HomeSort by relevance Sort by last modified time
    Searched full:challenge (Results 151 - 175 of 458) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/chromium_org/chromeos/test/data/network/
toplevel_openvpn_clientcert_with_cert_pems.onc 39 "StaticChallenge": "My static challenge",
  /external/chromium_org/net/http/
http_auth_unittest.cc 32 HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
35 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge,
73 // Basic is the only challenge type, pick it.
81 // Fake is the only challenge type, but it is unsupported.
http_auth_controller_unittest.cc 131 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE {
132 HttpAuthHandlerMock::Init(challenge);
137 if (challenge->scheme() == "Basic") {
  /external/chromium_org/net/websockets/
websocket_handshake_handler_test.cc 186 std::string challenge; local
188 request_handler.GetRequestInfo(url, &challenge);
205 EXPECT_EQ("dGhlIHNhbXBsZSBub25jZQ==", challenge);
227 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge));
  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLKeygenElement.idl 33 [Reflect] attribute DOMString challenge;
  /external/chromium_org/third_party/skia/samplecode/
SampleManyRects.cpp 60 // code a little more challenge.
  /external/nist-sip/java/gov/nist/javax/sip/
ClientTransactionExt.java 41 * an authentication challenge ).
  /external/ppp/pppd/plugins/radius/etc/
dictionary.compat 16 ATTRIBUTE Challenge-State 24 string
  /external/skia/samplecode/
SampleManyRects.cpp 60 // code a little more challenge.
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.h 17 const u8 *challenge; member in struct:ieee802_11_elems
  /frameworks/opt/bluetooth/src/android/bluetooth/client/pbap/
BluetoothPbapObexAuthenticator.java 65 Log.e(TAG, "Interrupted while waiting for challenge response");
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/
PhoneSubInfo.java 272 * challenge/response algorithm. The data string and challenge response are
277 * @param data authentication challenge data
278 * @return challenge response
  /external/apache-http/src/org/apache/http/impl/client/
AbstractAuthenticationHandler.java 139 Header challenge = challenges.get(id.toLowerCase(Locale.ENGLISH)); local
141 if (challenge != null) {
156 this.log.debug("Challenge for " + id + " authentication scheme not available");
  /external/chromium_org/net/base/
load_timing_info.h 101 // For requests that are sent again after an AUTH challenge, this will be true
103 // Responding to a proxy AUTH challenge is never considered to be reusing a
105 // challenge was received.
  /external/ppp/pppd/
eap.h 64 #define EAPSRP_CHALLENGE 1 /* Request 1 - Challenge */
90 eapMD5Chall, /* Sent MD5-Challenge */
134 int es_challen; /* Length of challenge string */
  /external/smack/src/org/jivesoftware/smack/
BOSHPacketReader.java 26 import org.jivesoftware.smack.sasl.SASLMechanism.Challenge;
89 } else if (parser.getName().equals("challenge")) {
95 connection.processPacket(new Challenge(
  /external/tcpdump/
print-eap.c 105 { EAP_TYPE_MD5_CHALLENGE, "MD5-challenge" },
146 { EAP_AKA_CHALLENGE, "Challenge" },
151 { EAP_SIM_CHALLENGE, "Challenge" },
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
49 case CHALLENGE:
50 return "CHALLENGE";
224 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge");
331 case CHALLENGE:
376 case CHALLENGE:
555 eap_sim_state(data, CHALLENGE);
573 wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message "
580 wpa_printf(MSG_DEBUG, "EAP-SIM: Challenge response includes the "
738 (data->state == START || data->state == CHALLENGE ||
    [all...]
eap_server_aka.c 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
65 case CHALLENGE:
66 return "CHALLENGE";
471 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge");
635 case CHALLENGE:
682 case CHALLENGE:
846 eap_aka_state(data, CHALLENGE);
915 wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge");
935 * sending another Challenge message */
953 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message
    [all...]
  /external/chromium_org/chrome/browser/chromeos/attestation/
platform_verification_flow.cc 115 const std::string& challenge,
119 challenge(challenge),
164 const std::string& challenge,
184 ChallengeContext context(web_contents, service_id, challenge, callback);
328 context.challenge,
344 LOG(ERROR) << "PlatformVerificationFlow: Failed to sign challenge.";
  /external/chromium_org/chromeos/dbus/
cryptohome_client.h 384 // Asynchronously signs an enterprise challenge with the key specified by
386 // the challenge response. |options| control how the challenge response is
387 // generated. |challenge| must be a valid enterprise attestation challenge.
400 const std::string& challenge,
403 // Asynchronously signs a simple challenge with the key specified by
404 // |key_type| and |key_name|. |challenge| can be any set of arbitrary bytes.
405 // A nonce will be appended to the challenge before signing; this method
415 const std::string& challenge,
    [all...]
  /external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/
enterprise_platform_keys_private_api_unittest.cc 95 const std::string& challenge,
109 const std::string& challenge,
228 // Base 64 encoding of 'challenge'.
315 "google.com", "device_id", _, "challenge", _))
372 // Base 64 encoding of 'challenge'
484 "challenge", _))
  /external/chromium_org/third_party/boringssl/src/ssl/
s23_srvr.c 397 CBS v2_client_hello, cipher_specs, session_id, challenge; local
440 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) ||
450 /* The client_random is the V2ClientHello challenge. Truncate or
453 i = (CBS_len(&challenge) > SSL3_RANDOM_SIZE) ? SSL3_RANDOM_SIZE : CBS_len(&challenge);
454 memcpy(random, CBS_data(&challenge), i);
  /external/wpa_supplicant_8/src/crypto/
milenage.c 29 * @_rand: RAND = 128-bit random challenge
80 * @_rand: RAND = 128-bit random challenge
166 * @_rand: RAND = 128-bit random challenge
203 * @_rand: RAND = 128-bit random challenge
230 * @_rand: RAND = 128-bit random challenge
261 * @_rand: RAND = 128-bit random challenge
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 400 CHALLENGE = b'#CHALLENGE#'
408 connection.send_bytes(CHALLENGE + message)
421 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
422 message = message[len(CHALLENGE):]

Completed in 648 milliseconds

1 2 3 4 5 67 8 91011>>