HomeSort by relevance Sort by last modified time
    Searched full:challenge (Results 51 - 75 of 458) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium_org/chrome/browser/resources/cryptotoken/
webrequest.js 32 * each challenge.
54 * each challenge.
67 * each challenge.
73 if (!incomingChallenge.hasOwnProperty('challenge'))
328 * @param {!string} serverChallenge The server's challenge, as a base64-
337 'challenge' : serverChallenge,
346 * @param {!string} serverChallenge The server's challenge, as a base64-
360 * @param {!string} serverChallenge The server's challenge, as a base64-
374 * @param {string=} opt_defaultAppId The app id to use for each challenge, if
375 * the challenge contains none
    [all...]
multiplesigner.js 7 * of gnubbies, signing each challenge in an array of challenges until a
17 * challenge: (SignHelperChallenge|undefined),
33 * Called with each gnubby/challenge that yields a final result, along with
111 var challenge = challenges[i];
113 B64_decode(challenge['challengeHash']);
114 decodedChallenge['appIdHash'] = B64_decode(challenge['appIdHash']);
115 decodedChallenge['keyHandle'] = B64_decode(challenge['keyHandle']);
116 if (challenge['version']) {
117 decodedChallenge['version'] = challenge['version'];
348 if (result['challenge'])
    [all...]
  /external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/
enterprise_platform_keys_private_api.cc 43 "Challenge is not base64 encoded.";
51 "Failed to sign the challenge.";
297 std::string challenge; local
298 if (!base::Base64Decode(params->challenge, &challenge)) {
324 this, challenge));
330 const std::string& challenge, bool enabled) {
343 challenge));
347 const std::string& challenge, PrepareKeyResult result) {
354 // Everything is checked. Sign the challenge
424 std::string challenge; local
    [all...]
  /external/chromium_org/net/http/
http_auth_handler_digest_unittest.cc 25 // |challenge|, and generates a response to the challenge which is returned in
31 // of the |challenge|. Otherwise, the scheme and host and port of |request_url|
32 // indicates the origin of the challenge.
36 const std::string& challenge,
45 EXPECT_FALSE(challenge.empty());
55 // Create a handler for a particular challenge.
58 challenge, target, url_origin.GetOrigin(), BoundNetLog(), &handler);
64 // Create a token in response to the challenge.
88 // The challenge string
89 const char* challenge; member in struct:net::__anon13895
389 const char* challenge; member in struct:net::__anon13896
    [all...]
http_auth_gssapi_posix_unittest.cc 185 HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
188 auth_gssapi.ParseChallenge(&challenge));
217 // If the first round challenge has an additional authentication token, it
218 // should be treated as an invalid challenge from the server.
223 HttpAuthChallengeTokenizer challenge(challenge_text.begin(),
226 auth_gssapi.ParseChallenge(&challenge));
230 // If a later-round challenge is simply "Negotiate", it should be treated as
231 // an authentication challenge rejection from the server or proxy.
253 // If a later-round challenge has an invalid base64 encoded token, it should
254 // be treated as an invalid challenge
    [all...]
http_auth_cache.h 20 // HttpAuthCache stores HTTP authentication identities and challenge info.
38 // The case-sensitive realm string of the challenge.
43 // The authentication scheme of the challenge.
48 // The authentication challenge.
102 // or updating the challenge.)
141 // |realm| - the auth realm for the challenge.
170 // scheme |scheme|. The cached auth challenge is replaced with
http_auth_handler_digest.h 68 HttpAuthChallengeTokenizer* challenge,
81 HttpAuthChallengeTokenizer* challenge) OVERRIDE;
84 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE;
125 // Parse the challenge, saving the results into this instance.
127 bool ParseChallenge(HttpAuthChallengeTokenizer* challenge);
160 // Information parsed from the challenge.
169 // challenge text, rather than |realm_| which has been converted to
http_auth_handler_ntlm.cc 20 HttpAuthChallengeTokenizer* challenge) {
21 return ParseChallenge(challenge, false);
70 // Initial challenge.
101 // The NTLM challenge header looks like:
106 // auth_sspi_ contains state for whether or not this is the initial challenge.
111 // there was previously a challenge round.
116 // Verify the challenge's auth-scheme.
http_auth_handler.cc 26 HttpAuthChallengeTokenizer* challenge,
36 auth_challenge_ = challenge->challenge_text();
37 bool ok = Init(challenge);
  /external/apache-http/src/org/apache/http/auth/
AuthScheme.java 38 * This interface represents an abstract challenge-response oriented
45 * <li>Parse and process the challenge sent by the targer server
53 * in response to the actual authorization challenge
62 * challenge-response exchanges
79 * Processes the given challenge token. Some authentication schemes
80 * may involve multiple challenge-response exchanges. Such schemes must be able
83 * @param header the challenge header
122 * Authentication process may involve a series of challenge-response exchanges.
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMScheme.java 65 private String challenge; field in class:NTLMScheme
74 this.challenge = null;
98 String challenge = buffer.substringTrimmed(pos, len); local
99 if (challenge.length() == 0) {
105 this.challenge = null;
108 this.challenge = challenge;
135 this.challenge);
NTLMEngine.java 36 * Type2 challenge.
64 * authentication challenge.
70 * @param challenge Type2 challenge.
79 String challenge) throws NTLMEngineException;
AuthSchemeBase.java 44 * defines the generic way of parsing an authentication challenge. It
45 * does not make any assumptions regarding the format of the challenge
46 * nor does it impose any specific way of responding to that challenge.
67 * Processes the given challenge token. Some authentication schemes
68 * may involve multiple challenge-response exchanges. Such schemes must be able
71 * @param header the challenge header
73 * @throws MalformedChallengeException is thrown if the authentication challenge
  /external/chromium_org/net/websockets/
websocket_handshake_handler_spdy_test.cc 53 std::string challenge; local
57 &challenge,
78 EXPECT_EQ(expected_challenge, challenge);
88 headers, challenge, spdy_util_.spdy_version()));
125 std::string challenge; local
129 &challenge,
152 EXPECT_EQ(expected_challenge, challenge);
167 headers, challenge, spdy_util_.spdy_version()));
  /external/chromium_org/ppapi/cpp/private/
platform_verification.cc 41 const Var& challenge,
50 pp_resource(), service_id.pp_var(), challenge.pp_var(),
  /external/chromium_org/ppapi/thunk/
ppb_platform_verification_private_thunk.cc 37 struct PP_Var challenge,
48 challenge,
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
pairingsession.cc 26 PoloChallengeResponse* challenge)
30 challenge_(challenge),
98 if (!challenge().CheckGamma(secret)) {
103 nonce_ = challenge().ExtractNonce(secret);
109 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_);
162 const Gamma* gamma = challenge().GetGamma(*nonce_);
230 const Alpha* alpha = challenge().GetAlpha(*nonce_);
267 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_);
  /external/smack/src/org/jivesoftware/smack/sasl/
SASLAnonymous.java 55 public void challengeReceived(String challenge) throws IOException {
56 // Build the challenge response stanza encoding the response text
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 31 int nt_challenge_response(const u8 *challenge, const u8 *password,
34 void challenge_response(const u8 *challenge, const u8 *password_hash,
  /frameworks/base/packages/Keyguard/src/com/android/keyguard/
SlidingChallengeLayout.java 43 * This layout handles interaction with the sliding security challenge views
51 // challenge view; these parameters change based on whether the challenge
60 // Drawn to show the drag handle in closed state; crossfades to the challenge view
61 // when challenge is fully visible
109 private int mGestureStartChallengeBottom; // where was the challenge at that time?
111 private int mDragHandleClosedBelow; // handle hitrect extension into the challenge view
113 private int mDragHandleOpenBelow; // handle hitrect extension into the challenge view
117 private int mChallengeBottomBound; // Number of pixels from the top of the challenge view
189 * Listener interface that reports changes in scroll state of the challenge area
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
eap_testing.txt 142 - EAP-MD5-Challenge
148 - EAP-PEAPv0 / MD5-Challenge
150 - EAP-TTLS / EAP-MD5-Challenge
180 - EAP-TTLS / EAP-MD5-Challenge (using FreeRADIUS as inner auth srv)
185 - EAP-MD5-Challenge
188 - EAP-PEAP / MD5-Challenge
192 - EAP-MD5-Challenge
207 - EAP-TTLS / EAP-MD5-Challenge
212 - EAP-MD5-Challenge
219 - EAP-PEAPv0 / MD5-Challenge
    [all...]
  /external/chromium_org/chrome/browser/chromeos/attestation/
platform_verification_flow.h 119 // This callback will be called when a challenge operation completes. If
121 // by the platform key (this is the original challenge appended with a random
144 // Invokes an asynchronous operation to challenge a platform key. Any user
148 // collusion between multiple services. The |challenge| is also an arbitrary
156 const std::string& challenge,
174 const std::string& challenge,
180 std::string challenge; member in struct:chromeos::attestation::PlatformVerificationFlow::ChallengeContext
217 // request to sign the challenge. If the operation timed out prior to this
231 // A callback called when a challenge signing request has completed. The
233 // |challenge|. The arguments to ChallengePlatformKey are in |context|
    [all...]
  /external/chromium_org/net/base/
keygen_handler.h 30 // incorporate the |challenge| into the Netscape SPKAC structure. The request
33 const std::string& challenge,
55 std::string challenge_; // challenge string sent by server
  /external/chromium_org/net/third_party/mozilla_security_manager/
nsKeygenHandler.h 57 // challenge: challenge string sent by server
62 const std::string& challenge,
  /external/chromium_org/ppapi/proxy/
platform_verification_private_resource.cc 35 const PP_Var& challenge,
41 // leaks on challenge failures (since they're only written to on success).
54 ArrayBufferVar::FromPPVar(challenge);

Completed in 420 milliseconds

1 23 4 5 6 7 8 91011>>