Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 388) sorted by relevance

12345678910>>...16

/external/cronet/tot/net/http/
Dhttp_auth_challenge_tokenizer_unittest.cc14 HttpAuthChallengeTokenizer challenge("Basic realm=\"foobar\""); in TEST() local
15 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST()
18 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST()
28 HttpAuthChallengeTokenizer challenge("Basic realm=foobar@baz.com"); in TEST() local
29 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST()
32 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST()
42 HttpAuthChallengeTokenizer challenge("Basic realm=\"foobar@baz.com"); in TEST() local
43 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST()
46 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST()
56 HttpAuthChallengeTokenizer challenge("Basic realm=\""); in TEST() local
[all …]
Dhttp_auth_multi_round_parse_unittest.cc20 HttpAuthChallengeTokenizer challenge("Negotiate"); in TEST() local
23 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST()
30 HttpAuthChallengeTokenizer challenge("Negotiate Zm9vYmFy"); in TEST() local
33 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST()
38 HttpAuthChallengeTokenizer challenge("DummyScheme"); in TEST() local
41 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST()
46 HttpAuthChallengeTokenizer challenge("Negotiate Zm9vYmFy"); in TEST() local
51 ParseLaterRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge, in TEST()
59 HttpAuthChallengeTokenizer challenge("Negotiate"); in TEST() local
64 ParseLaterRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge, in TEST()
[all …]
Dhttp_auth_multi_round_parse.cc19 HttpAuthChallengeTokenizer* challenge) { in SchemeIsValid() argument
20 return challenge->auth_scheme() == HttpAuth::SchemeToString(scheme); in SchemeIsValid()
27 HttpAuthChallengeTokenizer* challenge) { in ParseFirstRoundChallenge() argument
28 if (!SchemeIsValid(scheme, challenge)) in ParseFirstRoundChallenge()
31 std::string_view encoded_auth_token = challenge->base64_param(); in ParseFirstRoundChallenge()
40 HttpAuthChallengeTokenizer* challenge, in ParseLaterRoundChallenge() argument
43 if (!SchemeIsValid(scheme, challenge)) in ParseLaterRoundChallenge()
46 *encoded_token = challenge->base64_param(); in ParseLaterRoundChallenge()
Dhttp_auth_handler_basic_unittest.cc49 std::string challenge = "Basic realm=\"Atlantis\""; in TEST() local
54 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST()
71 const char* challenge; in TEST() member
110 tests[0].challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST()
115 HttpAuthChallengeTokenizer tok(test.challenge); in TEST()
122 const char* challenge; in TEST() member
206 std::string challenge = test.challenge; in TEST() local
211 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST()
230 std::string challenge = "Basic realm=\"Atlantis\""; in TEST() local
237 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST()
[all …]
Dhttp_auth_handler_basic.cc62 HttpAuthChallengeTokenizer* challenge, in Init() argument
68 return ParseChallenge(challenge); in Init()
72 HttpAuthChallengeTokenizer* challenge) { in ParseChallenge() argument
73 if (challenge->auth_scheme() != kBasicAuthScheme) in ParseChallenge()
77 if (!ParseRealm(*challenge, &realm)) in ParseChallenge()
101 HttpAuthChallengeTokenizer* challenge) { in HandleAnotherChallengeImpl() argument
106 if (!ParseRealm(*challenge, &realm)) in HandleAnotherChallengeImpl()
117 HttpAuthChallengeTokenizer* challenge, in CreateAuthHandler() argument
135 if (!tmp_handler->InitFromChallenge(challenge, target, ssl_info, in CreateAuthHandler()
Dhttp_auth_challenge_tokenizer.cc15 std::string_view challenge) in HttpAuthChallengeTokenizer() argument
16 : challenge_(challenge) { in HttpAuthChallengeTokenizer()
17 Init(challenge); in HttpAuthChallengeTokenizer()
40 void HttpAuthChallengeTokenizer::Init(std::string_view challenge) { in Init() argument
44 base::StringViewTokenizer tok(challenge, HTTP_LWS); in Init()
55 HttpUtil::TrimLWS(std::string_view(tok.token_end(), challenge.end())); in Init()
/external/cronet/stable/net/http/
Dhttp_auth_challenge_tokenizer_unittest.cc14 HttpAuthChallengeTokenizer challenge("Basic realm=\"foobar\""); in TEST() local
15 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST()
18 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST()
28 HttpAuthChallengeTokenizer challenge("Basic realm=foobar@baz.com"); in TEST() local
29 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST()
32 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST()
42 HttpAuthChallengeTokenizer challenge("Basic realm=\"foobar@baz.com"); in TEST() local
43 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST()
46 EXPECT_EQ("basic", challenge.auth_scheme()); in TEST()
56 HttpAuthChallengeTokenizer challenge("Basic realm=\""); in TEST() local
[all …]
Dhttp_auth_multi_round_parse_unittest.cc20 HttpAuthChallengeTokenizer challenge("Negotiate"); in TEST() local
23 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST()
30 HttpAuthChallengeTokenizer challenge("Negotiate Zm9vYmFy"); in TEST() local
33 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST()
38 HttpAuthChallengeTokenizer challenge("DummyScheme"); in TEST() local
41 ParseFirstRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge)); in TEST()
46 HttpAuthChallengeTokenizer challenge("Negotiate Zm9vYmFy"); in TEST() local
51 ParseLaterRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge, in TEST()
59 HttpAuthChallengeTokenizer challenge("Negotiate"); in TEST() local
64 ParseLaterRoundChallenge(HttpAuth::AUTH_SCHEME_NEGOTIATE, &challenge, in TEST()
[all …]
Dhttp_auth_multi_round_parse.cc19 HttpAuthChallengeTokenizer* challenge) { in SchemeIsValid() argument
20 return challenge->auth_scheme() == HttpAuth::SchemeToString(scheme); in SchemeIsValid()
27 HttpAuthChallengeTokenizer* challenge) { in ParseFirstRoundChallenge() argument
28 if (!SchemeIsValid(scheme, challenge)) in ParseFirstRoundChallenge()
31 std::string_view encoded_auth_token = challenge->base64_param(); in ParseFirstRoundChallenge()
40 HttpAuthChallengeTokenizer* challenge, in ParseLaterRoundChallenge() argument
43 if (!SchemeIsValid(scheme, challenge)) in ParseLaterRoundChallenge()
46 *encoded_token = challenge->base64_param(); in ParseLaterRoundChallenge()
Dhttp_auth_handler_basic_unittest.cc49 std::string challenge = "Basic realm=\"Atlantis\""; in TEST() local
54 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST()
71 const char* challenge; in TEST() member
110 tests[0].challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST()
115 HttpAuthChallengeTokenizer tok(test.challenge); in TEST()
122 const char* challenge; in TEST() member
206 std::string challenge = test.challenge; in TEST() local
211 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST()
230 std::string challenge = "Basic realm=\"Atlantis\""; in TEST() local
237 challenge, HttpAuth::AUTH_SERVER, null_ssl_info, in TEST()
[all …]
Dhttp_auth_handler_basic.cc62 HttpAuthChallengeTokenizer* challenge, in Init() argument
68 return ParseChallenge(challenge); in Init()
72 HttpAuthChallengeTokenizer* challenge) { in ParseChallenge() argument
73 if (challenge->auth_scheme() != kBasicAuthScheme) in ParseChallenge()
77 if (!ParseRealm(*challenge, &realm)) in ParseChallenge()
101 HttpAuthChallengeTokenizer* challenge) { in HandleAnotherChallengeImpl() argument
106 if (!ParseRealm(*challenge, &realm)) in HandleAnotherChallengeImpl()
117 HttpAuthChallengeTokenizer* challenge, in CreateAuthHandler() argument
135 if (!tmp_handler->InitFromChallenge(challenge, target, ssl_info, in CreateAuthHandler()
Dhttp_auth_challenge_tokenizer.cc15 std::string_view challenge) in HttpAuthChallengeTokenizer() argument
16 : challenge_(challenge) { in HttpAuthChallengeTokenizer()
17 Init(challenge); in HttpAuthChallengeTokenizer()
40 void HttpAuthChallengeTokenizer::Init(std::string_view challenge) { in Init() argument
44 base::StringViewTokenizer tok(challenge, HTTP_LWS); in Init()
55 HttpUtil::TrimLWS(std::string_view(tok.token_end(), challenge.end())); in Init()
/external/python/google-auth-library-python/tests/oauth2/
Dtest_challenges.py52 challenge = challenges.SecurityKeyChallenge()
60 assert challenge.name == "SECURITY_KEY"
61 assert challenge.is_locally_eligible
62 assert challenge.obtain_challenge_input(metadata) == {
79 assert challenge.obtain_challenge_input(metadata) is None
87 assert challenge.obtain_challenge_input(metadata) is None
96 challenge.obtain_challenge_input(metadata)
102 assert challenge.obtain_challenge_input(metadata) is None
109 challenge.obtain_challenge_input(metadata)
114 challenge.obtain_challenge_input(metadata)
[all …]
/external/cronet/stable/net/device_bound_sessions/
Dsession_challenge_param_unittest.cc26 base::cstring_view challenge) { in CreateHeaderStringForTest() argument
28 return base::StringPrintf(R"("%s";%s="%s")", challenge.c_str(), in CreateHeaderStringForTest()
31 return base::StringPrintf(R"("%s")", challenge.c_str()); in CreateHeaderStringForTest()
45 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
60 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
109 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
164 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
180 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
188 R"(("challenge";id="id"), ("challenge1" "id1"))") in TEST()
236 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
[all …]
Dregistration_fetcher_param_unittest.cc31 std::optional<std::string> challenge, in CreateHeaders() argument
38 challenge ? base::StrCat({";challenge=\"", *challenge, "\""}) : ""; in CreateHeaders()
68 EXPECT_EQ(param.challenge(), "c1"); in TEST()
84 EXPECT_EQ(param.challenge(), "c1"); in TEST()
116 EXPECT_EQ(param.challenge(), "challenge1"); in TEST()
136 EXPECT_EQ(param.challenge(), "challenge1"); in TEST()
152 EXPECT_EQ(p1.challenge(), "c1"); in TEST()
158 EXPECT_EQ(p2.challenge(), "challenge2"); in TEST()
175 EXPECT_EQ(p1.challenge(), "c1"); in TEST()
207 EXPECT_EQ(p1.challenge(), "test"); in TEST()
[all …]
/external/cronet/tot/net/device_bound_sessions/
Dsession_challenge_param_unittest.cc26 base::cstring_view challenge) { in CreateHeaderStringForTest() argument
28 return base::StringPrintf(R"("%s";%s="%s")", challenge.c_str(), in CreateHeaderStringForTest()
31 return base::StringPrintf(R"("%s")", challenge.c_str()); in CreateHeaderStringForTest()
45 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
60 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
109 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
164 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
180 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
188 R"(("challenge";id="id"), ("challenge1" "id1"))") in TEST()
236 EXPECT_EQ(params[0].challenge(), kSampleChallenge); in TEST()
[all …]
Dregistration_fetcher_param_unittest.cc31 std::optional<std::string> challenge, in CreateHeaders() argument
38 challenge ? base::StrCat({";challenge=\"", *challenge, "\""}) : ""; in CreateHeaders()
68 EXPECT_EQ(param.challenge(), "c1"); in TEST()
84 EXPECT_EQ(param.challenge(), "c1"); in TEST()
116 EXPECT_EQ(param.challenge(), "challenge1"); in TEST()
136 EXPECT_EQ(param.challenge(), "challenge1"); in TEST()
152 EXPECT_EQ(p1.challenge(), "c1"); in TEST()
158 EXPECT_EQ(p2.challenge(), "challenge2"); in TEST()
175 EXPECT_EQ(p1.challenge(), "c1"); in TEST()
207 EXPECT_EQ(p1.challenge(), "test"); in TEST()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
97 os_memcpy(challenge, hash, 8); in challenge_hash()
145 int challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
176 u8 challenge[8]; in generate_nt_response() local
180 username_len, challenge) || in generate_nt_response()
182 challenge_response(challenge, password_hash, response)) in generate_nt_response()
204 u8 challenge[8]; in generate_nt_response_pwhash() local
[all …]
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jce/netscape/
DNetscapeCertRequest.java54 String challenge; field in NetscapeCertRequest
109 challenge = ((ASN1IA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest()
132 String challenge, in NetscapeCertRequest() argument
138 this.challenge = challenge; in NetscapeCertRequest()
145 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest()
159 return challenge; in getChallenge()
164 challenge = value; in setChallenge()
197 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument
200 if (!challenge.equals(this.challenge)) in verify()
242 pkac.add(new DERIA5String(challenge)); in sign()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
DNetscapeCertRequest.java52 String challenge; field in NetscapeCertRequest
107 challenge = ((ASN1IA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest()
130 String challenge, in NetscapeCertRequest() argument
136 this.challenge = challenge; in NetscapeCertRequest()
143 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest()
157 return challenge; in getChallenge()
162 challenge = value; in setChallenge()
195 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument
198 if (!challenge.equals(this.challenge)) in verify()
240 pkac.add(new DERIA5String(challenge)); in sign()
[all …]
/external/autotest/utils/frozen_chromite/third_party/python3/httplib2/
D__init__.py641 challenge = _parse_www_authenticate(response, "www-authenticate")
642 self.challenge = challenge["digest"]
643 qop = self.challenge.get("qop", "auth")
644 self.challenge["qop"] = (
647 if self.challenge["qop"] is None:
651 self.challenge["algorithm"] = self.challenge.get("algorithm", "MD5").upper()
652 if self.challenge["algorithm"] != "MD5":
654 _("Unsupported value for algorithm: %s." % self.challenge["algorithm"])
660 self.challenge["realm"],
665 self.challenge["nc"] = 1
[all …]
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jce/netscape/
DNetscapeCertRequest.java54 String challenge; field in NetscapeCertRequest
109 challenge = ((ASN1IA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest()
132 String challenge, in NetscapeCertRequest() argument
138 this.challenge = challenge; in NetscapeCertRequest()
145 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest()
159 return challenge; in getChallenge()
164 challenge = value; in setChallenge()
197 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument
200 if (!challenge.equals(this.challenge)) in verify()
242 pkac.add(new DERIA5String(challenge)); in sign()
[all …]
/external/apache-http/src/org/apache/http/impl/auth/
DNTLMScheme.java65 private String challenge; field in NTLMScheme
74 this.challenge = null; in NTLMScheme()
98 String challenge = buffer.substringTrimmed(pos, len); in parseChallenge() local
99 if (challenge.length() == 0) { in parseChallenge()
105 this.challenge = null; in parseChallenge()
108 this.challenge = challenge; in parseChallenge()
135 this.challenge); in authenticate()
/external/python/httplib2/python2/httplib2/
D__init__.py673 challenge = _parse_www_authenticate(response, "www-authenticate")
674 self.challenge = challenge["digest"]
675 qop = self.challenge.get("qop", "auth")
676 self.challenge["qop"] = (
679 if self.challenge["qop"] is None:
683 self.challenge["algorithm"] = self.challenge.get("algorithm", "MD5").upper()
684 if self.challenge["algorithm"] != "MD5":
686 _("Unsupported value for algorithm: %s." % self.challenge["algorithm"])
692 self.challenge["realm"],
697 self.challenge["nc"] = 1
[all …]
/external/autotest/utils/frozen_chromite/third_party/python2/httplib2/
D__init__.py660 challenge = _parse_www_authenticate(response, "www-authenticate")
661 self.challenge = challenge["digest"]
662 qop = self.challenge.get("qop", "auth")
663 self.challenge["qop"] = (
666 if self.challenge["qop"] is None:
670 self.challenge["algorithm"] = self.challenge.get("algorithm", "MD5").upper()
671 if self.challenge["algorithm"] != "MD5":
673 _("Unsupported value for algorithm: %s." % self.challenge["algorithm"])
679 self.challenge["realm"],
684 self.challenge["nc"] = 1
[all …]

12345678910>>...16