HomeSort by relevance Sort by last modified time
    Searched full:challenge (Results 101 - 125 of 458) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/chromium_org/net/http/
http_auth_handler_digest.cc 93 HttpAuthChallengeTokenizer* challenge,
104 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
111 HttpAuthChallengeTokenizer* challenge) {
116 if (!LowerCaseEqualsASCII(challenge->scheme(), "digest"))
119 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs();
122 // for the new challenge.
137 bool HttpAuthHandlerDigest::Init(HttpAuthChallengeTokenizer* challenge) {
138 return ParseChallenge(challenge);
171 // The digest challenge header looks like:
188 // webserver was not sending the realm with a BASIC challenge)
    [all...]
http_auth_controller.h 108 // Populates auth_info_ with the challenge information, so that
133 // This includes the challenge's parameters. If NULL, then there is no
138 // the handler_ to generate challenge responses. This identity can come from
146 // Contains information about the auth challenge.
155 // in response to an HTTP authentication challenge.
http_auth_handler_negotiate.h 73 HttpAuthChallengeTokenizer* challenge,
110 HttpAuthChallengeTokenizer* challenge) OVERRIDE;
116 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE;
http_auth_handler_ntlm.h 45 HttpAuthChallengeTokenizer* challenge,
112 HttpAuthChallengeTokenizer* challenge) OVERRIDE;
136 // Parse the challenge, saving the results into this instance.
http_auth_handler_negotiate.cc 40 HttpAuthChallengeTokenizer* challenge,
64 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
81 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
164 HttpAuthChallengeTokenizer* challenge) {
165 return auth_system_.ParseChallenge(challenge);
185 // The Negotiate challenge header looks like:
187 bool HttpAuthHandlerNegotiate::Init(HttpAuthChallengeTokenizer* challenge) {
206 auth_system_.ParseChallenge(challenge);
  /external/mtpd/
l2tp.c 72 #define CHALLENGE htons(11)
106 static uint8_t challenge[CHALLENGE_SIZE]; variable
334 if (fd == -1 || read(fd, challenge, CHALLENGE_SIZE) != CHALLENGE_SIZE) {
340 add_attribute_raw(CHALLENGE, challenge, CHALLENGE_SIZE);
373 static uint8_t *compute_response(uint8_t type, void *challenge, int size)
380 MD5_Update(&ctx, challenge, size);
393 return !memcmp(compute_response(SCCRP, challenge, CHALLENGE_SIZE),
402 uint8_t challenge[MAX_ATTRIBUTE_SIZE]; local
403 int size = get_attribute_raw(CHALLENGE, challenge, MAX_ATTRIBUTE_SIZE)
    [all...]
  /external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/handshake/
hybi00.py 155 # 5.2 9. let /response/ be the MD5 finterprint of /challenge/
159 'Challenge: %r (%s)',
163 'Challenge response: %r (%s)',
205 # 5.2 8. let /challenge/ be the concatenation of /part_1/,
206 challenge = ''
207 challenge += struct.pack('!I', key1) # network byteorder int
208 challenge += struct.pack('!I', key2) # network byteorder int
209 challenge += self._request.connection.read(8)
210 return challenge
  /external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/handshake/
hybi00.py 206 # 5.2 9. let /response/ be the MD5 finterprint of /challenge/
210 'Challenge: %r (%s)',
214 'Challenge response: %r (%s)',
256 # 5.2 8. let /challenge/ be the concatenation of /part_1/,
257 challenge = ''
258 challenge += struct.pack('!I', key1) # network byteorder int
259 challenge += struct.pack('!I', key2) # network byteorder int
260 challenge += self._request.connection.read(8)
261 return challenge
  /external/openssl/apps/
spkac.c 92 char *challenge = NULL, *keyfile = NULL; local
132 else if (strcmp(*argv,"-challenge") == 0)
135 challenge= *(++argv);
174 BIO_printf(bio_err," -challenge arg challenge string\n");
203 if(challenge) ASN1_STRING_set(spki->spkac->challenge,
204 challenge, (int)strlen(challenge));
  /external/chromium_org/net/base/
keygen_handler_win.cc 62 // signing key of |prov| and the specified ASCII |challenge| string and
66 const std::string& challenge,
68 std::wstring wide_challenge = base::ASCIIToWide(challenge);
76 // challenge IA5STRING
210 "and challenge";
auth.h 17 // Holds info about an authentication challenge that we may want to display
30 // The service issuing the challenge.
37 // The realm of the challenge. May be empty. The encoding is UTF-8.
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
pairingsession.h 45 // Waiting for the secret challenge messsage or response from the peer.
61 PoloChallengeResponse* challenge);
83 // Gets the encoder used for encoding and decoding the secret challenge. This
157 // Gets the challenge response.
158 const PoloChallengeResponse& challenge() const { return *challenge_; } function in class:polo::pairing::PairingSession
clientpairingsession.cc 28 PoloChallengeResponse* challenge,
31 : PairingSession(wire, context, challenge),
serverpairingsession.cc 26 PoloChallengeResponse* challenge,
28 : PairingSession(wire, context, challenge),
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 87 /* Optional challenge values generated in EAP-FAST Phase 1 negotiation
160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
229 * eap_mschapv2_process - Process an EAP-MSCHAPv2 challenge message
245 const u8 *pos, *challenge; local
251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
253 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data "
262 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length "
269 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge"
277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
279 challenge = data->passwd_change_challenge
    [all...]
eap_gtc.c 30 "with challenge/response");
64 (len < 10 || os_memcmp(pos, "CHALLENGE=", 10) != 0)) {
65 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
  /external/chromium_org/chrome/browser/renderer_host/pepper/
pepper_platform_verification_message_filter.cc 57 const std::vector<uint8_t>& challenge) {
80 std::string(challenge.begin(), challenge.end()),
  /external/google-tv-pairing-protocol/cpp/src/polo/encoding/
encodingoption.h 26 // An encoding option for a challenge message consisting of an encoding scheme
54 // Gets the encoding scheme for the challenge message.
57 // Gets the number of symbols used in the challenge message for the encoding
  /external/nist-sip/java/gov/nist/javax/sip/header/
AuthenticationHeader.java 143 * @param challenge --
144 * the challenge from which the parameters are extracted.
146 public void setChallenge(Challenge challenge) {
147 this.scheme = challenge.scheme;
148 super.parameters = challenge.authParams;
162 * Sets the scheme of the challenge information for this
166 * the new string value that identifies the challenge information
174 * Returns the scheme of the challenge information for this
177 * @return the string value of the challenge information
    [all...]
  /external/chromium_org/google_apis/gaia/
google_service_auth_error.h 55 // The user needs to satisfy a CAPTCHA challenge to unlock their account.
58 // will provide details about the associated challenge.
106 std::string token; // Globally identifies the specific CAPTCHA challenge.
125 // Globally identifies the specific second-factor challenge.
133 // Character length for the challenge field.
147 // Construct a CAPTCHA_REQUIRED error with CAPTCHA challenge data from the
  /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/sync/
GoogleServiceAuthError.java 31 // The user needs to satisfy a CAPTCHA challenge to unlock their account.
34 // captcha() will provide details about the associated challenge.
  /external/google-tv-pairing-protocol/cpp/tests/polo/pairing/
serverpairingsessiontest.cc 35 PoloChallengeResponse* challenge)
36 : ServerPairingSession(wire, context, challenge, "server1") {
  /external/chromium_org/chrome/browser/chromeos/login/easy_unlock/
easy_unlock_create_keys_operation.cc 101 void OnChallengeGenerated(const std::string& challenge);
172 LOG(ERROR) << "Easy unlock failed to generate challenge esk.";
182 // Work around to get HeaderAndBody bytes to use as challenge payload.
215 LOG(ERROR) << "Easy unlock failed to generate challenge payload.";
234 const std::string& challenge) {
235 if (challenge.empty()) {
236 LOG(ERROR) << "Easy unlock failed to generate challenge.";
241 device_->challenge = challenge;
319 LOG(ERROR) << "Easy unlock failed to create challenge for key creation."
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
AuthenticationHelperImpl.java 125 public ClientTransaction handleChallenge(Response challenge,
130 sipStack.getStackLogger().logDebug("handleChallenge: " + challenge);
149 * in-dialog challenge.
171 if (challenge == null || reoriginatedRequest == null) {
172 throw new NullPointerException("A null argument was passed to handle challenge.");
177 if (challenge.getStatusCode() == Response.UNAUTHORIZED) {
178 authHeaders = challenge.getHeaders(WWWAuthenticateHeader.NAME);
179 } else if (challenge.getStatusCode() == Response.PROXY_AUTHENTICATION_REQUIRED) {
180 authHeaders = challenge.getHeaders(ProxyAuthenticateHeader.NAME);
288 * @param authHeader the challenge that we should respond t
    [all...]
  /external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/
enterprise_platform_keys_private_api.h 168 void GetDeviceAttestationEnabledCallback(const std::string& challenge,
170 void PrepareKeyCallback(const std::string& challenge,
205 void GetDeviceAttestationEnabledCallback(const std::string& challenge,
209 void PrepareKeyCallback(const std::string& challenge,

Completed in 779 milliseconds

1 2 3 45 6 7 8 91011>>