/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PoloChallengeResponse.java | 228 * Logs debugging information from challenge-response generation. 233 * Logs verbose debugging information from challenge-response generation.
|
/external/smack/src/org/jivesoftware/smack/ |
SASLAuthentication.java | 501 * The server is challenging the SASL authentication we just sent. Forward the challenge
503 * the server. The length of the challenge-response sequence varies according to the
506 * @param challenge a base64 encoded string representing the challenge.
509 void challengeReceived(String challenge) throws IOException {
510 currentMechanism.challengeReceived(challenge);
|
SASLAuthentication.java.orig | 501 * The server is challenging the SASL authentication we just sent. Forward the challenge
503 * the server. The length of the challenge-response sequence varies according to the
506 * @param challenge a base64 encoded string representing the challenge.
509 void challengeReceived(String challenge) throws IOException {
510 currentMechanism.challengeReceived(challenge);
|
PacketReader.java | 25 import org.jivesoftware.smack.sasl.SASLMechanism.Challenge; 246 else if (parser.getName().equals("challenge")) { 249 processPacket(new Challenge(challengeData));
|
/external/ppp/pppd/ |
eap.c | 20 * This implementation of EAP supports MD5-Challenge and SRP-SHA1 21 * authentication styles. Note that support of MD5-Challenge is a 31 * For MD5-Challenge, there are two phases, and the second phase 32 * consists of sending the challenge itself and handling the 704 * pick a random challenge length between 1070 * Format and send an MD5-Challenge EAP Response message. [all...] |
/external/chromium_org/third_party/webrtc/base/ |
httpcommon.cc | 737 const char * challenge, size_t len, 744 challenge = DIGEST_CHALLENGE; 745 len = strlen(challenge); 749 HttpParseAttributes(challenge, len, args); 915 std::string challenge, decoded_challenge; local 916 if (HttpHasNthAttribute(args, 1, &challenge, NULL) 917 && Base64::Decode(challenge, Base64::DO_STRICT,
|
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 121 * Processes the Digest challenge. 123 * @param header the challenge header 125 * @throws MalformedChallengeException is thrown if the authentication challenge
|
RFC2617Scheme.java | 77 throw new MalformedChallengeException("Authentication challenge is empty");
|
/external/chromium_org/chrome/browser/extensions/api/easy_unlock_private/ |
easy_unlock_private_api.cc | 578 const std::string challenge = local 580 if (!challenge.empty()) { 582 easy_unlock_private::GetSignInChallenge::Results::Create(challenge);
|
/external/chromium_org/chromeos/dbus/ |
cryptohome_client.cc | 604 const std::string& challenge, 620 writer.AppendArrayOfBytes(reinterpret_cast<const uint8*>(challenge.data()), 621 challenge.size()); 633 const std::string& challenge, 643 writer.AppendArrayOfBytes(reinterpret_cast<const uint8*>(challenge.data()), 644 challenge.size()); [all...] |
/external/chromium_org/extensions/browser/api/cast_channel/ |
cast_socket_unittest.cc | 340 // Simulated result of verifying challenge reply. 527 // - Challenge request is sent (async) 528 // - Challenge response is received (async) 751 // Test connection error - challenge send fails 773 // Test connection error - challenge reply receive fails 796 // Test connection error - challenge reply verification fails [all...] |
cast_message_util.cc | 121 out += "challenge: {}, ";
|
/external/chromium_org/chrome/common/extensions/api/ |
easy_unlock_private.idl | 283 // Gets the sign-in challenge for the current user. 287 // the sign-in challenge. Check chrome.runtime.lastError for failures. Upon
|
/external/chromium_org/jingle/glue/ |
fake_ssl_client_socket.cc | 32 0x00, 0x10, // challenge len 38 0x1f, 0x17, 0x0c, 0xa6, 0x2f, 0x00, 0x78, 0xfc, // challenge
|
/external/chromium_org/net/base/ |
network_delegate.h | 220 // Called when a request receives an authentication challenge 231 // - AUTH_REQUIRED_RESPONSE_CANCEL_AUTH: The authentication challenge
|
/external/wpa_supplicant_8/wpa_supplicant/ |
README | 63 * EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1) 64 * EAP-TTLS/EAP-MD5-Challenge 84 * EAP-MD5-Challenge 558 3) EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the 680 challenge-response that uses an external device for generating the 708 it includes the challenge from the authentication server. 726 Example request for generic token card challenge-response: 728 CTRL-REQ-OTP-2:Challenge 1235663 needed for SSID foobar [all...] |
/frameworks/base/core/java/android/service/trust/ |
TrustAgentService.java | 169 * @param successful true if the user successfully completed the challenge. 229 * direct result of user action - such as solving a security challenge. The hint is used
|
/external/qemu/ui/ |
vnc-android.c | [all...] |
vnc.c | [all...] |
/development/ndk/platforms/android-4/samples/san-angeles/jni/ |
README.txt | 27 OpenGL ES Coding Challenge held in 2004-2005.
|
/external/apache-http/src/org/apache/http/auth/ |
AuthSchemeRegistry.java | 43 * authentication scheme implementation for a given type of authorization challenge.
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/ |
ChromeHttpAuthHandler.java | 43 // iff this is the first auth challenge attempt for this connection.
|
/external/chromium_org/components/data_reduction_proxy/common/ |
data_reduction_proxy_headers.h | 45 // Bypass due to 407 response from proxy without a challenge.
|
/external/chromium_org/content/child/ |
blink_platform_impl.h | 57 unsigned key_size_index, const blink::WebString& challenge,
|
/external/chromium_org/net/http/ |
http_auth_handler_factory_unittest.cc | 24 virtual int CreateAuthHandler(HttpAuthChallengeTokenizer* challenge,
|