/external/chromium_org/extensions/browser/api/cast_channel/ |
cast_message_util.h | 35 // Fills |message_proto| appropriately for an auth challenge request message.
|
cast_socket.h | 147 // Verifies whether the challenge reply received from the peer is valid: 164 // then issue an auth challenge request. 165 // 6. Validate the auth challenge response. 278 // Reply received from the receiver to a challenge request. 310 // Task invoked to send the auth challenge. Canceled when the auth challenge
|
/external/chromium_org/net/base/ |
keygen_handler_openssl.cc | 28 ASN1_STRING_set(spki.get()->spkac->challenge,
|
/external/chromium_org/ppapi/proxy/ |
platform_verification_private_resource.h | 39 const PP_Var& challenge,
|
/external/chromium_org/ui/accessibility/ |
ax_tree_update.cc | 25 // The challenge here is that we want to indent the nodes being updated
|
/external/clang/www/demo/ |
what is this directory.txt | 9 If nobody in the LLVM community has the skills, one suggestion would be to post a request on a friendly Perl forum and see if anybody might be interested in taking on the challenge.
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
poloerror.h | 35 // The user provided challenge response (secret) is incorrect.
|
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/ |
DigestMD5SaslClient.java | 323 * Evaluates the challenge data and generates a response. If a challenge 328 * @param challenge The non-null challenge sent from the server. The 329 * challenge array may have zero length. 332 * if the challenge accompanied a "SUCCESS" status and the 333 * challenge only contains data for the client to update its 339 * challenge or generating a response. 342 byte[] challenge) 351 if (challenge.length == 0 [all...] |
/external/smack/src/com/novell/sasl/client/ |
DigestMD5SaslClient.java | 323 * Evaluates the challenge data and generates a response. If a challenge 328 * @param challenge The non-null challenge sent from the server. The 329 * challenge array may have zero length. 332 * if the challenge accompanied a "SUCCESS" status and the 333 * challenge only contains data for the client to update its 339 * challenge or generating a response. 342 byte[] challenge) 351 if (challenge.length == 0 [all...] |
/external/smack/src/org/apache/harmony/javax/security/sasl/ |
SaslClient.java | 24 byte[] evaluateChallenge(byte[] challenge) throws SaslException;
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
SASLFacebookConnect.java | 104 public void challengeReceived(String challenge) throws IOException { 105 // Build the challenge response stanza encoding the response text 109 if (challenge != null) { 110 String decodedResponse = new String(Base64.decode(challenge));
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
IPhoneSubInfo.aidl | 193 * challenge/response algorithm. The data string and challenge response are 199 * @param data authentication challenge data 200 * @return challenge response
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
PhoneSubInfoProxy.java | 264 * challenge/response algorithm. The data string and challenge response are 269 * @param data authentication challenge data 270 * @return challenge response
|
/external/ppp/pppd/plugins/radius/ |
radius.c | 77 unsigned char *challenge, 86 unsigned char *challenge, 320 * id -- the ID byte in the challenge 322 * challenge -- the challenge string we sent (length in first byte) 334 unsigned char *challenge, unsigned char *response, 350 challenge_len = *challenge++; 367 error("RADIUS: Challenge type %u unsupported", digest->code); 393 * add the challenge and response fields 397 /* CHAP-Challenge and CHAP-Password * [all...] |
/external/chromium_org/net/http/ |
http_auth_controller.cc | 28 // challenge. 217 // Try to create a handler using the previous auth challenge. 262 // challenge appeared to be rejected, or is using a stale nonce in the Digest 297 // subsequent challenge, invalidate cached credentials for the 319 // Find the best authentication challenge that we support. 344 // We found no supported challenge -- let the transaction continue so we 368 // Pass the challenge information back to the client. 417 handler_->auth_scheme(), handler_->challenge(), 507 // Populates response_.auth_challenge with the authentication challenge info.
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 51 enum { CHALLENGE, SUCCESS_REQ, FAILURE_REQ, SUCCESS, FAILURE } state; 65 data->state = CHALLENGE; 133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 224 case CHALLENGE: 255 if (data->state == CHALLENGE && 324 "Peer-Challenge"); 327 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 341 * challenge-response calculation, so remove domain prefix 502 case CHALLENGE:
|
/external/chromium_org/chromeos/cryptohome/ |
async_method_caller.cc | 199 const std::string& challenge, 209 challenge, 214 "Couldn't initiate async attestation enterprise challenge.")); 221 const std::string& challenge, 228 challenge, 233 "Couldn't initiate async attestation simple challenge."));
|
mock_async_method_caller.h | 84 const std::string& challenge, 90 const std::string& challenge,
|
/external/chromium_org/net/websockets/ |
websocket_handshake_handler.cc | 200 const GURL& url, std::string* challenge) { 218 *challenge = key; 225 std::string* challenge, 254 *challenge = iter.values(); 359 const std::string& challenge) { 376 ComputeSecWebSocketAccept(challenge, &websocket_accept); 394 const std::string& challenge, 405 base::SHA1HashString(challenge + websockets::kWebSocketGuid);
|
websocket_test_util.h | 57 // Generates a standard WebSocket handshake request. The challenge key used is 64 // A response with the appropriate accept header to match the above challenge
|
/external/chromium_org/third_party/WebKit/ManualTests/blackberry/ |
video-load-with-authentication.html | 10 This test case is aming at testing video loading with http authentication challenge. To use this test case you should setup your apache2 http server 33 <li>Then press load button, and fill the authentication challenge pop up dialog with the credential information created before, then wait for the result.</li>
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
clientpairingsessiontest.cc | 35 PoloChallengeResponse* challenge) 36 : ClientPairingSession(wire, context, challenge, "service1", "client1") {
|
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.microsoft | 22 ATTRIBUTE MS-CHAP-Challenge 11 string Microsoft 47 #ATTRIBUTE MS-ARAP-Challenge 33 string Microsoft
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
DefaultHttpClientTest.java | 126 String challenge = "Digest realm=\"protected area\", " local 130 digestScheme.processChallenge(new BasicHeader("WWW-Authenticate", challenge));
|
/external/chromium_org/chrome/browser/renderer_host/pepper/ |
pepper_platform_verification_message_filter.h | 43 const std::vector<uint8_t>& challenge);
|