/prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 400 CHALLENGE = b'#CHALLENGE#' 408 connection.send_bytes(CHALLENGE + message) 421 assert message[:len(CHALLENGE)] == CHALLENGE, 'message = %r' % message 422 message = message[len(CHALLENGE):]
|
/external/apache-http/src/org/apache/http/impl/auth/ |
BasicScheme.java | 90 * Processes the Basic challenge. 92 * @param header the challenge header 94 * @throws MalformedChallengeException is thrown if the authentication challenge
|
/external/chromium_org/net/third_party/nss/ssl/ |
ssltrace.c | 159 PrintBuf(ss, "challenge", bp+9+lcs+ls, lc); 201 PrintBuf(ss, "challenge", bp+1, len-1); 210 PrintBuf(ss, "certificate-challenge", bp+2, len-2);
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
MessageDigestAlgorithm.java | 23 * @param nonce_value A server-specified data string provided in the challenge. 99 * @param passwd the password to encode in the challenge response. 100 * @param nonce_value A server-specified data string provided in the challenge.
|
/frameworks/base/packages/Keyguard/res/values/ |
attrs.xml | 87 <!-- Security challenge container. 90 <enum name="challenge" value="2" /> 100 security challenge container when it is collapsed. -->
|
/external/chromium_org/chrome/browser/chromeos/login/easy_unlock/ |
easy_unlock_get_keys_operation.cc | 89 device.challenge = *entry.bytes;
|
/external/chromium_org/extensions/common/api/cast_channel/ |
cast_channel.proto | 87 optional AuthChallenge challenge = 1;
|
/external/chromium_org/net/http/ |
http_auth_sspi_win.cc | 231 // Verify the challenge's auth-scheme. 238 // If a context has already been established, an empty challenge 246 // not be present in the auth challenge. 262 // Initial challenge.
|
proxy_client_socket.h | 66 // When an auth challenge (407 response) is received during tunnel
|
http_response_info.h | 120 // will contain additional information about the authentication challenge. 126 // challenge, client certificate request is not part of an HTTP response.
|
/external/chromium_org/net/websockets/ |
websocket_handshake_constants.h | 27 // The Sec-WebSockey-Key challenge is 16 random bytes, base64 encoded.
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLAttributeNames.in | 64 challenge
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
saslmechanism.cc | 43 SaslMechanism::HandleSaslChallenge(const XmlElement * challenge) {
|
/external/libpcap/ |
ppp.h | 58 #define PPP_CHAP 0xc223 /* Challenge Handshake Authentication Protocol */
|
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/ |
DigestChallenge.java | 50 byte[] challenge) 62 DirectiveList dirList = new DirectiveList(challenge); 75 * from the digest challenge byte array. 77 * @param dirList the list of directives parsed from the digest challenge
|
/external/smack/src/com/novell/sasl/client/ |
DigestChallenge.java | 50 byte[] challenge) 62 DirectiveList dirList = new DirectiveList(challenge); 75 * from the digest challenge byte array. 77 * @param dirList the list of directives parsed from the digest challenge
|
/external/tcpdump/ |
ppp.h | 64 #define PPP_CHAP 0xc223 /* Challenge Handshake Authentication Protocol */
|
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 21 * challenge-response calculation, so remove domain prefix
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_cli.sgml | 45 challenge-response that uses an external device for generating the 74 case of OTP request, it includes the challenge from the 97 <para>Example request for generic token card challenge-response:</para> 100 CTRL-REQ-OTP-2:Challenge 1235663 needed for SSID foobar
|
/external/chromium_org/third_party/webrtc/base/ |
httpclient.h | 107 // an authentication challenge, a redirect response, or socket disconnection, 134 // challenge. The third parameter indicates the length of the response
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
pairingsessiontest.cc | 37 PoloChallengeResponse* challenge) 38 : PairingSession(wire, context, challenge) {
|
/external/openssl/crypto/asn1/ |
t_spki.c | 90 chal = spki->spkac->challenge; 92 BIO_printf(out, " Challenge String: %s\n", chal->data);
|
/external/wpa_supplicant_8/src/ap/ |
sta_info.h | 90 u8 *challenge; /* IEEE 802.11 Shared Key Authentication Challenge */ member in struct:sta_info
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 34 "with challenge/response"); 57 msg = data->prefix ? "CHALLENGE=Password" : "Password";
|
/frameworks/base/obex/javax/obex/ |
SessionNotifier.java | 55 * dependent as to how an authentication challenge and authentication 92 * <code>Authenticator</code> to use to respond to authentication challenge
|