge_response(challenge, password, password_len, rpos);
167 "for challenge");
    [all...]
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMScheme.java 59 private String challenge; field in class:NTLMScheme
68 this.challenge = null;
92 String challenge = buffer.substringTrimmed(pos, len); local
93 if (challenge.length() == 0) {
99 this.challenge = null;
102 this.challenge = challenge;
129 this.challenge);
  /external/apache-http/src/org/apache/http/impl/client/
AbstractAuthenticationHandler.java 134 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local
136 if (challenge != null) {
151 this.log.debug("Challenge for " + id + " authentication scheme not available");
  /external/chromium_org/components/data_reduction_proxy/browser/
http_auth_handler_data_reduction_proxy_unittest.cc 43 // Verifies that challenge parsing is expected as described in individual
48 const char* origin; // Origin for challenge
49 const char* challenge; // Challenge string member in struct:data_reduction_proxy::__anon10921
52 // A well-formed challenge where a sid is provided produces a valid
94 tests[j].challenge, targets[i], origin, BoundNetLog(),
113 // Verifies that any repeat challenge is treated as a failure.
123 std::string challenge(kValidChallenge);
124 HttpAuthChallengeTokenizer tok(challenge.begin(),
125 challenge.end())
134 const char* challenge; member in struct:data_reduction_proxy::__anon10922
156 std::string challenge = tests[i].challenge; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
spkac.c 92 char *challenge = NULL, *keyfile = NULL; local
132 else if (strcmp(*argv,"-challenge") == 0)
135 challenge= *(++argv);
174 BIO_printf(bio_err," -challenge arg challenge string\n");
203 if(challenge) ASN1_STRING_set(spki->spkac->challenge,
204 challenge, (int)strlen(challenge));
  /external/openssl/apps/
spkac.c 92 char *challenge = NULL, *keyfile = NULL; local
132 else if (strcmp(*argv,"-challenge") == 0)
135 challenge= *(++argv);
174 BIO_printf(bio_err," -challenge arg challenge string\n");
203 if(challenge) ASN1_STRING_set(spki->spkac->challenge,
204 challenge, (int)strlen(challenge));
  /external/wpa_supplicant_8/src/eap_server/
eap_server_md5.c 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data
50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) {
66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN);
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
123 data->challenge, CHALLENGE_LEN, hash)) {
  /external/chromium_org/chrome/browser/chromeos/attestation/
platform_verification_flow.h 117 // This callback will be called when a challenge operation completes. If
119 // by the platform key (this is the original challenge appended with a random
142 // Invokes an asynchronous operation to challenge a platform key. Any user
146 // collusion between multiple services. The |challenge| is also an arbitrary
154 const std::string& challenge,
172 const std::string& challenge,
178 std::string challenge; member in struct:chromeos::attestation::PlatformVerificationFlow::ChallengeContext
215 // request to sign the challenge. If the operation timed out prior to this
229 // A callback called when a challenge signing request has completed. The
231 // |challenge|. The arguments to ChallengePlatformKey are in |context|
    [all...]
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
pairingsession.h 45 // Waiting for the secret challenge messsage or response from the peer.
61 PoloChallengeResponse* challenge);
83 // Gets the encoder used for encoding and decoding the secret challenge. This
157 // Gets the challenge response.
158 const PoloChallengeResponse& challenge() const { return *challenge_; } function in class:polo::pairing::PairingSession
  /frameworks/base/core/tests/coretests/src/android/net/http/
DefaultHttpClientTest.java 126 String challenge = "Digest realm=\"protected area\", " local
130 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
NetscapeCertRequest.java 51 String challenge; field in class:NetscapeCertRequest
96 // challenge IA5STRING
107 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString();
131 String challenge,
137 this.challenge = challenge;
144 content_der.add(new DERIA5String(challenge));
158 return challenge;
163 challenge = value;
196 public boolean verify(String challenge) throws NoSuchAlgorithmException
    [all...]
  /external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/
enterprise_platform_keys_private_api.cc 43 "Challenge is not base64 encoded.";
51 "Failed to sign the challenge.";
297 std::string challenge; local
298 if (!base::Base64Decode(params->challenge, &challenge)) {
324 this, challenge));
330 const std::string& challenge, bool enabled) {
343 challenge));
347 const std::string& challenge, PrepareKeyResult result) {
354 // Everything is checked. Sign the challenge
424 std::string challenge; local
    [all...]
  /external/ppp/pppd/
chap-new.c 51 /* Hook for a plugin to validate CHAP challenge */
54 unsigned char *challenge, unsigned char *response,
70 { "chap-max-challenge", o_int, &chap_max_transmits,
71 "Set max #xmits for challenge", OPT_PRIO },
88 * These limits apply to challenge and response packets we send.
101 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state
124 unsigned char *challenge, unsigned char *response,
226 * There isn't much to do until we receive a challenge.
251 * chap_timeout - It's time to send another challenge to the peer.
252 * This could be either a retransmission of a previous challenge,
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.c 78 * @challenge: 8-octet Challenge (OUT)
83 u8 *challenge)
98 os_memcpy(challenge, hash, 8);
141 * @challenge: 8-octet Challenge (IN)
145 void challenge_response(const u8 *challenge, const u8 *password_hash,
149 des_encrypt(challenge, password_hash, response);
150 des_encrypt(challenge, password_hash + 7, response + 8);
154 des_encrypt(challenge, zpwd, response + 16)
174 u8 challenge[8]; local
203 u8 challenge[8]; local
246 u8 password_hash_hash[16], challenge[8]; local
    [all...]
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.h 17 const u8 *challenge; member in struct:ieee802_11_elems

Completed in 1025 milliseconds

1 2 3