HomeSort by relevance Sort by last modified time
    Searched full:challenge (Results 176 - 200 of 458) sorted by null

1 2 3 4 5 6 78 91011>>

  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 400 CHALLENGE = b'#CHALLENGE#'
408 connection.send_bytes(CHALLENGE + message)
421 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message
422 message = message[len(CHALLENGE):]
  /external/apache-http/src/org/apache/http/impl/auth/
BasicScheme.java 90 * Processes the Basic challenge.
92 * @param header the challenge header
94 * @throws MalformedChallengeException is thrown if the authentication challenge
  /external/chromium_org/net/third_party/nss/ssl/
ssltrace.c 159 PrintBuf(ss, "challenge", bp+9+lcs+ls, lc);
201 PrintBuf(ss, "challenge", bp+1, len-1);
210 PrintBuf(ss, "certificate-challenge", bp+2, len-2);
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
MessageDigestAlgorithm.java 23 * @param nonce_value A server-specified data string provided in the challenge.
99 * @param passwd the password to encode in the challenge response.
100 * @param nonce_value A server-specified data string provided in the challenge.
  /frameworks/base/packages/Keyguard/res/values/
attrs.xml 87 <!-- Security challenge container.
90 <enum name="challenge" value="2" />
100 security challenge container when it is collapsed. -->
  /external/chromium_org/chrome/browser/chromeos/login/easy_unlock/
easy_unlock_get_keys_operation.cc 89 device.challenge = *entry.bytes;
  /external/chromium_org/extensions/common/api/cast_channel/
cast_channel.proto 87 optional AuthChallenge challenge = 1;
  /external/chromium_org/net/http/
http_auth_sspi_win.cc 231 // Verify the challenge's auth-scheme.
238 // If a context has already been established, an empty challenge
246 // not be present in the auth challenge.
262 // Initial challenge.
proxy_client_socket.h 66 // When an auth challenge (407 response) is received during tunnel
http_response_info.h 120 // will contain additional information about the authentication challenge.
126 // challenge, client certificate request is not part of an HTTP response.
  /external/chromium_org/net/websockets/
websocket_handshake_constants.h 27 // The Sec-WebSockey-Key challenge is 16 random bytes, base64 encoded.
  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLAttributeNames.in 64 challenge
  /external/chromium_org/third_party/libjingle/source/talk/xmpp/
saslmechanism.cc 43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) {
  /external/libpcap/
ppp.h 58 #define PPP_CHAP 0xc223 /* Challenge Handshake Authentication Protocol */
  /external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/
DigestChallenge.java 50 byte[] challenge)
62 DirectiveList dirList = new DirectiveList(challenge);
75 * from the digest challenge byte array.
77 * @param dirList the list of directives parsed from the digest challenge
  /external/smack/src/com/novell/sasl/client/
DigestChallenge.java 50 byte[] challenge)
62 DirectiveList dirList = new DirectiveList(challenge);
75 * from the digest challenge byte array.
77 * @param dirList the list of directives parsed from the digest challenge
  /external/tcpdump/
ppp.h 64 #define PPP_CHAP 0xc223 /* Challenge Handshake Authentication Protocol */
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 21 * challenge-response calculation, so remove domain prefix
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_cli.sgml 45 challenge-response that uses an external device for generating the
74 case of OTP request, it includes the challenge from the
97 <para>Example request for generic token card challenge-response:</para>
100 CTRL-REQ-OTP-2:Challenge 1235663 needed for SSID foobar
  /external/chromium_org/third_party/webrtc/base/
httpclient.h 107 // an authentication challenge, a redirect response, or socket disconnection,
134 // challenge. The third parameter indicates the length of the response
  /external/google-tv-pairing-protocol/cpp/tests/polo/pairing/
pairingsessiontest.cc 37 PoloChallengeResponse* challenge)
38 : PairingSession(wire, context, challenge) {
  /external/openssl/crypto/asn1/
t_spki.c 90 chal = spki->spkac->challenge;
92 BIO_printf(out, " Challenge String: %s\n", chal->data);
  /external/wpa_supplicant_8/src/ap/
sta_info.h 90 u8 *challenge; /* IEEE 802.11 Shared Key Authentication Challenge */ member in struct:sta_info
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 34 "with challenge/response");
57 msg = data->prefix ? "CHALLENGE=Password" : "Password";
  /frameworks/base/obex/javax/obex/
SessionNotifier.java 55 * dependent as to how an authentication challenge and authentication
92 * <code>Authenticator</code> to use to respond to authentication challenge

Completed in 613 milliseconds

1 2 3 4 5 6 78 91011>>