/external/chromium_org/chrome/browser/resources/cryptotoken/ |
webrequest.js | 32 * each challenge. 54 * each challenge. 67 * each challenge. 73 if (!incomingChallenge.hasOwnProperty('challenge')) 328 * @param {!string} serverChallenge The server's challenge, as a base64- 337 'challenge' : serverChallenge, 346 * @param {!string} serverChallenge The server's challenge, as a base64- 360 * @param {!string} serverChallenge The server's challenge, as a base64- 374 * @param {string=} opt_defaultAppId The app id to use for each challenge, if 375 * the challenge contains none [all...] |
multiplesigner.js | 7 * of gnubbies, signing each challenge in an array of challenges until a 17 * challenge: (SignHelperChallenge|undefined), 33 * Called with each gnubby/challenge that yields a final result, along with 111 var challenge = challenges[i]; 113 B64_decode(challenge['challengeHash']); 114 decodedChallenge['appIdHash'] = B64_decode(challenge['appIdHash']); 115 decodedChallenge['keyHandle'] = B64_decode(challenge['keyHandle']); 116 if (challenge['version']) { 117 decodedChallenge['version'] = challenge['version']; 348 if (result['challenge']) [all...] |
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/ |
enterprise_platform_keys_private_api.cc | 43 "Challenge is not base64 encoded."; 51 "Failed to sign the challenge."; 297 std::string challenge; local 298 if (!base::Base64Decode(params->challenge, &challenge)) { 324 this, challenge)); 330 const std::string& challenge, bool enabled) { 343 challenge)); 347 const std::string& challenge, PrepareKeyResult result) { 354 // Everything is checked. Sign the challenge 424 std::string challenge; local [all...] |
/external/chromium_org/net/http/ |
http_auth_handler_digest_unittest.cc | 25 // |challenge|, and generates a response to the challenge which is returned in 31 // of the |challenge|. Otherwise, the scheme and host and port of |request_url| 32 // indicates the origin of the challenge. 36 const std::string& challenge, 45 EXPECT_FALSE(challenge.empty()); 55 // Create a handler for a particular challenge. 58 challenge, target, url_origin.GetOrigin(), BoundNetLog(), &handler); 64 // Create a token in response to the challenge. 88 // The challenge string 89 const char* challenge; member in struct:net::__anon13895 389 const char* challenge; member in struct:net::__anon13896 [all...] |
http_auth_gssapi_posix_unittest.cc | 185 HttpAuthChallengeTokenizer challenge(challenge_text.begin(), 188 auth_gssapi.ParseChallenge(&challenge)); 217 // If the first round challenge has an additional authentication token, it 218 // should be treated as an invalid challenge from the server. 223 HttpAuthChallengeTokenizer challenge(challenge_text.begin(), 226 auth_gssapi.ParseChallenge(&challenge)); 230 // If a later-round challenge is simply "Negotiate", it should be treated as 231 // an authentication challenge rejection from the server or proxy. 253 // If a later-round challenge has an invalid base64 encoded token, it should 254 // be treated as an invalid challenge [all...] |
http_auth_cache.h | 20 // HttpAuthCache stores HTTP authentication identities and challenge info. 38 // The case-sensitive realm string of the challenge. 43 // The authentication scheme of the challenge. 48 // The authentication challenge. 102 // or updating the challenge.) 141 // |realm| - the auth realm for the challenge. 170 // scheme |scheme|. The cached auth challenge is replaced with
|
http_auth_handler_digest.h | 68 HttpAuthChallengeTokenizer* challenge, 81 HttpAuthChallengeTokenizer* challenge) OVERRIDE; 84 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE; 125 // Parse the challenge, saving the results into this instance. 127 bool ParseChallenge(HttpAuthChallengeTokenizer* challenge); 160 // Information parsed from the challenge. 169 // challenge text, rather than |realm_| which has been converted to
|
http_auth_handler_ntlm.cc | 20 HttpAuthChallengeTokenizer* challenge) { 21 return ParseChallenge(challenge, false); 70 // Initial challenge. 101 // The NTLM challenge header looks like: 106 // auth_sspi_ contains state for whether or not this is the initial challenge. 111 // there was previously a challenge round. 116 // Verify the challenge's auth-scheme.
|
http_auth_handler.cc | 26 HttpAuthChallengeTokenizer* challenge, 36 auth_challenge_ = challenge->challenge_text(); 37 bool ok = Init(challenge);
|
/external/apache-http/src/org/apache/http/auth/ |
AuthScheme.java | 38 * This interface represents an abstract challenge-response oriented 45 * <li>Parse and process the challenge sent by the targer server 53 * in response to the actual authorization challenge 62 * challenge-response exchanges 79 * Processes the given challenge token. Some authentication schemes 80 * may involve multiple challenge-response exchanges. Such schemes must be able 83 * @param header the challenge header 122 * Authentication process may involve a series of challenge-response exchanges.
|
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMScheme.java | 65 private String challenge; field in class:NTLMScheme 74 this.challenge = null; 98 String challenge = buffer.substringTrimmed(pos, len); local 99 if (challenge.length() == 0) { 105 this.challenge = null; 108 this.challenge = challenge; 135 this.challenge);
|
NTLMEngine.java | 36 * Type2 challenge. 64 * authentication challenge. 70 * @param challenge Type2 challenge. 79 String challenge) throws NTLMEngineException;
|
AuthSchemeBase.java | 44 * defines the generic way of parsing an authentication challenge. It 45 * does not make any assumptions regarding the format of the challenge 46 * nor does it impose any specific way of responding to that challenge. 67 * Processes the given challenge token. Some authentication schemes 68 * may involve multiple challenge-response exchanges. Such schemes must be able 71 * @param header the challenge header 73 * @throws MalformedChallengeException is thrown if the authentication challenge
|
/external/chromium_org/net/websockets/ |
websocket_handshake_handler_spdy_test.cc | 53 std::string challenge; local 57 &challenge, 78 EXPECT_EQ(expected_challenge, challenge); 88 headers, challenge, spdy_util_.spdy_version())); 125 std::string challenge; local 129 &challenge, 152 EXPECT_EQ(expected_challenge, challenge); 167 headers, challenge, spdy_util_.spdy_version()));
|
/external/chromium_org/ppapi/cpp/private/ |
platform_verification.cc | 41 const Var& challenge, 50 pp_resource(), service_id.pp_var(), challenge.pp_var(),
|
/external/chromium_org/ppapi/thunk/ |
ppb_platform_verification_private_thunk.cc | 37 struct PP_Var challenge, 48 challenge,
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingsession.cc | 26 PoloChallengeResponse* challenge) 30 challenge_(challenge), 98 if (!challenge().CheckGamma(secret)) { 103 nonce_ = challenge().ExtractNonce(secret); 109 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_); 162 const Gamma* gamma = challenge().GetGamma(*nonce_); 230 const Alpha* alpha = challenge().GetAlpha(*nonce_); 267 const Alpha* gen_alpha = challenge().GetAlpha(*nonce_);
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
SASLAnonymous.java | 55 public void challengeReceived(String challenge) throws IOException {
56 // Build the challenge response stanza encoding the response text
|
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 34 void challenge_response(const u8 *challenge, const u8 *password_hash,
|
/frameworks/base/packages/Keyguard/src/com/android/keyguard/ |
SlidingChallengeLayout.java | 43 * This layout handles interaction with the sliding security challenge views 51 // challenge view; these parameters change based on whether the challenge 60 // Drawn to show the drag handle in closed state; crossfades to the challenge view 61 // when challenge is fully visible 109 private int mGestureStartChallengeBottom; // where was the challenge at that time? 111 private int mDragHandleClosedBelow; // handle hitrect extension into the challenge view 113 private int mDragHandleOpenBelow; // handle hitrect extension into the challenge view 117 private int mChallengeBottomBound; // Number of pixels from the top of the challenge view 189 * Listener interface that reports changes in scroll state of the challenge area [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
eap_testing.txt | 142 - EAP-MD5-Challenge 148 - EAP-PEAPv0 / MD5-Challenge 150 - EAP-TTLS / EAP-MD5-Challenge 180 - EAP-TTLS / EAP-MD5-Challenge (using FreeRADIUS as inner auth srv) 185 - EAP-MD5-Challenge 188 - EAP-PEAP / MD5-Challenge 192 - EAP-MD5-Challenge 207 - EAP-TTLS / EAP-MD5-Challenge 212 - EAP-MD5-Challenge 219 - EAP-PEAPv0 / MD5-Challenge [all...] |
/external/chromium_org/chrome/browser/chromeos/attestation/ |
platform_verification_flow.h | 119 // This callback will be called when a challenge operation completes. If 121 // by the platform key (this is the original challenge appended with a random 144 // Invokes an asynchronous operation to challenge a platform key. Any user 148 // collusion between multiple services. The |challenge| is also an arbitrary 156 const std::string& challenge, 174 const std::string& challenge, 180 std::string challenge; member in struct:chromeos::attestation::PlatformVerificationFlow::ChallengeContext 217 // request to sign the challenge. If the operation timed out prior to this 231 // A callback called when a challenge signing request has completed. The 233 // |challenge|. The arguments to ChallengePlatformKey are in |context| [all...] |
/external/chromium_org/net/base/ |
keygen_handler.h | 30 // incorporate the |challenge| into the Netscape SPKAC structure. The request 33 const std::string& challenge, 55 std::string challenge_; // challenge string sent by server
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsKeygenHandler.h | 57 // challenge: challenge string sent by server 62 const std::string& challenge,
|
/external/chromium_org/ppapi/proxy/ |
platform_verification_private_resource.cc | 35 const PP_Var& challenge, 41 // leaks on challenge failures (since they're only written to on success). 54 ArrayBufferVar::FromPPVar(challenge);
|