/external/chromium_org/chromeos/test/data/network/ |
toplevel_openvpn_clientcert_with_cert_pems.onc | 39 "StaticChallenge": "My static challenge",
|
/external/chromium_org/net/http/ |
http_auth_unittest.cc | 32 HttpAuthChallengeTokenizer challenge(challenge_text.begin(), 35 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge, 73 // Basic is the only challenge type, pick it. 81 // Fake is the only challenge type, but it is unsupported.
|
http_auth_controller_unittest.cc | 131 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE { 132 HttpAuthHandlerMock::Init(challenge); 137 if (challenge->scheme() == "Basic") {
|
/external/chromium_org/net/websockets/ |
websocket_handshake_handler_test.cc | 186 std::string challenge; local 188 request_handler.GetRequestInfo(url, &challenge); 205 EXPECT_EQ("dGhlIHNhbXBsZSBub25jZQ==", challenge); 227 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge));
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLKeygenElement.idl | 33 [Reflect] attribute DOMString challenge;
|
/external/chromium_org/third_party/skia/samplecode/ |
SampleManyRects.cpp | 60 // code a little more challenge.
|
/external/nist-sip/java/gov/nist/javax/sip/ |
ClientTransactionExt.java | 41 * an authentication challenge ).
|
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.compat | 16 ATTRIBUTE Challenge-State 24 string
|
/external/skia/samplecode/ |
SampleManyRects.cpp | 60 // code a little more challenge.
|
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.h | 17 const u8 *challenge; member in struct:ieee802_11_elems
|
/frameworks/opt/bluetooth/src/android/bluetooth/client/pbap/ |
BluetoothPbapObexAuthenticator.java | 65 Log.e(TAG, "Interrupted while waiting for challenge response");
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
PhoneSubInfo.java | 272 * challenge/response algorithm. The data string and challenge response are 277 * @param data authentication challenge data 278 * @return challenge response
|
/external/apache-http/src/org/apache/http/impl/client/ |
AbstractAuthenticationHandler.java | 139 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local 141 if (challenge != null) { 156 this.log.debug("Challenge for " + id + " authentication scheme not available");
|
/external/chromium_org/net/base/ |
load_timing_info.h | 101 // For requests that are sent again after an AUTH challenge, this will be true 103 // Responding to a proxy AUTH challenge is never considered to be reusing a 105 // challenge was received.
|
/external/ppp/pppd/ |
eap.h | 64 #define EAPSRP_CHALLENGE 1 /* Request 1 - Challenge */ 90 eapMD5Chall, /* Sent MD5-Challenge */ 134 int es_challen; /* Length of challenge string */
|
/external/smack/src/org/jivesoftware/smack/ |
BOSHPacketReader.java | 26 import org.jivesoftware.smack.sasl.SASLMechanism.Challenge; 89 } else if (parser.getName().equals("challenge")) { 95 connection.processPacket(new Challenge(
|
/external/tcpdump/ |
print-eap.c | 105 { EAP_TYPE_MD5_CHALLENGE, "MD5-challenge" }, 146 { EAP_AKA_CHALLENGE, "Challenge" }, 151 { EAP_SIM_CHALLENGE, "Challenge" },
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 49 case CHALLENGE: 50 return "CHALLENGE"; 224 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge"); 331 case CHALLENGE: 376 case CHALLENGE: 555 eap_sim_state(data, CHALLENGE); 573 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message " 580 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the " 738 (data->state == START || data->state == CHALLENGE || [all...] |
eap_server_aka.c | 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 65 case CHALLENGE: 66 return "CHALLENGE"; 471 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge"); 635 case CHALLENGE: 682 case CHALLENGE: 846 eap_aka_state(data, CHALLENGE); 915 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge"); 935 * sending another Challenge message */ 953 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message [all...] |
/external/chromium_org/chrome/browser/chromeos/attestation/ |
platform_verification_flow.cc | 115 const std::string& challenge, 119 challenge(challenge), 164 const std::string& challenge, 184 ChallengeContext context(web_contents, service_id, challenge, callback); 328 context.challenge, 344 LOG(ERROR) << "PlatformVerificationFlow: Failed to sign challenge.";
|
/external/chromium_org/chromeos/dbus/ |
cryptohome_client.h | 384 // Asynchronously signs an enterprise challenge with the key specified by 386 // the challenge response. |options| control how the challenge response is 387 // generated. |challenge| must be a valid enterprise attestation challenge. 400 const std::string& challenge, 403 // Asynchronously signs a simple challenge with the key specified by 404 // |key_type| and |key_name|. |challenge| can be any set of arbitrary bytes. 405 // A nonce will be appended to the challenge before signing; this method 415 const std::string& challenge, [all...] |
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/ |
enterprise_platform_keys_private_api_unittest.cc | 95 const std::string& challenge, 109 const std::string& challenge, 228 // Base 64 encoding of 'challenge'. 315 "google.com", "device_id", _, "challenge", _)) 372 // Base 64 encoding of 'challenge' 484 "challenge", _))
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
s23_srvr.c | 397 CBS v2_client_hello, cipher_specs, session_id, challenge; local 440 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || 450 /* The client_random is the V2ClientHello challenge. Truncate or 453 i = (CBS_len(&challenge) > SSL3_RANDOM_SIZE) ? SSL3_RANDOM_SIZE : CBS_len(&challenge); 454 memcpy(random, CBS_data(&challenge), i);
|
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 29 * @_rand: RAND = 128-bit random challenge 80 * @_rand: RAND = 128-bit random challenge 166 * @_rand: RAND = 128-bit random challenge 203 * @_rand: RAND = 128-bit random challenge 230 * @_rand: RAND = 128-bit random challenge 261 * @_rand: RAND = 128-bit random challenge
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 400 CHALLENGE = b'#CHALLENGE#' 408 connection.send_bytes(CHALLENGE + message) 421 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 422 message = message[len(CHALLENGE):]
|