/external/chromium_org/net/http/ |
http_auth_challenge_tokenizer_unittest.cc | 12 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), 14 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 17 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 28 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), 30 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 33 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 44 HttpAuthChallengeTokenizer challenge(challenge_str.begin(), 46 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); 49 EXPECT_EQ(std::string("Basic"), challenge.scheme()); 60 HttpAuthChallengeTokenizer challenge(challenge_str.begin() [all...] |
http_auth_handler_basic.h | 25 HttpAuthChallengeTokenizer* challenge, 35 HttpAuthChallengeTokenizer* challenge) OVERRIDE; 38 virtual bool Init(HttpAuthChallengeTokenizer* challenge) OVERRIDE; 48 bool ParseChallenge(HttpAuthChallengeTokenizer* challenge);
|
http_auth_handler_basic.cc | 21 // Parses a realm from an auth challenge, and converts to UTF8-encoding. 28 // production of challenge that realm is required. 56 bool HttpAuthHandlerBasic::Init(HttpAuthChallengeTokenizer* challenge) { 60 return ParseChallenge(challenge); 64 HttpAuthChallengeTokenizer* challenge) { 65 // Verify the challenge's auth-scheme. 66 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic")) 70 if (!ParseRealm(*challenge, &realm)) 78 HttpAuthChallengeTokenizer* challenge) { 80 // should be treated as a rejection. However, if the new challenge [all...] |
http_auth_handler.h | 28 // Initializes the handler using a challenge issued by a server. 29 // |challenge| must be non-NULL and have already tokenized the 32 // for later use, and are not part of the initial challenge. 33 bool InitFromChallenge(HttpAuthChallengeTokenizer* challenge, 43 // NTLM+Negotiate it may indicate that another round of challenge+response 46 // be made with a different nonce provided in the challenge. 48 // |challenge| must be non-NULL and have already tokenized the 52 HttpAuthChallengeTokenizer* challenge) = 0; 89 // The challenge which was issued when creating the handler. 90 const std::string challenge() const function in class:net::HttpAuthHandler [all...] |
http_auth_handler_factory.h | 33 CREATE_CHALLENGE, // Create a handler in response to a challenge. 52 // challenge specified by |*challenge|. |challenge| must point to a valid 58 // If |*challenge| specifies an unsupported authentication scheme, |*handler| 61 // If |*challenge| is improperly formed, |*handler| is set to NULL and 69 // server nonce challenge. 76 // |*challenge| should not be reused after a call to |CreateAuthHandler()|, 77 virtual int CreateAuthHandler(HttpAuthChallengeTokenizer* challenge, 86 // challenge string |challenge| [all...] |
http_auth_handler_basic_unittest.cc | 36 std::string challenge = "Basic realm=\"Atlantis\""; local 39 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); 53 const char* challenge; member in struct:net::__anon13892 56 // The handler is initialized using this challenge. The first 58 // to treat the second challenge as a rejection since it is for 65 // A challenge for a different realm. 73 // challenge should be treated as being for "First" realm. 90 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, 94 std::string challenge(tests[i].challenge); 103 const char* challenge; member in struct:net::__anon13893 187 std::string challenge = tests[i].challenge; local [all...] |
http_log_util.cc | 16 bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) { 19 if (challenge->challenge_text().find(',') != std::string::npos) 22 std::string scheme = base::StringToLowerASCII(challenge->scheme()); 60 HttpAuthChallengeTokenizer challenge(value.begin(), value.end()); 61 if (ShouldRedactChallenge(&challenge)) { 62 redact_begin = challenge.params_begin(); 63 redact_end = challenge.params_end();
|
http_auth_handler_mock.cc | 81 HttpAuthChallengeTokenizer* challenge) { 82 // If we receive an empty challenge for a connection based scheme, or a second 83 // challenge for a non connection based scheme, assume it's a rejection. 84 if (!is_connection_based() || challenge->base64_param().empty()) 86 if (!LowerCaseEqualsASCII(challenge->scheme(), "mock")) 103 bool HttpAuthHandlerMock::Init(HttpAuthChallengeTokenizer* challenge) { 168 HttpAuthChallengeTokenizer* challenge, 181 !tmp_handler->InitFromChallenge(challenge, target, origin, net_log))
|
/external/chromium_org/chrome/common/extensions/api/ |
enterprise_platform_keys_private.json | 14 "description": "Challenge a machine key.", 18 "name": "challenge", 19 "description": "Challenge to be signed in base64." 38 "description": "Challenge an user key.", 42 "name": "challenge", 43 "description": "Challenge to be signed in base64."
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
HttpAuthenticator.java | 21 import com.squareup.okhttp.OkAuthenticator.Challenge; 43 Proxy proxy, URL url, List<Challenge> challenges) throws IOException { 45 Challenge challenge = challenges.get(i); 46 if (!"Basic".equalsIgnoreCase(challenge.getScheme())) { 52 challenge.getRealm(), challenge.getScheme(), url, Authenticator.RequestorType.SERVER); 61 Proxy proxy, URL url, List<Challenge> challenges) throws IOException { 63 Challenge challenge = challenges.get(i) [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
OkAuthenticator.java | 31 * Returns a credential that satisfies the authentication challenge made by 32 * {@code url}. Returns null if the challenge cannot be satisfied. This method 36 * @param challenges parsed "WWW-Authenticate" challenge headers from the HTTP 39 Credential authenticate(Proxy proxy, URL url, List<Challenge> challenges) throws IOException; 42 * Returns a credential that satisfies the authentication challenge made by 43 * {@code proxy}. Returns null if the challenge cannot be satisfied. This 47 * @param challenges parsed "Proxy-Authenticate" challenge headers from the 50 Credential authenticateProxy(Proxy proxy, URL url, List<Challenge> challenges) throws IOException; 52 /** An RFC 2617 challenge. */ 53 public final class Challenge { [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 34 const u8 *pos, *challenge, *password; local 55 * CHAP Challenge: 56 * Value-Size (1 octet) | Value(Challenge) | Name(optional) 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 67 challenge = pos; 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 69 challenge, challenge_len); 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
/frameworks/base/packages/Keyguard/src/com/android/keyguard/ |
ChallengeLayout.java | 25 * @return true if the security challenge area of this layout is currently visible 30 * @return true if the challenge area significantly overlaps other content 35 * Show or hide the challenge layout. 37 * If you want to show the challenge layout in bouncer mode where applicable, 45 * Show the bouncer challenge. This may block access to other child views. 50 * Hide the bouncer challenge if it is currently showing. 56 * Returns true if the challenge is currently in bouncer mode, 80 * The bouncer is activated when the user must pass a security challenge 83 * <p>This differs from simply showing or hiding the security challenge
|
/external/chromium_org/net/base/ |
keygen_handler.cc | 18 const std::string& challenge, 21 challenge_(challenge),
|
/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 25 addr[2] = challenge;
|
chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
signer.js | 33 function sendSuccessResponse(challenge, info, browserData) { 34 var responseData = makeWebSignResponseDataFromChallenge(challenge); 66 function sendSuccessResponse(challenge, info, browserData) { 67 var responseData = makeU2fSignResponseDataFromChallenge(challenge); 82 * Creates a base U2F responseData object from the server challenge. 83 * @param {SignChallenge} challenge The server challenge. 86 function makeU2fSignResponseDataFromChallenge(challenge) { 88 'keyHandle': challenge['keyHandle'] 94 * Creates a base web responseData object from the server challenge [all...] |
/external/chromium_org/third_party/WebKit/ManualTests/blackberry/ |
http-auth-challenge.html | 3 <p>To run this test, both http-auth-challenge.html and http-auth-challenge.php must be served over http.</p> 4 <p>This test case is to test the behavior of http authentication challenge dialog. This is for <a href="https://bugs.webkit.org/show_bug.cgi?id=80135">https://bugs.webkit.org/show_bug.cgi?id=80135</a></p> 20 <a href="http-auth-challenge.php">Start test here</a>
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/ |
RecordingOkAuthenticator.java | 27 public final List<List<Challenge>> challengesList = new ArrayList<List<Challenge>>(); 40 public List<Challenge> onlyChallenge() { 50 @Override public Credential authenticate(Proxy proxy, URL url, List<Challenge> challenges) 58 @Override public Credential authenticateProxy(Proxy proxy, URL url, List<Challenge> challenges)
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 51 String challenge; field in class:NetscapeCertRequest 96 // challenge IA5STRING 107 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); 131 String challenge, 137 this.challenge = challenge; 144 content_der.add(new DERIA5String(challenge)); 158 return challenge; 163 challenge = value; 196 public boolean verify(String challenge) throws NoSuchAlgorithmException [all...] |
/external/chromium_org/ppapi/api/private/ |
ppb_platform_verification_private.idl | 51 * Requests a platform challenge for a given service id. 54 * <code>PP_VARTYPE_STRING</code> containing the service_id for the challenge. 56 * @param[in] challenge A <code>PP_Var</code> of type 57 * <code>PP_VARTYPE_ARRAY_BUFFER</code> that contains the challenge data. 72 * the platform challenge has been completed. This callback will only run if 80 [in] PP_Var challenge,
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
ChallengeParser.java | 33 * Parser for the challenge portion of the authentication header. 47 * @param String challenge message to parse to set 49 protected ChallengeParser(String challenge) { 50 super(challenge); 55 * @param String challenge message to parse to set 62 * Get the parameter of the challenge string
|
/external/chromium_org/chrome/browser/chromeos/login/easy_unlock/ |
easy_unlock_types.h | 30 // Challenge bytes to be sent to the phone. 31 std::string challenge; member in struct:chromeos::EasyUnlockDeviceKeyData
|
/external/chromium_org/net/websockets/ |
websocket_handshake_handler.h | 49 // Gets request info to open WebSocket connection and fills challenge data in 50 // |challenge|. 51 HttpRequestInfo GetRequestInfo(const GURL& url, std::string* challenge); 53 // Also, fills challenge data in |challenge|. 56 std::string* challenge, 89 const std::string& challenge); 92 const std::string& challenge,
|
/external/ppp/pppd/ |
chap-new.h | 52 * Semi-arbitrary limits on challenge and response fields. 97 * Note: challenge and response arguments below are formatted as 98 * a length byte followed by the actual challenge/response data. 100 void (*generate_challenge)(unsigned char *challenge); 103 unsigned char *challenge, unsigned char *response, 106 unsigned char *challenge, char *secret, int secret_len, 114 /* Hook for a plugin to validate CHAP challenge */ 117 unsigned char *challenge, unsigned char *response,
|