HomeSort by relevance Sort by last modified time
    Searched full:challenge (Results 1 - 25 of 458) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/net/http/
http_auth_challenge_tokenizer_unittest.cc 12 HttpAuthChallengeTokenizer challenge(challenge_str.begin(),
14 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
17 EXPECT_EQ(std::string("Basic"), challenge.scheme());
28 HttpAuthChallengeTokenizer challenge(challenge_str.begin(),
30 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
33 EXPECT_EQ(std::string("Basic"), challenge.scheme());
44 HttpAuthChallengeTokenizer challenge(challenge_str.begin(),
46 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs();
49 EXPECT_EQ(std::string("Basic"), challenge.scheme());
60 HttpAuthChallengeTokenizer challenge(challenge_str.begin()
    [all...]
http_auth_handler_basic.h 25 HttpAuthChallengeTokenizer* challenge,
35 HttpAuthChallengeTokenizer* challenge) OVERRIDE;
38 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE;
48 bool ParseChallenge(HttpAuthChallengeTokenizer* challenge);
http_auth_handler_basic.cc 21 // Parses a realm from an auth challenge, and converts to UTF8-encoding.
28 // production of challenge that realm is required.
56 bool HttpAuthHandlerBasic::Init(HttpAuthChallengeTokenizer* challenge) {
60 return ParseChallenge(challenge);
64 HttpAuthChallengeTokenizer* challenge) {
65 // Verify the challenge's auth-scheme.
66 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic"))
70 if (!ParseRealm(*challenge, &realm))
78 HttpAuthChallengeTokenizer* challenge) {
80 // should be treated as a rejection. However, if the new challenge
    [all...]
http_auth_handler.h 28 // Initializes the handler using a challenge issued by a server.
29 // |challenge| must be non-NULL and have already tokenized the
32 // for later use, and are not part of the initial challenge.
33 bool InitFromChallenge(HttpAuthChallengeTokenizer* challenge,
43 // NTLM+Negotiate it may indicate that another round of challenge+response
46 // be made with a different nonce provided in the challenge.
48 // |challenge| must be non-NULL and have already tokenized the
52 HttpAuthChallengeTokenizer* challenge) = 0;
89 // The challenge which was issued when creating the handler.
90 const std::string challenge() const function in class:net::HttpAuthHandler
    [all...]
http_auth_handler_factory.h 33 CREATE_CHALLENGE, // Create a handler in response to a challenge.
52 // challenge specified by |*challenge|. |challenge| must point to a valid
58 // If |*challenge| specifies an unsupported authentication scheme, |*handler|
61 // If |*challenge| is improperly formed, |*handler| is set to NULL and
69 // server nonce challenge.
76 // |*challenge| should not be reused after a call to |CreateAuthHandler()|,
77 virtual int CreateAuthHandler(HttpAuthChallengeTokenizer* challenge,
86 // challenge string |challenge|
    [all...]
http_auth_handler_basic_unittest.cc 36 std::string challenge = "Basic realm=\"Atlantis\""; local
39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic));
53 const char* challenge; member in struct:net::__anon13892
56 // The handler is initialized using this challenge. The first
58 // to treat the second challenge as a rejection since it is for
65 // A challenge for a different realm.
73 // challenge should be treated as being for "First" realm.
90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin,
94 std::string challenge(tests[i].challenge);
103 const char* challenge; member in struct:net::__anon13893
187 std::string challenge = tests[i].challenge; local
    [all...]
http_log_util.cc 16 bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) {
19 if (challenge->challenge_text().find(',') != std::string::npos)
22 std::string scheme = base::StringToLowerASCII(challenge->scheme());
60 HttpAuthChallengeTokenizer challenge(value.begin(), value.end());
61 if (ShouldRedactChallenge(&challenge)) {
62 redact_begin = challenge.params_begin();
63 redact_end = challenge.params_end();
http_auth_handler_mock.cc 81 HttpAuthChallengeTokenizer* challenge) {
82 // If we receive an empty challenge for a connection based scheme, or a second
83 // challenge for a non connection based scheme, assume it's a rejection.
84 if (!is_connection_based() || challenge->base64_param().empty())
86 if (!LowerCaseEqualsASCII(challenge->scheme(), "mock"))
103 bool HttpAuthHandlerMock::Init(HttpAuthChallengeTokenizer* challenge) {
168 HttpAuthChallengeTokenizer* challenge,
181 !tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
  /external/chromium_org/chrome/common/extensions/api/
enterprise_platform_keys_private.json 14 "description": "Challenge a machine key.",
18 "name": "challenge",
19 "description": "Challenge to be signed in base64."
38 "description": "Challenge an user key.",
42 "name": "challenge",
43 "description": "Challenge to be signed in base64."
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
HttpAuthenticator.java 21 import com.squareup.okhttp.OkAuthenticator.Challenge;
43 Proxy proxy, URL url, List<Challenge> challenges) throws IOException {
45 Challenge challenge = challenges.get(i);
46 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) {
52 challenge.getRealm(), challenge.getScheme(), url, Authenticator.RequestorType.SERVER);
61 Proxy proxy, URL url, List<Challenge> challenges) throws IOException {
63 Challenge challenge = challenges.get(i)
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
OkAuthenticator.java 31 * Returns a credential that satisfies the authentication challenge made by
32 * {@code url}. Returns null if the challenge cannot be satisfied. This method
36 * @param challenges parsed "WWW-Authenticate" challenge headers from the HTTP
39 Credential authenticate(Proxy proxy, URL url, List<Challenge> challenges) throws IOException;
42 * Returns a credential that satisfies the authentication challenge made by
43 * {@code proxy}. Returns null if the challenge cannot be satisfied. This
47 * @param challenges parsed "Proxy-Authenticate" challenge headers from the
50 Credential authenticateProxy(Proxy proxy, URL url, List<Challenge> challenges) throws IOException;
52 /** An RFC 2617 challenge. */
53 public final class Challenge {
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 34 const u8 *pos, *challenge, *password; local
55 * CHAP Challenge:
56 * Value-Size (1 octet) | Value(Challenge) | Name(optional)
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
67 challenge = pos;
68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
69 challenge, challenge_len);
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
  /frameworks/base/packages/Keyguard/src/com/android/keyguard/
ChallengeLayout.java 25 * @return true if the security challenge area of this layout is currently visible
30 * @return true if the challenge area significantly overlaps other content
35 * Show or hide the challenge layout.
37 * If you want to show the challenge layout in bouncer mode where applicable,
45 * Show the bouncer challenge. This may block access to other child views.
50 * Hide the bouncer challenge if it is currently showing.
56 * Returns true if the challenge is currently in bouncer mode,
80 * The bouncer is activated when the user must pass a security challenge
83 * <p>This differs from simply showing or hiding the security challenge
  /external/chromium_org/net/base/
keygen_handler.cc 18 const std::string& challenge,
21 challenge_(challenge),
  /external/wpa_supplicant_8/src/eap_common/
chap.c 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
25 addr[2] = challenge;
chap.h 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /external/chromium_org/chrome/browser/resources/cryptotoken/
signer.js 33 function sendSuccessResponse(challenge, info, browserData) {
34 var responseData = makeWebSignResponseDataFromChallenge(challenge);
66 function sendSuccessResponse(challenge, info, browserData) {
67 var responseData = makeU2fSignResponseDataFromChallenge(challenge);
82 * Creates a base U2F responseData object from the server challenge.
83 * @param {SignChallenge} challenge The server challenge.
86 function makeU2fSignResponseDataFromChallenge(challenge) {
88 'keyHandle': challenge['keyHandle']
94 * Creates a base web responseData object from the server challenge
    [all...]
  /external/chromium_org/third_party/WebKit/ManualTests/blackberry/
http-auth-challenge.html 3 <p>To run this test, both http-auth-challenge.html and http-auth-challenge.php must be served over http.</p>
4 <p>This test case is to test the behavior of http authentication challenge dialog. This is for <a href="https://bugs.webkit.org/show_bug.cgi?id=80135">https://bugs.webkit.org/show_bug.cgi?id=80135</a></p>
20 <a href="http-auth-challenge.php">Start test here</a>
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/
RecordingOkAuthenticator.java 27 public final List<List<Challenge>> challengesList = new ArrayList<List<Challenge>>();
40 public List<Challenge> onlyChallenge() {
50 @Override public Credential authenticate(Proxy proxy, URL url, List<Challenge> challenges)
58 @Override public Credential authenticateProxy(Proxy proxy, URL url, List<Challenge> challenges)
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
NetscapeCertRequest.java 51 String challenge; field in class:NetscapeCertRequest
96 // challenge IA5STRING
107 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString();
131 String challenge,
137 this.challenge = challenge;
144 content_der.add(new DERIA5String(challenge));
158 return challenge;
163 challenge = value;
196 public boolean verify(String challenge) throws NoSuchAlgorithmException
    [all...]
  /external/chromium_org/ppapi/api/private/
ppb_platform_verification_private.idl 51 * Requests a platform challenge for a given service id.
54 * <code>PP_VARTYPE_STRING</code> containing the service_id for the challenge.
56 * @param[in] challenge A <code>PP_Var</code> of type
57 * <code>PP_VARTYPE_ARRAY_BUFFER</code> that contains the challenge data.
72 * the platform challenge has been completed. This callback will only run if
80 [in] PP_Var challenge,
  /external/nist-sip/java/gov/nist/javax/sip/parser/
ChallengeParser.java 33 * Parser for the challenge portion of the authentication header.
47 * @param String challenge message to parse to set
49 protected ChallengeParser(String challenge) {
50 super(challenge);
55 * @param String challenge message to parse to set
62 * Get the parameter of the challenge string
  /external/chromium_org/chrome/browser/chromeos/login/easy_unlock/
easy_unlock_types.h 30 // Challenge bytes to be sent to the phone.
31 std::string challenge; member in struct:chromeos::EasyUnlockDeviceKeyData
  /external/chromium_org/net/websockets/
websocket_handshake_handler.h 49 // Gets request info to open WebSocket connection and fills challenge data in
50 // |challenge|.
51 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge);
53 // Also, fills challenge data in |challenge|.
56 std::string* challenge,
89 const std::string& challenge);
92 const std::string& challenge,
  /external/ppp/pppd/
chap-new.h 52 * Semi-arbitrary limits on challenge and response fields.
97 * Note: challenge and response arguments below are formatted as
98 * a length byte followed by the actual challenge/response data.
100 void (*generate_challenge)(unsigned char *challenge);
103 unsigned char *challenge, unsigned char *response,
106 unsigned char *challenge, char *secret, int secret_len,
114 /* Hook for a plugin to validate CHAP challenge */
117 unsigned char *challenge, unsigned char *response,

Completed in 1501 milliseconds

1 2 3 4 5 6 7 8 91011>>