/external/chromium_org/net/http/ |
http_auth_handler_digest.cc | 93 HttpAuthChallengeTokenizer* challenge, 104 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 111 HttpAuthChallengeTokenizer* challenge) { 116 if (!LowerCaseEqualsASCII(challenge->scheme(), "digest")) 119 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); 122 // for the new challenge. 137 bool HttpAuthHandlerDigest::Init(HttpAuthChallengeTokenizer* challenge) { 138 return ParseChallenge(challenge); 171 // The digest challenge header looks like: 188 // webserver was not sending the realm with a BASIC challenge) [all...] |
http_auth_controller.h | 108 // Populates auth_info_ with the challenge information, so that 133 // This includes the challenge's parameters. If NULL, then there is no 138 // the handler_ to generate challenge responses. This identity can come from 146 // Contains information about the auth challenge. 155 // in response to an HTTP authentication challenge.
|
http_auth_handler_negotiate.h | 73 HttpAuthChallengeTokenizer* challenge, 110 HttpAuthChallengeTokenizer* challenge) OVERRIDE; 116 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE;
|
http_auth_handler_ntlm.h | 45 HttpAuthChallengeTokenizer* challenge, 112 HttpAuthChallengeTokenizer* challenge) OVERRIDE; 136 // Parse the challenge, saving the results into this instance.
|
http_auth_handler_negotiate.cc | 40 HttpAuthChallengeTokenizer* challenge, 64 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 81 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) 164 HttpAuthChallengeTokenizer* challenge) { 165 return auth_system_.ParseChallenge(challenge); 185 // The Negotiate challenge header looks like: 187 bool HttpAuthHandlerNegotiate::Init(HttpAuthChallengeTokenizer* challenge) { 206 auth_system_.ParseChallenge(challenge);
|
/external/mtpd/ |
l2tp.c | 72 #define CHALLENGE htons(11) 106 static uint8_t challenge[CHALLENGE_SIZE]; variable 334 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) { 340 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE); 373 static uint8_t *compute_response(uint8_t type, void *challenge, int size) 380 MD5_Update(&ctx, challenge, size); 393 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE), 402 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local 403 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE) [all...] |
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/handshake/ |
hybi00.py | 155 # 5.2 9. let /response/ be the MD5 finterprint of /challenge/ 159 'Challenge: %r (%s)', 163 'Challenge response: %r (%s)', 205 # 5.2 8. let /challenge/ be the concatenation of /part_1/, 206 challenge = '' 207 challenge += struct.pack('!I', key1) # network byteorder int 208 challenge += struct.pack('!I', key2) # network byteorder int 209 challenge += self._request.connection.read(8) 210 return challenge
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/handshake/ |
hybi00.py | 206 # 5.2 9. let /response/ be the MD5 finterprint of /challenge/ 210 'Challenge: %r (%s)', 214 'Challenge response: %r (%s)', 256 # 5.2 8. let /challenge/ be the concatenation of /part_1/, 257 challenge = '' 258 challenge += struct.pack('!I', key1) # network byteorder int 259 challenge += struct.pack('!I', key2) # network byteorder int 260 challenge += self._request.connection.read(8) 261 return challenge
|
/external/openssl/apps/ |
spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 132 else if (strcmp(*argv,"-challenge") == 0) 135 challenge= *(++argv); 174 BIO_printf(bio_err," -challenge arg challenge string\n"); 203 if(challenge) ASN1_STRING_set(spki->spkac->challenge, 204 challenge, (int)strlen(challenge));
|
/external/chromium_org/net/base/ |
keygen_handler_win.cc | 62 // signing key of |prov| and the specified ASCII |challenge| string and 66 const std::string& challenge, 68 std::wstring wide_challenge = base::ASCIIToWide(challenge); 76 // challenge IA5STRING 210 "and challenge";
|
auth.h | 17 // Holds info about an authentication challenge that we may want to display 30 // The service issuing the challenge. 37 // The realm of the challenge. May be empty. The encoding is UTF-8.
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingsession.h | 45 // Waiting for the secret challenge messsage or response from the peer. 61 PoloChallengeResponse* challenge); 83 // Gets the encoder used for encoding and decoding the secret challenge. This 157 // Gets the challenge response. 158 const PoloChallengeResponse& challenge() const { return *challenge_; } function in class:polo::pairing::PairingSession
|
clientpairingsession.cc | 28 PoloChallengeResponse* challenge, 31 : PairingSession(wire, context, challenge),
|
serverpairingsession.cc | 26 PoloChallengeResponse* challenge, 28 : PairingSession(wire, context, challenge),
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 87 /* Optional challenge values generated in EAP-FAST Phase 1 negotiation 160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 229 * eap_mschapv2_process - Process an EAP-MSCHAPv2 challenge message 245 const u8 *pos, *challenge; local 251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 253 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " 262 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " 269 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" 277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 279 challenge = data->passwd_change_challenge [all...] |
eap_gtc.c | 30 "with challenge/response"); 64 (len < 10 || os_memcmp(pos, "CHALLENGE=", 10) != 0)) { 65 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
|
/external/chromium_org/chrome/browser/renderer_host/pepper/ |
pepper_platform_verification_message_filter.cc | 57 const std::vector<uint8_t>& challenge) { 80 std::string(challenge.begin(), challenge.end()),
|
/external/google-tv-pairing-protocol/cpp/src/polo/encoding/ |
encodingoption.h | 26 // An encoding option for a challenge message consisting of an encoding scheme 54 // Gets the encoding scheme for the challenge message. 57 // Gets the number of symbols used in the challenge message for the encoding
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 143 * @param challenge -- 144 * the challenge from which the parameters are extracted. 146 public void setChallenge(Challenge challenge) { 147 this.scheme = challenge.scheme; 148 super.parameters = challenge.authParams; 162 * Sets the scheme of the challenge information for this 166 * the new string value that identifies the challenge information 174 * Returns the scheme of the challenge information for this 177 * @return the string value of the challenge information [all...] |
/external/chromium_org/google_apis/gaia/ |
google_service_auth_error.h | 55 // The user needs to satisfy a CAPTCHA challenge to unlock their account. 58 // will provide details about the associated challenge. 106 std::string token; // Globally identifies the specific CAPTCHA challenge. 125 // Globally identifies the specific second-factor challenge. 133 // Character length for the challenge field. 147 // Construct a CAPTCHA_REQUIRED error with CAPTCHA challenge data from the
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/sync/ |
GoogleServiceAuthError.java | 31 // The user needs to satisfy a CAPTCHA challenge to unlock their account. 34 // captcha() will provide details about the associated challenge.
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
serverpairingsessiontest.cc | 35 PoloChallengeResponse* challenge) 36 : ServerPairingSession(wire, context, challenge, "server1") {
|
/external/chromium_org/chrome/browser/chromeos/login/easy_unlock/ |
easy_unlock_create_keys_operation.cc | 101 void OnChallengeGenerated(const std::string& challenge); 172 LOG(ERROR) << "Easy unlock failed to generate challenge esk."; 182 // Work around to get HeaderAndBody bytes to use as challenge payload. 215 LOG(ERROR) << "Easy unlock failed to generate challenge payload."; 234 const std::string& challenge) { 235 if (challenge.empty()) { 236 LOG(ERROR) << "Easy unlock failed to generate challenge."; 241 device_->challenge = challenge; 319 LOG(ERROR) << "Easy unlock failed to create challenge for key creation." [all...] |
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
AuthenticationHelperImpl.java | 125 public ClientTransaction handleChallenge(Response challenge, 130 sipStack.getStackLogger().logDebug("handleChallenge: " + challenge); 149 * in-dialog challenge. 171 if (challenge == null || reoriginatedRequest == null) { 172 throw new NullPointerException("A null argument was passed to handle challenge."); 177 if (challenge.getStatusCode() == Response.UNAUTHORIZED) { 178 authHeaders = challenge.getHeaders(WWWAuthenticateHeader.NAME); 179 } else if (challenge.getStatusCode() == Response.PROXY_AUTHENTICATION_REQUIRED) { 180 authHeaders = challenge.getHeaders(ProxyAuthenticateHeader.NAME); 288 * @param authHeader the challenge that we should respond t [all...] |
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/ |
enterprise_platform_keys_private_api.h | 168 void GetDeviceAttestationEnabledCallback(const std::string& challenge, 170 void PrepareKeyCallback(const std::string& challenge, 205 void GetDeviceAttestationEnabledCallback(const std::string& challenge, 209 void PrepareKeyCallback(const std::string& challenge,
|