/external/webkit/Source/WebKit2/WebProcess/Authentication/ |
D | AuthenticationManager.cpp | 86 AuthenticationChallenge challenge = m_challenges.take(challengeID); in useCredentialForChallenge() local 87 ASSERT(!challenge.isNull()); in useCredentialForChallenge() 88 AuthenticationClient* coreClient = challenge.authenticationClient(); in useCredentialForChallenge() 91 Download::receivedCredential(challenge, credential); in useCredentialForChallenge() 96 coreClient->receivedCredential(challenge, credential); in useCredentialForChallenge() 101 AuthenticationChallenge challenge = m_challenges.take(challengeID); in continueWithoutCredentialForChallenge() local 102 ASSERT(!challenge.isNull()); in continueWithoutCredentialForChallenge() 103 AuthenticationClient* coreClient = challenge.authenticationClient(); in continueWithoutCredentialForChallenge() 106 Download::receivedRequestToContinueWithoutCredential(challenge); in continueWithoutCredentialForChallenge() 110 coreClient->receivedRequestToContinueWithoutCredential(challenge); in continueWithoutCredentialForChallenge() [all …]
|
/external/webkit/Source/WebKit/mac/Panels/ |
D | WebPanelAuthenticationHandler.m | 68 -(void)enqueueChallenge:(NSURLAuthenticationChallenge *)challenge forWindow:(id)window 76 [queue addObject:challenge]; 86 NSURLAuthenticationChallenge *challenge = [[queue objectAtIndex:0] retain]; 92 …alStorage sharedCredentialStorage] defaultCredentialForProtectionSpace:[challenge protectionSpace]… 95 [[challenge sender] useCredential:latestCredential forAuthenticationChallenge:challenge]; 96 [challenge release]; 100 …[self startAuthentication:challenge window:(window == WebModalDialogPretendWindow ? nil : window)]; 101 [challenge release]; 105 -(void)startAuthentication:(NSURLAuthenticationChallenge *)challenge window:(NSWindow *)w 110 [self enqueueChallenge:challenge forWindow:window]; [all …]
|
/external/webkit/Source/WebKit2/UIProcess/API/C/ |
D | WKAuthenticationChallenge.cpp | 41 …ionListenerRef WKAuthenticationChallengeGetDecisionListener(WKAuthenticationChallengeRef challenge) in WKAuthenticationChallengeGetDecisionListener() argument 43 return toAPI(toImpl(challenge)->listener()); in WKAuthenticationChallengeGetDecisionListener() 46 …tectionSpaceRef WKAuthenticationChallengeGetProtectionSpace(WKAuthenticationChallengeRef challenge) in WKAuthenticationChallengeGetProtectionSpace() argument 48 return toAPI(toImpl(challenge)->protectionSpace()); in WKAuthenticationChallengeGetProtectionSpace() 51 …redentialRef WKAuthenticationChallengeGetProposedCredential(WKAuthenticationChallengeRef challenge) in WKAuthenticationChallengeGetProposedCredential() argument 53 return toAPI(toImpl(challenge)->proposedCredential()); in WKAuthenticationChallengeGetProposedCredential() 56 int WKAuthenticationChallengeGetPreviousFailureCount(WKAuthenticationChallengeRef challenge) in WKAuthenticationChallengeGetPreviousFailureCount() argument 58 return toImpl(challenge)->previousFailureCount(); in WKAuthenticationChallengeGetPreviousFailureCount()
|
/external/chromium/net/http/ |
D | http_auth_unittest.cc | 31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), in CreateMockHandler() local 34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge, in CreateMockHandler() 245 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), in TEST() local 247 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST() 250 EXPECT_EQ(std::string("Basic"), challenge.scheme()); in TEST() 261 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), in TEST() local 263 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST() 266 EXPECT_EQ(std::string("Basic"), challenge.scheme()); in TEST() 277 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), in TEST() local 279 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST() [all …]
|
D | http_auth_handler_basic_unittest.cc | 35 std::string challenge = "Basic realm=\"Atlantis\""; in TEST() local 38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); in TEST() 52 const char* challenge; in TEST() member 89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, in TEST() 93 std::string challenge(tests[i].challenge); in TEST() local 94 HttpAuth::ChallengeTokenizer tok(challenge.begin(), in TEST() 95 challenge.end()); in TEST() 102 const char* challenge; in TEST() member 178 std::string challenge = tests[i].challenge; in TEST() local 181 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic); in TEST()
|
D | http_auth_handler_basic.cc | 25 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) { in Init() argument 29 return ParseChallenge(challenge); in Init() 33 HttpAuth::ChallengeTokenizer* challenge) { in ParseChallenge() argument 35 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic")) in ParseChallenge() 38 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); in ParseChallenge() 55 HttpAuth::ChallengeTokenizer* challenge) { in HandleAnotherChallenge() argument 59 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); in HandleAnotherChallenge() 94 HttpAuth::ChallengeTokenizer* challenge, in CreateAuthHandler() argument 104 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) in CreateAuthHandler()
|
D | http_auth_handler_factory.cc | 19 const std::string& challenge, in CreateAuthHandlerFromString() argument 24 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end()); in CreateAuthHandlerFromString() 30 const std::string& challenge, in CreatePreemptiveAuthHandlerFromString() argument 36 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end()); in CreatePreemptiveAuthHandlerFromString() 168 HttpAuth::ChallengeTokenizer* challenge, in CreateAuthHandler() argument 175 std::string scheme = challenge->scheme(); in CreateAuthHandler() 187 return it->second->CreateAuthHandler(challenge, target, origin, reason, in CreateAuthHandler()
|
D | http_auth_handler_digest.cc | 90 HttpAuth::ChallengeTokenizer* challenge, in CreateAuthHandler() argument 101 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) in CreateAuthHandler() 108 HttpAuth::ChallengeTokenizer* challenge) { in HandleAnotherChallenge() argument 113 if (!LowerCaseEqualsASCII(challenge->scheme(), "digest")) in HandleAnotherChallenge() 116 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); in HandleAnotherChallenge() 134 bool HttpAuthHandlerDigest::Init(HttpAuth::ChallengeTokenizer* challenge) { in Init() argument 135 return ParseChallenge(challenge); in Init() 192 HttpAuth::ChallengeTokenizer* challenge) { in ParseChallenge() argument 204 if (!LowerCaseEqualsASCII(challenge->scheme(), "digest")) in ParseChallenge() 207 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); in ParseChallenge()
|
D | http_auth_handler_basic.h | 25 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge, 35 HttpAuth::ChallengeTokenizer* challenge); 38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge); 49 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
|
D | http_auth_handler_ntlm_portable.cc | 322 const uint8* challenge, in LM_Response() argument 333 DESEncrypt(k1, challenge, response); in LM_Response() 334 DESEncrypt(k2, challenge, response + 8); in LM_Response() 335 DESEncrypt(k3, challenge, response + 16); in LM_Response() 383 uint8 challenge[8]; // 8 byte challenge member 433 memcpy(msg->challenge, cursor, sizeof(msg->challenge)); in ParseType2Msg() 434 cursor += sizeof(msg->challenge); in ParseType2Msg() 440 LogBuf("challenge", msg->challenge, sizeof(msg->challenge)); in ParseType2Msg() 568 memcpy(temp, msg.challenge, 8); in GenerateType3Msg() 576 LM_Response(ntlm_hash, msg.challenge, ntlm_resp); in GenerateType3Msg() [all …]
|
/external/openssh/ |
D | auth-bsdauth.c | 55 char *challenge = NULL; in bsdauth_query() local 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query() 60 if (challenge == NULL) { in bsdauth_query() 66 if (challenge == NULL) { in bsdauth_query() 71 authctxt->style, "auth-ssh", &challenge); in bsdauth_query() 73 challenge = NULL; in bsdauth_query() 74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query() 77 if (challenge == NULL) in bsdauth_query() 85 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
|
D | auth-rsa.c | 73 BIGNUM *challenge; in auth_rsa_generate_challenge() local 76 if ((challenge = BN_new()) == NULL) in auth_rsa_generate_challenge() 79 if (BN_rand(challenge, 256, 0, 0) == 0) in auth_rsa_generate_challenge() 83 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0) in auth_rsa_generate_challenge() 87 return challenge; in auth_rsa_generate_challenge() 91 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) in auth_rsa_verify_response() argument 105 len = BN_num_bytes(challenge); in auth_rsa_verify_response() 109 BN_bn2bin(challenge, buf + 32 - len); in auth_rsa_verify_response() 133 BIGNUM *challenge, *encrypted_challenge; in auth_rsa_challenge_dialog() local 140 challenge = PRIVSEP(auth_rsa_generate_challenge(key)); in auth_rsa_challenge_dialog() [all …]
|
D | sshconnect1.c | 71 BIGNUM *challenge; in try_agent_authentication() local 78 if ((challenge = BN_new()) == NULL) in try_agent_authentication() 110 packet_get_bignum(challenge); in try_agent_authentication() 116 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) { in try_agent_authentication() 141 BN_clear_free(challenge); in try_agent_authentication() 151 BN_clear_free(challenge); in try_agent_authentication() 161 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) in respond_to_rsa_challenge() argument 169 if (rsa_private_decrypt(challenge, challenge, prv) <= 0) in respond_to_rsa_challenge() 175 len = BN_num_bytes(challenge); in respond_to_rsa_challenge() 181 BN_bn2bin(challenge, buf + sizeof(buf) - len); in respond_to_rsa_challenge() [all …]
|
D | auth-skey.c | 56 char challenge[1024]; in skey_query() local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, in skey_query() 60 sizeof(challenge)) == -1) in skey_query() 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT); in skey_query()
|
/external/wpa_supplicant_8/src/crypto/ |
D | ms_funcs.c | 82 u8 *challenge) in challenge_hash() argument 97 os_memcpy(challenge, hash, 8); in challenge_hash() 144 void challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument 148 des_encrypt(challenge, password_hash, response); in challenge_response() 149 des_encrypt(challenge, password_hash + 7, response + 8); in challenge_response() 153 des_encrypt(challenge, zpwd, response + 16); in challenge_response() 173 u8 challenge[8]; in generate_nt_response() local 177 username_len, challenge)) in generate_nt_response() 181 challenge_response(challenge, password_hash, response); in generate_nt_response() 202 u8 challenge[8]; in generate_nt_response_pwhash() local [all …]
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/ |
D | __init__.py | 463 challenge = _parse_www_authenticate(response, 'www-authenticate') 464 self.challenge = challenge['digest'] 465 qop = self.challenge.get('qop', 'auth') 466 self.challenge['qop'] = ('auth' in [x.strip() for x in qop.split()]) and 'auth' or None 467 if self.challenge['qop'] is None: 469 self.challenge['algorithm'] = self.challenge.get('algorithm', 'MD5').upper() 470 if self.challenge['algorithm'] != 'MD5': 471 …ntedDigestAuthOptionError( _("Unsupported value for algorithm: %s." % self.challenge['algorithm'])) 472 …self.A1 = "".join([self.credentials[0], ":", self.challenge['realm'], ":", self.credentials[1]]) 473 self.challenge['nc'] = 1 [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
D | NetscapeCertRequest.java | 51 String challenge; field in NetscapeCertRequest 107 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest() 131 String challenge, in NetscapeCertRequest() argument 137 this.challenge = challenge; in NetscapeCertRequest() 144 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest() 158 return challenge; in getChallenge() 163 challenge = value; in setChallenge() 196 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument 199 if (!challenge.equals(this.challenge)) in verify() 243 pkac.add(new DERIA5String(challenge)); in sign() [all …]
|
/external/ppp/pppd/ |
D | chap_ms.c | 169 chapms_generate_challenge(unsigned char *challenge) in chapms_generate_challenge() argument 171 *challenge++ = 8; in chapms_generate_challenge() 174 memcpy(challenge, mschap_challenge, 8); in chapms_generate_challenge() 177 random_bytes(challenge, 8); in chapms_generate_challenge() 181 chapms2_generate_challenge(unsigned char *challenge) in chapms2_generate_challenge() argument 183 *challenge++ = 16; in chapms2_generate_challenge() 186 memcpy(challenge, mschap_challenge, 16); in chapms2_generate_challenge() 189 random_bytes(challenge, 16); in chapms2_generate_challenge() 195 unsigned char *challenge, unsigned char *response, in chapms_verify_response() argument 203 challenge_len = *challenge++; /* skip length, is 8 */ in chapms_verify_response() [all …]
|
D | chap-md5.c | 59 unsigned char *challenge, unsigned char *response, in chap_md5_verify_response() argument 67 challenge_len = *challenge++; in chap_md5_verify_response() 74 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_verify_response() 89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument 94 int challenge_len = *challenge++; in chap_md5_make_response() 99 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_make_response()
|
/external/webkit/Source/WebKit/win/ |
D | WebURLAuthenticationChallengeSenderCFNet.cpp | 42 /* [in] */ IWebURLAuthenticationChallenge* challenge) in cancelAuthenticationChallenge() argument 44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); in cancelAuthenticationChallenge() 53 /* [in] */ IWebURLAuthenticationChallenge* challenge) in continueWithoutCredentialForAuthenticationChallenge() argument 55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); in continueWithoutCredentialForAuthenticationChallenge() 65 /* [in] */ IWebURLAuthenticationChallenge* challenge) in useCredential() argument 67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); in useCredential()
|
/external/webkit/Source/WebCore/platform/network/cf/ |
D | ResourceHandleCFNet.cpp | 277 void didReceiveChallenge(CFURLConnectionRef conn, CFURLAuthChallengeRef challenge, const void* clie… in didReceiveChallenge() argument 283 handle->didReceiveAuthenticationChallenge(AuthenticationChallenge(challenge, handle)); in didReceiveChallenge() 506 void ResourceHandle::didReceiveAuthenticationChallenge(const AuthenticationChallenge& challenge) in didReceiveAuthenticationChallenge() argument 512 ASSERT(challenge.cfURLAuthChallengeRef()); in didReceiveAuthenticationChallenge() 513 ASSERT(challenge.authenticationClient() == this); // Should be already set. in didReceiveAuthenticationChallenge() 522 if (challenge.failureResponse().httpStatusCode() == 401) in didReceiveAuthenticationChallenge() 524 CredentialStorage::set(core(credential.get()), challenge.protectionSpace(), urlToStore); in didReceiveAuthenticationChallenge() 526 …CFURLConnectionUseCredential(d->m_connection.get(), credential.get(), challenge.cfURLAuthChallenge… in didReceiveAuthenticationChallenge() 534 if (!d->m_initialCredential.isEmpty() || challenge.previousFailureCount()) { in didReceiveAuthenticationChallenge() 538 CredentialStorage::remove(challenge.protectionSpace()); in didReceiveAuthenticationChallenge() [all …]
|
/external/apache-http/src/org/apache/http/impl/auth/ |
D | NTLMScheme.java | 59 private String challenge; field in NTLMScheme 68 this.challenge = null; in NTLMScheme() 92 String challenge = buffer.substringTrimmed(pos, len); in parseChallenge() local 93 if (challenge.length() == 0) { in parseChallenge() 99 this.challenge = null; in parseChallenge() 102 this.challenge = challenge; in parseChallenge() 129 this.challenge); in authenticate()
|
/external/chromium/net/websockets/ |
D | websocket_handshake_handler.cc | 108 void GetKeyNumber(const std::string& key, std::string* challenge) { in GetKeyNumber() argument 130 challenge->append(part, 4); in GetKeyNumber() 190 const GURL& url, std::string* challenge) { in GetRequestInfo() argument 205 challenge->clear(); in GetRequestInfo() 209 GetKeyNumber(key, challenge); in GetRequestInfo() 213 GetKeyNumber(key, challenge); in GetRequestInfo() 215 challenge->append(key3_); in GetRequestInfo() 221 const GURL& url, spdy::SpdyHeaderBlock* headers, std::string* challenge) { in GetRequestHeaderBlock() argument 261 challenge->clear(); in GetRequestHeaderBlock() 262 GetKeyNumber(key1, challenge); in GetRequestHeaderBlock() [all …]
|
D | websocket_handshake_handler_unittest.cc | 198 std::string challenge; in TEST() local 200 request_handler.GetRequestInfo(url, &challenge); in TEST() 219 EXPECT_EQ(expected_challenge, challenge); in TEST() 245 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge)); in TEST() 282 std::string challenge; in TEST() local 284 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, &headers, &challenge)); in TEST() 304 EXPECT_EQ(expected_challenge, challenge); in TEST() 313 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers, challenge)); in TEST() 352 std::string challenge; in TEST() local 354 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, &headers, &challenge)); in TEST() [all …]
|
/external/libppp/src/ |
D | chap.c | 125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge in chap_BuildAnswer() argument 152 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */ in chap_BuildAnswer() 175 mschap_NT(digest, challenge + 1); in chap_BuildAnswer() 215 GenerateNTResponse(challenge + 1, peerchallenge + 1, name, in chap_BuildAnswer() 223 peerchallenge + 1, challenge + 1, name, in chap_BuildAnswer() 241 MD5Update(&MD5context, challenge + 1, *challenge); in chap_BuildAnswer() 332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer); in chap_StartChild() 361 *chap->challenge.local = *chap->challenge.peer = '\0'; in chap_Cleanup() 376 ans = chap_BuildAnswer(name, key, chap->auth.id, chap->challenge.peer in chap_Respond() 378 , type, chap->challenge.local, chap->authresponse, lm in chap_Respond() [all …]
|