/external/chromium_org/chrome/browser/resources/cryptotoken/ |
webrequest.js | 201 if (!incomingChallenge.hasOwnProperty('challenge')) 322 * @param {!string} serverChallenge The server's challenge, as a base64- 331 'challenge' : serverChallenge, 340 * @param {!string} serverChallenge The server's challenge, as a base64- 354 * @param {!string} serverChallenge The server's challenge, as a base64- 370 * @return {SignHelperChallenge} Challenge object 377 var challenge = { 383 challenge['version'] = (version || 'U2F_V1'); 384 return challenge;
|
singlesigner.js | 7 * signing each challenge in an array of challenges until a success condition 15 * operation using each challenge in an array of challenges until its success 20 * For enroll, success is defined as each challenge yielding wrong data. This 22 * challenge. 24 * For sign, success is defined as any challenge yielding ok or waiting for 89 /** The signer is currently signing a challenge. */ 171 // the appId for some challenge. 265 * @param {number} challengeIndex Index of challenge to sign 287 var challenge = this.challenges_[challengeIndex]; 288 var challengeHash = challenge.challengeHash [all...] |
/external/chromium_org/net/http/ |
http_auth_handler_basic_unittest.cc | 36 std::string challenge = "Basic realm=\"Atlantis\""; local 39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 53 const char* challenge; member in struct:net::__anon13281 56 // The handler is initialized using this challenge. The first 58 // to treat the second challenge as a rejection since it is for 65 // A challenge for a different realm. 73 // challenge should be treated as being for "First" realm. 90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 94 std::string challenge(tests[i].challenge); 103 const char* challenge; member in struct:net::__anon13282 187 std::string challenge = tests[i].challenge; local [all...] |
http_auth_handler_unittest.cc | 22 std::string challenge = "Mock asdf"; local 39 challenge.begin(), challenge.end());
|
http_auth.cc | 36 // Choose the challenge whose authentication handler gives the maximum score. 47 << ErrorToString(rv) << " Challenge: " << cur_challenge; 74 std::string challenge; local 77 while (headers->EnumerateHeader(&iter, header_name, &challenge)) { 78 HttpAuthChallengeTokenizer props(challenge.begin(), challenge.end()); 83 *challenge_used = challenge;
|
http_auth_handler.h | 28 // Initializes the handler using a challenge issued by a server. 29 // |challenge| must be non-NULL and have already tokenized the 32 // for later use, and are not part of the initial challenge. 33 bool InitFromChallenge(HttpAuthChallengeTokenizer* challenge, 43 // NTLM+Negotiate it may indicate that another round of challenge+response 46 // be made with a different nonce provided in the challenge. 48 // |challenge| must be non-NULL and have already tokenized the 52 HttpAuthChallengeTokenizer* challenge) = 0; 89 // The challenge which was issued when creating the handler. 90 const std::string challenge() const function in class:net::HttpAuthHandler [all...] |
http_auth_handler_digest_unittest.cc | 25 // |challenge|, and generates a response to the challenge which is returned in 31 // of the |challenge|. Otherwise, the scheme and host and port of |request_url| 32 // indicates the origin of the challenge. 36 const std::string& challenge, 45 EXPECT_FALSE(challenge.empty()); 55 // Create a handler for a particular challenge. 58 challenge, target, url_origin.GetOrigin(), BoundNetLog(), &handler); 64 // Create a token in response to the challenge. 88 // The challenge string 89 const char* challenge; member in struct:net::__anon13284 389 const char* challenge; member in struct:net::__anon13285 [all...] |
/external/chromium_org/net/websockets/ |
websocket_handshake_handler_spdy_test.cc | 53 std::string challenge; local 57 &challenge, 78 EXPECT_EQ(expected_challenge, challenge); 88 headers, challenge, spdy_util_.spdy_version())); 125 std::string challenge; local 129 &challenge, 152 EXPECT_EQ(expected_challenge, challenge); 167 headers, challenge, spdy_util_.spdy_version()));
|
websocket_handshake_handler_test.cc | 186 std::string challenge; local 188 request_handler.GetRequestInfo(url, &challenge); 205 EXPECT_EQ("dGhlIHNhbXBsZSBub25jZQ==", challenge); 227 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge));
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 34 const u8 *pos, *challenge, *password; local 55 * CHAP Challenge: 56 * Value-Size (1 octet) | Value(Challenge) | Name(optional) 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 69 challenge, challenge_len); 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " 102 challenge = pos; 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 105 challenge, LEAP_CHALLENGE_LEN); 107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 167 "for challenge"); [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMScheme.java | 59 private String challenge; field in class:NTLMScheme 68 this.challenge = null; 92 String challenge = buffer.substringTrimmed(pos, len); local 93 if (challenge.length() == 0) { 99 this.challenge = null; 102 this.challenge = challenge; 129 this.challenge);
|
/external/apache-http/src/org/apache/http/impl/client/ |
AbstractAuthenticationHandler.java | 134 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local 136 if (challenge != null) { 151 this.log.debug("Challenge for " + id + " authentication scheme not available");
|
/external/chromium_org/components/data_reduction_proxy/browser/ |
http_auth_handler_data_reduction_proxy_unittest.cc | 43 // Verifies that challenge parsing is expected as described in individual 48 const char* origin; // Origin for challenge 49 const char* challenge; // Challenge string member in struct:data_reduction_proxy::__anon10921 52 // A well-formed challenge where a sid is provided produces a valid 94 tests[j].challenge, targets[i], origin, BoundNetLog(), 113 // Verifies that any repeat challenge is treated as a failure. 123 std::string challenge(kValidChallenge); 124 HttpAuthChallengeTokenizer tok(challenge.begin(), 125 challenge.end()) 134 const char* challenge; member in struct:data_reduction_proxy::__anon10922 156 std::string challenge = tests[i].challenge; local [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 132 else if (strcmp(*argv,"-challenge") == 0) 135 challenge= *(++argv); 174 BIO_printf(bio_err," -challenge arg challenge string\n"); 203 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 204 challenge, (int)strlen(challenge));
|
/external/openssl/apps/ |
spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 132 else if (strcmp(*argv,"-challenge") == 0) 135 challenge= *(++argv); 174 BIO_printf(bio_err," -challenge arg challenge string\n"); 203 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 204 challenge, (int)strlen(challenge));
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_md5.c | 20 u8 challenge[CHALLENGE_LEN]; member in struct:eap_md5_data 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { 66 wpabuf_put_data(req, data->challenge, CHALLENGE_LEN); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 123 data->challenge, CHALLENGE_LEN, hash)) {
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
platform_verification_flow.h | 117 // This callback will be called when a challenge operation completes. If 119 // by the platform key (this is the original challenge appended with a random 142 // Invokes an asynchronous operation to challenge a platform key. Any user 146 // collusion between multiple services. The |challenge| is also an arbitrary 154 const std::string& challenge, 172 const std::string& challenge, 178 std::string challenge; member in struct:chromeos::attestation::PlatformVerificationFlow::ChallengeContext 215 // request to sign the challenge. If the operation timed out prior to this 229 // A callback called when a challenge signing request has completed. The 231 // |challenge|. The arguments to ChallengePlatformKey are in |context| [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingsession.h | 45 // Waiting for the secret challenge messsage or response from the peer. 61 PoloChallengeResponse* challenge); 83 // Gets the encoder used for encoding and decoding the secret challenge. This 157 // Gets the challenge response. 158 const PoloChallengeResponse& challenge() const { return *challenge_; } function in class:polo::pairing::PairingSession
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
DefaultHttpClientTest.java | 126 String challenge = "Digest realm=\"protected area\", " local 130 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 51 String challenge; field in class:NetscapeCertRequest 96 // challenge IA5STRING 107 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); 131 String challenge, 137 this.challenge = challenge; 144 content_der.add(new DERIA5String(challenge)); 158 return challenge; 163 challenge = value; 196 public boolean verify(String challenge) throws NoSuchAlgorithmException [all...] |
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/ |
enterprise_platform_keys_private_api.cc | 43 "Challenge is not base64 encoded."; 51 "Failed to sign the challenge."; 297 std::string challenge; local 298 if (!base::Base64Decode(params->challenge, &challenge)) { 324 this, challenge)); 330 const std::string& challenge, bool enabled) { 343 challenge)); 347 const std::string& challenge, PrepareKeyResult result) { 354 // Everything is checked. Sign the challenge 424 std::string challenge; local [all...] |
/external/ppp/pppd/ |
chap-new.c | 51 /* Hook for a plugin to validate CHAP challenge */ 54 unsigned char *challenge, unsigned char *response, 70 { "chap-max-challenge", o_int, &chap_max_transmits, 71 "Set max #xmits for challenge", OPT_PRIO }, 88 * These limits apply to challenge and response packets we send. 101 unsigned char challenge[CHAL_MAX_PKTLEN]; member in struct:chap_server_state 124 unsigned char *challenge, unsigned char *response, 226 * There isn't much to do until we receive a challenge. 251 * chap_timeout - It's time to send another challenge to the peer. 252 * This could be either a retransmission of a previous challenge, [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 78 * @challenge: 8-octet Challenge (OUT) 83 u8 *challenge) 98 os_memcpy(challenge, hash, 8); 141 * @challenge: 8-octet Challenge (IN) 145 void challenge_response(const u8 *challenge, const u8 *password_hash, 149 des_encrypt(challenge, password_hash, response); 150 des_encrypt(challenge, password_hash + 7, response + 8); 154 des_encrypt(challenge, zpwd, response + 16) 174 u8 challenge[8]; local 203 u8 challenge[8]; local 246 u8 password_hash_hash[16], challenge[8]; local [all...] |
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.h | 17 const u8 *challenge; member in struct:ieee802_11_elems
|