/external/cronet/tot/net/http/ |
D | http_auth_challenge_tokenizer_unittest.cc | 14 HttpAuthChallengeTokenizer challenge("Basic realm=\"foobar\""); in TEST() local 15 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST() 18 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST() 28 HttpAuthChallengeTokenizer challenge("Basic realm=foobar@baz.com"); in TEST() local 29 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST() 32 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST() 42 HttpAuthChallengeTokenizer challenge("Basic realm=\"foobar@baz.com"); in TEST() local 43 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST() 46 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST() 56 HttpAuthChallengeTokenizer challenge("Basic realm=\""); in TEST() local [all …]
|
D | http_auth_multi_round_parse_unittest.cc | 20 HttpAuthChallengeTokenizer challenge("Negotiate"); in TEST() local 23 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST() 30 HttpAuthChallengeTokenizer challenge("Negotiate Zm9vYmFy"); in TEST() local 33 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST() 38 HttpAuthChallengeTokenizer challenge("DummyScheme"); in TEST() local 41 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST() 46 HttpAuthChallengeTokenizer challenge("Negotiate Zm9vYmFy"); in TEST() local 51 ParseLaterRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge, in TEST() 59 HttpAuthChallengeTokenizer challenge("Negotiate"); in TEST() local 64 ParseLaterRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge, in TEST() [all …]
|
D | http_auth_multi_round_parse.cc | 19 HttpAuthChallengeTokenizer* challenge) { in SchemeIsValid() argument 20 return challenge->auth_scheme() == HttpAuth::SchemeToString(scheme); in SchemeIsValid() 27 HttpAuthChallengeTokenizer* challenge) { in ParseFirstRoundChallenge() argument 28 if (!SchemeIsValid(scheme, challenge)) in ParseFirstRoundChallenge() 31 std::string_view encoded_auth_token = challenge->base64_param(); in ParseFirstRoundChallenge() 40 HttpAuthChallengeTokenizer* challenge, in ParseLaterRoundChallenge() argument 43 if (!SchemeIsValid(scheme, challenge)) in ParseLaterRoundChallenge() 46 *encoded_token = challenge->base64_param(); in ParseLaterRoundChallenge()
|
D | http_auth_handler_basic_unittest.cc | 49 std::string challenge = "Basic realm=\"Atlantis\""; in TEST() local 54 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST() 71 const char* challenge; in TEST() member 110 tests[0].challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST() 115 HttpAuthChallengeTokenizer tok(test.challenge); in TEST() 122 const char* challenge; in TEST() member 206 std::string challenge = test.challenge; in TEST() local 211 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST() 230 std::string challenge = "Basic realm=\"Atlantis\""; in TEST() local 237 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST() [all …]
|
D | http_auth_handler_basic.cc | 62 HttpAuthChallengeTokenizer* challenge, in Init() argument 68 return ParseChallenge(challenge); in Init() 72 HttpAuthChallengeTokenizer* challenge) { in ParseChallenge() argument 73 if (challenge->auth_scheme() != kBasicAuthScheme) in ParseChallenge() 77 if (!ParseRealm(*challenge, &realm)) in ParseChallenge() 101 HttpAuthChallengeTokenizer* challenge) { in HandleAnotherChallengeImpl() argument 106 if (!ParseRealm(*challenge, &realm)) in HandleAnotherChallengeImpl() 117 HttpAuthChallengeTokenizer* challenge, in CreateAuthHandler() argument 135 if (!tmp_handler->InitFromChallenge(challenge, target, ssl_info, in CreateAuthHandler()
|
D | http_auth_challenge_tokenizer.cc | 15 std::string_view challenge) in HttpAuthChallengeTokenizer() argument 16 : challenge_(challenge) { in HttpAuthChallengeTokenizer() 17 Init(challenge); in HttpAuthChallengeTokenizer() 40 void HttpAuthChallengeTokenizer::Init(std::string_view challenge) { in Init() argument 44 base::StringViewTokenizer tok(challenge, HTTP_LWS); in Init() 55 HttpUtil::TrimLWS(std::string_view(tok.token_end(), challenge.end())); in Init()
|
/external/cronet/stable/net/http/ |
D | http_auth_challenge_tokenizer_unittest.cc | 14 HttpAuthChallengeTokenizer challenge("Basic realm=\"foobar\""); in TEST() local 15 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST() 18 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST() 28 HttpAuthChallengeTokenizer challenge("Basic realm=foobar@baz.com"); in TEST() local 29 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST() 32 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST() 42 HttpAuthChallengeTokenizer challenge("Basic realm=\"foobar@baz.com"); in TEST() local 43 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST() 46 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST() 56 HttpAuthChallengeTokenizer challenge("Basic realm=\""); in TEST() local [all …]
|
D | http_auth_multi_round_parse_unittest.cc | 20 HttpAuthChallengeTokenizer challenge("Negotiate"); in TEST() local 23 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST() 30 HttpAuthChallengeTokenizer challenge("Negotiate Zm9vYmFy"); in TEST() local 33 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST() 38 HttpAuthChallengeTokenizer challenge("DummyScheme"); in TEST() local 41 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST() 46 HttpAuthChallengeTokenizer challenge("Negotiate Zm9vYmFy"); in TEST() local 51 ParseLaterRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge, in TEST() 59 HttpAuthChallengeTokenizer challenge("Negotiate"); in TEST() local 64 ParseLaterRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge, in TEST() [all …]
|
D | http_auth_multi_round_parse.cc | 19 HttpAuthChallengeTokenizer* challenge) { in SchemeIsValid() argument 20 return challenge->auth_scheme() == HttpAuth::SchemeToString(scheme); in SchemeIsValid() 27 HttpAuthChallengeTokenizer* challenge) { in ParseFirstRoundChallenge() argument 28 if (!SchemeIsValid(scheme, challenge)) in ParseFirstRoundChallenge() 31 std::string_view encoded_auth_token = challenge->base64_param(); in ParseFirstRoundChallenge() 40 HttpAuthChallengeTokenizer* challenge, in ParseLaterRoundChallenge() argument 43 if (!SchemeIsValid(scheme, challenge)) in ParseLaterRoundChallenge() 46 *encoded_token = challenge->base64_param(); in ParseLaterRoundChallenge()
|
D | http_auth_handler_basic_unittest.cc | 49 std::string challenge = "Basic realm=\"Atlantis\""; in TEST() local 54 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST() 71 const char* challenge; in TEST() member 110 tests[0].challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST() 115 HttpAuthChallengeTokenizer tok(test.challenge); in TEST() 122 const char* challenge; in TEST() member 206 std::string challenge = test.challenge; in TEST() local 211 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST() 230 std::string challenge = "Basic realm=\"Atlantis\""; in TEST() local 237 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST() [all …]
|
D | http_auth_handler_basic.cc | 62 HttpAuthChallengeTokenizer* challenge, in Init() argument 68 return ParseChallenge(challenge); in Init() 72 HttpAuthChallengeTokenizer* challenge) { in ParseChallenge() argument 73 if (challenge->auth_scheme() != kBasicAuthScheme) in ParseChallenge() 77 if (!ParseRealm(*challenge, &realm)) in ParseChallenge() 101 HttpAuthChallengeTokenizer* challenge) { in HandleAnotherChallengeImpl() argument 106 if (!ParseRealm(*challenge, &realm)) in HandleAnotherChallengeImpl() 117 HttpAuthChallengeTokenizer* challenge, in CreateAuthHandler() argument 135 if (!tmp_handler->InitFromChallenge(challenge, target, ssl_info, in CreateAuthHandler()
|
D | http_auth_challenge_tokenizer.cc | 15 std::string_view challenge) in HttpAuthChallengeTokenizer() argument 16 : challenge_(challenge) { in HttpAuthChallengeTokenizer() 17 Init(challenge); in HttpAuthChallengeTokenizer() 40 void HttpAuthChallengeTokenizer::Init(std::string_view challenge) { in Init() argument 44 base::StringViewTokenizer tok(challenge, HTTP_LWS); in Init() 55 HttpUtil::TrimLWS(std::string_view(tok.token_end(), challenge.end())); in Init()
|
/external/python/google-auth-library-python/tests/oauth2/ |
D | test_challenges.py | 52 challenge = challenges.SecurityKeyChallenge() 60 assert challenge.name == "SECURITY_KEY" 61 assert challenge.is_locally_eligible 62 assert challenge.obtain_challenge_input(metadata) == { 79 assert challenge.obtain_challenge_input(metadata) is None 87 assert challenge.obtain_challenge_input(metadata) is None 96 challenge.obtain_challenge_input(metadata) 102 assert challenge.obtain_challenge_input(metadata) is None 109 challenge.obtain_challenge_input(metadata) 114 challenge.obtain_challenge_input(metadata) [all …]
|
/external/cronet/stable/net/device_bound_sessions/ |
D | session_challenge_param_unittest.cc | 26 base::cstring_view challenge) { in CreateHeaderStringForTest() argument 28 return base::StringPrintf(R"("%s";%s="%s")", challenge.c_str(), in CreateHeaderStringForTest() 31 return base::StringPrintf(R"("%s")", challenge.c_str()); in CreateHeaderStringForTest() 45 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() 60 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() 109 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() 164 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() 180 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() 188 R"(("challenge";id="id"), ("challenge1" "id1"))") in TEST() 236 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() [all …]
|
D | registration_fetcher_param_unittest.cc | 31 std::optional<std::string> challenge, in CreateHeaders() argument 38 challenge ? base::StrCat({";challenge=\"", *challenge, "\""}) : ""; in CreateHeaders() 68 EXPECT_EQ(param.challenge(), "c1"); in TEST() 84 EXPECT_EQ(param.challenge(), "c1"); in TEST() 116 EXPECT_EQ(param.challenge(), "challenge1"); in TEST() 136 EXPECT_EQ(param.challenge(), "challenge1"); in TEST() 152 EXPECT_EQ(p1.challenge(), "c1"); in TEST() 158 EXPECT_EQ(p2.challenge(), "challenge2"); in TEST() 175 EXPECT_EQ(p1.challenge(), "c1"); in TEST() 207 EXPECT_EQ(p1.challenge(), "test"); in TEST() [all …]
|
/external/cronet/tot/net/device_bound_sessions/ |
D | session_challenge_param_unittest.cc | 26 base::cstring_view challenge) { in CreateHeaderStringForTest() argument 28 return base::StringPrintf(R"("%s";%s="%s")", challenge.c_str(), in CreateHeaderStringForTest() 31 return base::StringPrintf(R"("%s")", challenge.c_str()); in CreateHeaderStringForTest() 45 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() 60 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() 109 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() 164 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() 180 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() 188 R"(("challenge";id="id"), ("challenge1" "id1"))") in TEST() 236 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST() [all …]
|
D | registration_fetcher_param_unittest.cc | 31 std::optional<std::string> challenge, in CreateHeaders() argument 38 challenge ? base::StrCat({";challenge=\"", *challenge, "\""}) : ""; in CreateHeaders() 68 EXPECT_EQ(param.challenge(), "c1"); in TEST() 84 EXPECT_EQ(param.challenge(), "c1"); in TEST() 116 EXPECT_EQ(param.challenge(), "challenge1"); in TEST() 136 EXPECT_EQ(param.challenge(), "challenge1"); in TEST() 152 EXPECT_EQ(p1.challenge(), "c1"); in TEST() 158 EXPECT_EQ(p2.challenge(), "challenge2"); in TEST() 175 EXPECT_EQ(p1.challenge(), "c1"); in TEST() 207 EXPECT_EQ(p1.challenge(), "test"); in TEST() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 97 os_memcpy(challenge, hash, 8); in challenge_hash() 145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 176 u8 challenge[8]; in generate_nt_response() local 180 username_len, challenge) || in generate_nt_response() 182 challenge_response(challenge, password_hash, response)) in generate_nt_response() 204 u8 challenge[8]; in generate_nt_response_pwhash() local [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jce/netscape/ |
D | NetscapeCertRequest.java | 54 String challenge; field in NetscapeCertRequest 109 challenge = ((ASN1IA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest() 132 String challenge, in NetscapeCertRequest() argument 138 this.challenge = challenge; in NetscapeCertRequest() 145 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest() 159 return challenge; in getChallenge() 164 challenge = value; in setChallenge() 197 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument 200 if (!challenge.equals(this.challenge)) in verify() 242 pkac.add(new DERIA5String(challenge)); in sign() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
D | NetscapeCertRequest.java | 52 String challenge; field in NetscapeCertRequest 107 challenge = ((ASN1IA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest() 130 String challenge, in NetscapeCertRequest() argument 136 this.challenge = challenge; in NetscapeCertRequest() 143 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest() 157 return challenge; in getChallenge() 162 challenge = value; in setChallenge() 195 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument 198 if (!challenge.equals(this.challenge)) in verify() 240 pkac.add(new DERIA5String(challenge)); in sign() [all …]
|
/external/autotest/utils/frozen_chromite/third_party/python3/httplib2/ |
D | __init__.py | 641 challenge = _parse_www_authenticate(response, "www-authenticate") 642 self.challenge = challenge["digest"] 643 qop = self.challenge.get("qop", "auth") 644 self.challenge["qop"] = ( 647 if self.challenge["qop"] is None: 651 self.challenge["algorithm"] = self.challenge.get("algorithm", "MD5").upper() 652 if self.challenge["algorithm"] != "MD5": 654 _("Unsupported value for algorithm: %s." % self.challenge["algorithm"]) 660 self.challenge["realm"], 665 self.challenge["nc"] = 1 [all …]
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jce/netscape/ |
D | NetscapeCertRequest.java | 54 String challenge; field in NetscapeCertRequest 109 challenge = ((ASN1IA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest() 132 String challenge, in NetscapeCertRequest() argument 138 this.challenge = challenge; in NetscapeCertRequest() 145 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest() 159 return challenge; in getChallenge() 164 challenge = value; in setChallenge() 197 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument 200 if (!challenge.equals(this.challenge)) in verify() 242 pkac.add(new DERIA5String(challenge)); in sign() [all …]
|
/external/apache-http/src/org/apache/http/impl/auth/ |
D | NTLMScheme.java | 65 private String challenge; field in NTLMScheme 74 this.challenge = null; in NTLMScheme() 98 String challenge = buffer.substringTrimmed(pos, len); in parseChallenge() local 99 if (challenge.length() == 0) { in parseChallenge() 105 this.challenge = null; in parseChallenge() 108 this.challenge = challenge; in parseChallenge() 135 this.challenge); in authenticate()
|
/external/python/httplib2/python2/httplib2/ |
D | __init__.py | 673 challenge = _parse_www_authenticate(response, "www-authenticate") 674 self.challenge = challenge["digest"] 675 qop = self.challenge.get("qop", "auth") 676 self.challenge["qop"] = ( 679 if self.challenge["qop"] is None: 683 self.challenge["algorithm"] = self.challenge.get("algorithm", "MD5").upper() 684 if self.challenge["algorithm"] != "MD5": 686 _("Unsupported value for algorithm: %s." % self.challenge["algorithm"]) 692 self.challenge["realm"], 697 self.challenge["nc"] = 1 [all …]
|
/external/autotest/utils/frozen_chromite/third_party/python2/httplib2/ |
D | __init__.py | 660 challenge = _parse_www_authenticate(response, "www-authenticate") 661 self.challenge = challenge["digest"] 662 qop = self.challenge.get("qop", "auth") 663 self.challenge["qop"] = ( 666 if self.challenge["qop"] is None: 670 self.challenge["algorithm"] = self.challenge.get("algorithm", "MD5").upper() 671 if self.challenge["algorithm"] != "MD5": 673 _("Unsupported value for algorithm: %s." % self.challenge["algorithm"]) 679 self.challenge["realm"], 684 self.challenge["nc"] = 1 [all …]
|