HomeSort by relevance Sort by last modified time
    Searched refs:challenge (Results 1 - 25 of 209) sorted by null

1 2 3 4 5 6 7 8 9

  /external/chromium_org/net/base/
keygen_handler.cc 18 const std::string& challenge,
21 challenge_(challenge),
  /external/chromium_org/net/http/
http_auth_handler_basic.h 25 HttpAuthChallengeTokenizer* challenge,
35 HttpAuthChallengeTokenizer* challenge) OVERRIDE;
38 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE;
48 bool ParseChallenge(HttpAuthChallengeTokenizer* challenge);
http_auth_challenge_tokenizer_unittest.cc 12 HttpAuthChallengeTokenizer challenge(challenge_str.begin(),
14 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
17 EXPECT_EQ(std::string("Basic"), challenge.scheme());
28 HttpAuthChallengeTokenizer challenge(challenge_str.begin(),
30 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
33 EXPECT_EQ(std::string("Basic"), challenge.scheme());
44 HttpAuthChallengeTokenizer challenge(challenge_str.begin(),
46 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
49 EXPECT_EQ(std::string("Basic"), challenge.scheme());
60 HttpAuthChallengeTokenizer challenge(challenge_str.begin()
    [all...]
http_log_util.cc 15 bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) {
18 if (challenge->challenge_text().find(',') != std::string::npos)
21 std::string scheme = StringToLowerASCII(challenge->scheme());
65 HttpAuthChallengeTokenizer challenge(value.begin(), value.end());
66 if (ShouldRedactChallenge(&challenge)) {
67 redact_begin = challenge.params_begin();
68 redact_end = challenge.params_end();
http_auth_handler_basic.cc 21 // Parses a realm from an auth challenge, and converts to UTF8-encoding.
28 // production of challenge that realm is required.
56 bool HttpAuthHandlerBasic::Init(HttpAuthChallengeTokenizer* challenge) {
60 return ParseChallenge(challenge);
64 HttpAuthChallengeTokenizer* challenge) {
65 // Verify the challenge's auth-scheme.
66 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic"))
70 if (!ParseRealm(*challenge, &realm))
78 HttpAuthChallengeTokenizer* challenge) {
80 // should be treated as a rejection. However, if the new challenge
    [all...]
http_auth_handler_basic_unittest.cc 36 std::string challenge = "Basic realm=\"Atlantis\""; local
39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
53 const char* challenge; member in struct:net::__anon13281
56 // The handler is initialized using this challenge. The first
58 // to treat the second challenge as a rejection since it is for
65 // A challenge for a different realm.
73 // challenge should be treated as being for "First" realm.
90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
94 std::string challenge(tests[i].challenge);
103 const char* challenge; member in struct:net::__anon13282
187 std::string challenge = tests[i].challenge; local
    [all...]
http_auth_handler.h 28 // Initializes the handler using a challenge issued by a server.
29 // |challenge| must be non-NULL and have already tokenized the
32 // for later use, and are not part of the initial challenge.
33 bool InitFromChallenge(HttpAuthChallengeTokenizer* challenge,
43 // NTLM+Negotiate it may indicate that another round of challenge+response
46 // be made with a different nonce provided in the challenge.
48 // |challenge| must be non-NULL and have already tokenized the
52 HttpAuthChallengeTokenizer* challenge) = 0;
89 // The challenge which was issued when creating the handler.
90 const std::string challenge() const function in class:net::HttpAuthHandler
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
chap.c 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
25 addr[2] = challenge;
chap.h 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /external/ppp/pppd/
chap-md5.c 59 unsigned char *challenge, unsigned char *response,
67 challenge_len = *challenge++;
70 /* Generate hash of ID, secret, challenge */
74 MD5_Update(&ctx, challenge, challenge_len);
89 unsigned char *challenge, char *secret, int secret_len,
94 int challenge_len = *challenge++;
99 MD5_Update(&ctx, challenge, challenge_len);
chap-new.h 52 * Semi-arbitrary limits on challenge and response fields.
97 * Note: challenge and response arguments below are formatted as
98 * a length byte followed by the actual challenge/response data.
100 void (*generate_challenge)(unsigned char *challenge);
103 unsigned char *challenge, unsigned char *response,
106 unsigned char *challenge, char *secret, int secret_len,
114 /* Hook for a plugin to validate CHAP challenge */
117 unsigned char *challenge, unsigned char *response,
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMScheme.java 59 private String challenge; field in class:NTLMScheme
68 this.challenge = null;
92 String challenge = buffer.substringTrimmed(pos, len); local
93 if (challenge.length() == 0) {
99 this.challenge = null;
102 this.challenge = challenge;
129 this.challenge);
NTLMEngine.java 36 * Type2 challenge.
59 * authentication challenge.
65 * @param challenge Type2 challenge.
74 String challenge) throws NTLMEngineException;
  /external/chromium_org/components/data_reduction_proxy/browser/
http_auth_handler_data_reduction_proxy.cc 58 HttpAuthChallengeTokenizer* challenge,
72 // sniffed by a malicious proxy that presents an appropriate challenge.
85 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
93 HttpAuthChallengeTokenizer* challenge) {
114 HttpAuthChallengeTokenizer* challenge) {
118 return ParseChallenge(challenge);
136 HttpAuthChallengeTokenizer* challenge) {
138 // Verify the challenge's auth-scheme.
139 if (!LowerCaseEqualsASCII(challenge->scheme(),
141 VLOG(1) << "Parsed challenge without SpdyProxy type"
    [all...]
http_auth_handler_data_reduction_proxy.h 31 net::HttpAuthChallengeTokenizer* challenge,
49 net::HttpAuthChallengeTokenizer* challenge) OVERRIDE;
60 virtual bool Init(net::HttpAuthChallengeTokenizer* challenge) OVERRIDE;
67 bool ParseChallenge(net::HttpAuthChallengeTokenizer* challenge);
http_auth_handler_data_reduction_proxy_unittest.cc 43 // Verifies that challenge parsing is expected as described in individual
48 const char* origin; // Origin for challenge
49 const char* challenge; // Challenge string member in struct:data_reduction_proxy::__anon10921
52 // A well-formed challenge where a sid is provided produces a valid
94 tests[j].challenge, targets[i], origin, BoundNetLog(),
113 // Verifies that any repeat challenge is treated as a failure.
123 std::string challenge(kValidChallenge);
124 HttpAuthChallengeTokenizer tok(challenge.begin(),
125 challenge.end())
134 const char* challenge; member in struct:data_reduction_proxy::__anon10922
156 std::string challenge = tests[i].challenge; local
    [all...]
  /external/chromium_org/net/third_party/mozilla_security_manager/
nsKeygenHandler.h 57 // challenge: challenge string sent by server
62 const std::string& challenge,
  /external/chromium_org/net/websockets/
websocket_handshake_handler.h 49 // Gets request info to open WebSocket connection and fills challenge data in
50 // |challenge|.
51 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge);
53 // Also, fills challenge data in |challenge|.
56 std::string* challenge,
89 const std::string& challenge);
92 const std::string& challenge,
websocket_handshake_handler_spdy_test.cc 53 std::string challenge; local
57 &challenge,
78 EXPECT_EQ(expected_challenge, challenge);
88 headers, challenge, spdy_util_.spdy_version()));
125 std::string challenge; local
129 &challenge,
152 EXPECT_EQ(expected_challenge, challenge);
167 headers, challenge, spdy_util_.spdy_version()));
  /external/chromium_org/ppapi/c/private/
ppb_platform_verification_private.h 68 * Requests a platform challenge for a given service id.
71 * <code>PP_VARTYPE_STRING</code> containing the service_id for the challenge.
73 * @param[in] challenge A <code>PP_Var</code> of type
74 * <code>PP_VARTYPE_ARRAY_BUFFER</code> that contains the challenge data.
89 * the platform challenge has been completed. This callback will only run if
96 struct PP_Var challenge,
  /external/chromium_org/ppapi/cpp/private/
platform_verification.h 22 const Var& challenge,
  /external/chromium_org/ppapi/thunk/
ppb_platform_verification_api.h 23 const PP_Var& challenge,
  /external/smack/src/org/apache/harmony/javax/security/sasl/
SaslClient.java 24 byte[] evaluateChallenge(byte[] challenge) throws SaslException;
  /frameworks/base/obex/javax/obex/
ObexSession.java 55 * Called when the server received an authentication challenge header. This
56 * will cause the authenticator to handle the authentication challenge.
57 * @param header the header with the authentication challenge
68 * An authentication challenge is made up of one required and two
70 * the authentication challenge and it represents the challenge digest
76 byte[] challenge = ObexHelper.getTagValue((byte)0x00, header.mAuthChall);
150 * will be sent. The second optional tag is 0x02 and is the challenge
163 byte[] digest = new byte[challenge.length + password.length + 1];
164 System.arraycopy(challenge, 0, digest, 0, challenge.length)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
NetscapeCertRequest.java 51 String challenge; field in class:NetscapeCertRequest
96 // challenge IA5STRING
107 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString();
131 String challenge,
137 this.challenge = challenge;
144 content_der.add(new DERIA5String(challenge));
158 return challenge;
163 challenge = value;
196 public boolean verify(String challenge) throws NoSuchAlgorithmException
    [all...]

Completed in 421 milliseconds

1 2 3 4 5 6 7 8 9