HomeSort by relevance Sort by last modified time
    Searched full:challenge (Results 76 - 100 of 458) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/chromium_org/third_party/libjingle/source/talk/xmpp/
saslmechanism.h 54 // Should respond to a SASL "<challenge>" request. Default is
55 // to abort (for mechanisms that do not do challenge-response)
56 virtual XmlElement * HandleSaslChallenge(const XmlElement * challenge);
  /external/smack/src/org/jivesoftware/smack/sasl/
SASLMechanism.java 52 * <li>{@link #challengeReceived(String)} -- Handle a challenge from the server.</li>
131 * response to the server's challenge.
133 * @param challenge a base64 encoded string representing the challenge.
136 public void challengeReceived(String challenge) throws IOException {
138 if(challenge != null) {
139 response = sc.evaluateChallenge(StringUtils.decodeBase64(challenge));
220 * A SASL challenge stanza.
222 public static class Challenge extends Packet {
225 public Challenge(String data) {
    [all...]
  /external/ppp/pppd/plugins/
winbind.c 100 unsigned char *challenge,
254 const u_char *challenge,
361 sprintf(challenge_hex + i * 2, "%02X", challenge[i]);
363 fprintf(pipe_in, "LANMAN-Challenge: %s\n", challenge_hex);
519 unsigned char *challenge,
531 challenge_len = *challenge++;
587 challenge,
595 mppe_set_keys(challenge, session_key);
605 challenge_len, challenge);
614 u_char Challenge[8]
    [all...]
  /external/chromium_org/chrome/browser/android/
password_authentication_manager.h 22 // Request an authentication challenge for the specified webcontents to allow
  /external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/
__init__.py 463 challenge = _parse_www_authenticate(response, 'www-authenticate')
464 self.challenge = challenge['digest']
465 qop = self.challenge.get('qop', 'auth')
466 self.challenge['qop'] = ('auth' in [x.strip() for x in qop.split()]) and 'auth' or None
467 if self.challenge['qop'] is None:
469 self.challenge['algorithm'] = self.challenge.get('algorithm', 'MD5').upper()
470 if self.challenge['algorithm'] != 'MD5':
471 raise UnimplementedDigestAuthOptionError( _("Unsupported value for algorithm: %s." % self.challenge['algorithm'])
    [all...]
  /external/chromium_org/net/http/
http_auth_handler_ntlm_portable.cc 155 // be included in response to a NTLM challenge.
303 // challenge from the Type-2 message.
307 // param challenge
308 // 8-byte challenge from Type-2 message
312 const uint8* challenge,
323 DESEncrypt(k1, challenge, response);
324 DESEncrypt(k2, challenge, response + 8);
325 DESEncrypt(k3, challenge, response + 16);
373 uint8 challenge[8]; // 8 byte challenge member in struct:net::Type2Msg
    [all...]
http_auth_handler_ntlm_win.cc 55 HttpAuthChallengeTokenizer* challenge,
77 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
  /external/google-tv-pairing-protocol/cpp/
README 12 server issues a challenge for the client to complete. This usually involves the
  /external/libusb/
README 9 information, if you fancy a challenge :)
  /external/wpa_supplicant_8/src/eap_peer/
eap_leap.c 65 const u8 *pos, *challenge, *identity, *password; local
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge "
102 challenge = pos;
103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN);
104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP",
105 challenge, LEAP_CHALLENGE_LEN);
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
119 challenge_response(challenge, password, rpos);
121 nt_challenge_response(challenge, password, password_len, rpos);
167 "for challenge");
    [all...]
eap_sake.c 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
42 case CHALLENGE:
43 return "CHALLENGE";
179 eap_sake_state(data, CHALLENGE);
197 if (data->state != IDENTITY && data->state != CHALLENGE) {
198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
204 eap_sake_state(data, CHALLENGE);
206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not "
245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge");
    [all...]
eap_ttls.c 255 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len);
429 u8 *buf, *pos, *challenge, *peer_challenge; local
453 /* MS-CHAP-Challenge */
454 challenge = eap_ttls_implicit_challenge(
456 if (challenge == NULL) {
459 "implicit challenge");
465 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
471 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN];
475 os_free(challenge);
478 "random data for peer challenge");
518 u8 *buf, *pos, *challenge; local
654 u8 *buf, *pos, *challenge; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
38 case CHALLENGE:
39 return "CHALLENGE";
68 data->state = CHALLENGE;
151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
222 case CHALLENGE:
271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE)
297 eap_sake_state(data, CHALLENGE);
309 if (data->state != CHALLENGE)
312 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge");
    [all...]
eap_server_ttls.c 245 "EAP-TTLS: CHAP-Challenge (CHAP)",
259 "EAP-TTLS: MS-CHAP-Challenge",
305 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge",
526 const u8 *challenge,
533 if (challenge == NULL || password == NULL ||
537 "(challenge len %lu password len %lu)",
556 "challenge from TLS data");
561 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN)
564 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Challenge mismatch");
571 /* MD5(Ident + Password + Challenge) */
    [all...]
  /external/chromium_org/chromeos/attestation/
attestation_constants.h 23 // Options available for customizing an attestation challenge response.
27 // challenge response.
  /external/chromium_org/net/third_party/mozilla_security_manager/
nsKeygenHandler.cpp 85 offsetof(CERTPublicKeyAndChallenge, challenge), },
96 const std::string& challenge,
197 pkac.challenge.type = siBuffer;
198 pkac.challenge.len = challenge.length();
199 pkac.challenge.data = (unsigned char *)challenge.data();
217 // Convert the signed public key and challenge into base64/ascii.
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/
messagelistener.h 55 // Handles a challenge message from the peer.
58 // Handles an challenge response from the peer.
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
polochallengeresponse.h 29 // A Polo challenge response that contains the certificate keys.
32 // Creates a new challenge response with the given certificates. This does not
  /external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/
ResponseAuth.java 47 * from the digest challenge byte array.
49 * @param dirList the list of directives parsed from the digest challenge
  /external/smack/src/com/novell/sasl/client/
ResponseAuth.java 47 * from the digest challenge byte array.
49 * @param dirList the list of directives parsed from the digest challenge
  /external/chromium_org/chrome/browser/resources/cryptotoken/
enroller.js 165 // A missing sign challenge array is ok, in the case the user is not already
182 * challenge: string,
192 * each challenge.
216 if (!enrollChallenge['challenge']) {
217 // The challenge is required.
225 * Finds the enroll challenge of the given version in the enroll challlenge
230 * @return {?EnrollChallenge} The enroll challenge with the given versions, or
244 * @param {EnrollChallenge} enrollChallenge The enroll challenge used to
259 // Echo the used challenge back in the reply.
264 // For U2F_V2, the challenge sent to the gnubby is modified to be th
    [all...]
usbenrollhandler.js 104 // A valid helper request contains at least one enroll challenge, so use
105 // the app id hash from the first challenge.
137 * challenge.
198 * Attempts enrolling a particular gnubby with a challenge of the appropriate
205 var challenge = this.getChallengeOfVersion_(version);
206 if (!challenge) {
210 var challengeValue = B64_decode(challenge['challengeHash']);
211 var appIdHash = challenge['appIdHash'];
220 * Finds the (first) challenge of the given version in this helper's challenges.
222 * @return {Object} challenge, if found, or null if not
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/header/
Challenge.java 34 * Challenge part of the Auth header. This is only used by the parser interface
41 public class Challenge extends SIPObject {
72 public Challenge() {
78 * Encode the challenge in canonical form.
252 Challenge retval = (Challenge) super.clone();
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.c 78 * @challenge: 8-octet Challenge (OUT)
83 u8 *challenge)
98 os_memcpy(challenge, hash, 8);
141 * @challenge: 8-octet Challenge (IN)
145 void challenge_response(const u8 *challenge, const u8 *password_hash,
149 des_encrypt(challenge, password_hash, response);
150 des_encrypt(challenge, password_hash + 7, response + 8);
154 des_encrypt(challenge, zpwd, response + 16)
174 u8 challenge[8]; local
203 u8 challenge[8]; local
246 u8 password_hash_hash[16], challenge[8]; local
    [all...]
  /external/chromium_org/chromeos/cryptohome/
async_method_caller.h 158 // Asks cryptohomed to asynchronously sign an enterprise challenge with the
160 // parameters will be included in the challenge response. |challenge| must be
161 // a valid enterprise challenge. On success, the data sent to |callback| is
162 // the challenge response. If |key_type| is KEY_USER, a |user_id| must be
172 const std::string& challenge,
175 // Asks cryptohomed to asynchronously sign a simple challenge with the key
176 // specified by |key_type| and |key_name|. |challenge| can be any arbitrary
177 // set of bytes. On success, the data sent to |callback| is the challenge
185 const std::string& challenge,
    [all...]

Completed in 1184 milliseconds

1 2 34 5 6 7 8 91011>>