/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
saslmechanism.h | 54 // Should respond to a SASL "<challenge>" request. Default is 55 // to abort (for mechanisms that do not do challenge-response) 56 virtual XmlElement * HandleSaslChallenge(const XmlElement * challenge);
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
SASLMechanism.java | 52 * <li>{@link #challengeReceived(String)} -- Handle a challenge from the server.</li>
131 * response to the server's challenge.
133 * @param challenge a base64 encoded string representing the challenge.
136 public void challengeReceived(String challenge) throws IOException {
138 if(challenge != null) {
139 response = sc.evaluateChallenge(StringUtils.decodeBase64(challenge));
220 * A SASL challenge stanza.
222 public static class Challenge extends Packet {
225 public Challenge(String data) { [all...] |
/external/ppp/pppd/plugins/ |
winbind.c | 100 unsigned char *challenge, 254 const u_char *challenge, 361 sprintf(challenge_hex + i * 2, "%02X", challenge[i]); 363 fprintf(pipe_in, "LANMAN-Challenge: %s\n", challenge_hex); 519 unsigned char *challenge, 531 challenge_len = *challenge++; 587 challenge, 595 mppe_set_keys(challenge, session_key); 605 challenge_len, challenge); 614 u_char Challenge[8] [all...] |
/external/chromium_org/chrome/browser/android/ |
password_authentication_manager.h | 22 // Request an authentication challenge for the specified webcontents to allow
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/ |
__init__.py | 463 challenge = _parse_www_authenticate(response, 'www-authenticate') 464 self.challenge = challenge['digest'] 465 qop = self.challenge.get('qop', 'auth') 466 self.challenge['qop'] = ('auth' in [x.strip() for x in qop.split()]) and 'auth' or None 467 if self.challenge['qop'] is None: 469 self.challenge['algorithm'] = self.challenge.get('algorithm', 'MD5').upper() 470 if self.challenge['algorithm'] != 'MD5': 471 raise UnimplementedDigestAuthOptionError( _("Unsupported value for algorithm: %s." % self.challenge['algorithm']) [all...] |
/external/chromium_org/net/http/ |
http_auth_handler_ntlm_portable.cc | 155 // be included in response to a NTLM challenge. 303 // challenge from the Type-2 message. 307 // param challenge 308 // 8-byte challenge from Type-2 message 312 const uint8* challenge, 323 DESEncrypt(k1, challenge, response); 324 DESEncrypt(k2, challenge, response + 8); 325 DESEncrypt(k3, challenge, response + 16); 373 uint8 challenge[8]; // 8 byte challenge member in struct:net::Type2Msg [all...] |
http_auth_handler_ntlm_win.cc | 55 HttpAuthChallengeTokenizer* challenge, 77 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
|
/external/google-tv-pairing-protocol/cpp/ |
README | 12 server issues a challenge for the client to complete. This usually involves the
|
/external/libusb/ |
README | 9 information, if you fancy a challenge :)
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " 102 challenge = pos; 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 105 challenge, LEAP_CHALLENGE_LEN); 107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 167 "for challenge"); [all...] |
eap_sake.c | 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 42 case CHALLENGE: 43 return "CHALLENGE"; 179 eap_sake_state(data, CHALLENGE); 197 if (data->state != IDENTITY && data->state != CHALLENGE) { 198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 204 eap_sake_state(data, CHALLENGE); 206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not " 245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); [all...] |
eap_ttls.c | 255 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len); 429 u8 *buf, *pos, *challenge, *peer_challenge; local 453 /* MS-CHAP-Challenge */ 454 challenge = eap_ttls_implicit_challenge( 456 if (challenge == NULL) { 459 "implicit challenge"); 465 challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN); 471 data->ident = challenge[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]; 475 os_free(challenge); 478 "random data for peer challenge"); 518 u8 *buf, *pos, *challenge; local 654 u8 *buf, *pos, *challenge; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 38 case CHALLENGE: 39 return "CHALLENGE"; 68 data->state = CHALLENGE; 151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 222 case CHALLENGE: 271 if (data->state == CHALLENGE && subtype == EAP_SAKE_SUBTYPE_CHALLENGE) 297 eap_sake_state(data, CHALLENGE); 309 if (data->state != CHALLENGE) 312 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge"); [all...] |
eap_server_ttls.c | 245 "EAP-TTLS: CHAP-Challenge (CHAP)", 259 "EAP-TTLS: MS-CHAP-Challenge", 305 return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge", 526 const u8 *challenge, 533 if (challenge == NULL || password == NULL || 537 "(challenge len %lu password len %lu)", 556 "challenge from TLS data"); 561 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) 564 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Challenge mismatch"); 571 /* MD5(Ident + Password + Challenge) */ [all...] |
/external/chromium_org/chromeos/attestation/ |
attestation_constants.h | 23 // Options available for customizing an attestation challenge response. 27 // challenge response.
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsKeygenHandler.cpp | 85 offsetof(CERTPublicKeyAndChallenge, challenge), }, 96 const std::string& challenge, 197 pkac.challenge.type = siBuffer; 198 pkac.challenge.len = challenge.length(); 199 pkac.challenge.data = (unsigned char *)challenge.data(); 217 // Convert the signed public key and challenge into base64/ascii.
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/ |
messagelistener.h | 55 // Handles a challenge message from the peer. 58 // Handles an challenge response from the peer.
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
polochallengeresponse.h | 29 // A Polo challenge response that contains the certificate keys. 32 // Creates a new challenge response with the given certificates. This does not
|
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/ |
ResponseAuth.java | 47 * from the digest challenge byte array. 49 * @param dirList the list of directives parsed from the digest challenge
|
/external/smack/src/com/novell/sasl/client/ |
ResponseAuth.java | 47 * from the digest challenge byte array. 49 * @param dirList the list of directives parsed from the digest challenge
|
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
enroller.js | 165 // A missing sign challenge array is ok, in the case the user is not already 182 * challenge: string, 192 * each challenge. 216 if (!enrollChallenge['challenge']) { 217 // The challenge is required. 225 * Finds the enroll challenge of the given version in the enroll challlenge 230 * @return {?EnrollChallenge} The enroll challenge with the given versions, or 244 * @param {EnrollChallenge} enrollChallenge The enroll challenge used to 259 // Echo the used challenge back in the reply. 264 // For U2F_V2, the challenge sent to the gnubby is modified to be th [all...] |
usbenrollhandler.js | 104 // A valid helper request contains at least one enroll challenge, so use 105 // the app id hash from the first challenge. 137 * challenge. 198 * Attempts enrolling a particular gnubby with a challenge of the appropriate 205 var challenge = this.getChallengeOfVersion_(version); 206 if (!challenge) { 210 var challengeValue = B64_decode(challenge['challengeHash']); 211 var appIdHash = challenge['appIdHash']; 220 * Finds the (first) challenge of the given version in this helper's challenges. 222 * @return {Object} challenge, if found, or null if not [all...] |
/external/nist-sip/java/gov/nist/javax/sip/header/ |
Challenge.java | 34 * Challenge part of the Auth header. This is only used by the parser interface 41 public class Challenge extends SIPObject { 72 public Challenge() { 78 * Encode the challenge in canonical form. 252 Challenge retval = (Challenge) super.clone();
|
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 78 * @challenge: 8-octet Challenge (OUT) 83 u8 *challenge) 98 os_memcpy(challenge, hash, 8); 141 * @challenge: 8-octet Challenge (IN) 145 void challenge_response(const u8 *challenge, const u8 *password_hash, 149 des_encrypt(challenge, password_hash, response); 150 des_encrypt(challenge, password_hash + 7, response + 8); 154 des_encrypt(challenge, zpwd, response + 16) 174 u8 challenge[8]; local 203 u8 challenge[8]; local 246 u8 password_hash_hash[16], challenge[8]; local [all...] |
/external/chromium_org/chromeos/cryptohome/ |
async_method_caller.h | 158 // Asks cryptohomed to asynchronously sign an enterprise challenge with the 160 // parameters will be included in the challenge response. |challenge| must be 161 // a valid enterprise challenge. On success, the data sent to |callback| is 162 // the challenge response. If |key_type| is KEY_USER, a |user_id| must be 172 const std::string& challenge, 175 // Asks cryptohomed to asynchronously sign a simple challenge with the key 176 // specified by |key_type| and |key_name|. |challenge| can be any arbitrary 177 // set of bytes. On success, the data sent to |callback| is the challenge 185 const std::string& challenge, [all...] |