Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 230) sorted by relevance

12345678910

/external/webkit/Source/WebKit2/WebProcess/Authentication/
DAuthenticationManager.cpp86 AuthenticationChallenge challenge = m_challenges.take(challengeID); in useCredentialForChallenge() local
87 ASSERT(!challenge.isNull()); in useCredentialForChallenge()
88 AuthenticationClient* coreClient = challenge.authenticationClient(); in useCredentialForChallenge()
91 Download::receivedCredential(challenge, credential); in useCredentialForChallenge()
96 coreClient->receivedCredential(challenge, credential); in useCredentialForChallenge()
101 AuthenticationChallenge challenge = m_challenges.take(challengeID); in continueWithoutCredentialForChallenge() local
102 ASSERT(!challenge.isNull()); in continueWithoutCredentialForChallenge()
103 AuthenticationClient* coreClient = challenge.authenticationClient(); in continueWithoutCredentialForChallenge()
106 Download::receivedRequestToContinueWithoutCredential(challenge); in continueWithoutCredentialForChallenge()
110 coreClient->receivedRequestToContinueWithoutCredential(challenge); in continueWithoutCredentialForChallenge()
[all …]
/external/webkit/Source/WebKit/mac/Panels/
DWebPanelAuthenticationHandler.m68 -(void)enqueueChallenge:(NSURLAuthenticationChallenge *)challenge forWindow:(id)window
76 [queue addObject:challenge];
86 NSURLAuthenticationChallenge *challenge = [[queue objectAtIndex:0] retain];
92 …alStorage sharedCredentialStorage] defaultCredentialForProtectionSpace:[challenge protectionSpace]…
95 [[challenge sender] useCredential:latestCredential forAuthenticationChallenge:challenge];
96 [challenge release];
100 …[self startAuthentication:challenge window:(window == WebModalDialogPretendWindow ? nil : window)];
101 [challenge release];
105 -(void)startAuthentication:(NSURLAuthenticationChallenge *)challenge window:(NSWindow *)w
110 [self enqueueChallenge:challenge forWindow:window];
[all …]
/external/webkit/Source/WebKit2/UIProcess/API/C/
DWKAuthenticationChallenge.cpp41 …ionListenerRef WKAuthenticationChallengeGetDecisionListener(WKAuthenticationChallengeRef challenge) in WKAuthenticationChallengeGetDecisionListener() argument
43 return toAPI(toImpl(challenge)->listener()); in WKAuthenticationChallengeGetDecisionListener()
46 …tectionSpaceRef WKAuthenticationChallengeGetProtectionSpace(WKAuthenticationChallengeRef challenge) in WKAuthenticationChallengeGetProtectionSpace() argument
48 return toAPI(toImpl(challenge)->protectionSpace()); in WKAuthenticationChallengeGetProtectionSpace()
51 …redentialRef WKAuthenticationChallengeGetProposedCredential(WKAuthenticationChallengeRef challenge) in WKAuthenticationChallengeGetProposedCredential() argument
53 return toAPI(toImpl(challenge)->proposedCredential()); in WKAuthenticationChallengeGetProposedCredential()
56 int WKAuthenticationChallengeGetPreviousFailureCount(WKAuthenticationChallengeRef challenge) in WKAuthenticationChallengeGetPreviousFailureCount() argument
58 return toImpl(challenge)->previousFailureCount(); in WKAuthenticationChallengeGetPreviousFailureCount()
/external/chromium/net/http/
Dhttp_auth_unittest.cc31 HttpAuth::ChallengeTokenizer challenge(challenge_text.begin(), in CreateMockHandler() local
34 EXPECT_TRUE(auth_handler->InitFromChallenge(&challenge, in CreateMockHandler()
245 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), in TEST() local
247 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST()
250 EXPECT_EQ(std::string("Basic"), challenge.scheme()); in TEST()
261 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), in TEST() local
263 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST()
266 EXPECT_EQ(std::string("Basic"), challenge.scheme()); in TEST()
277 HttpAuth::ChallengeTokenizer challenge(challenge_str.begin(), in TEST() local
279 HttpUtil::NameValuePairsIterator parameters = challenge.param_pairs(); in TEST()
[all …]
Dhttp_auth_handler_basic_unittest.cc35 std::string challenge = "Basic realm=\"Atlantis\""; in TEST() local
38 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic)); in TEST()
52 const char* challenge; in TEST() member
89 tests[0].challenge, HttpAuth::AUTH_SERVER, origin, in TEST()
93 std::string challenge(tests[i].challenge); in TEST() local
94 HttpAuth::ChallengeTokenizer tok(challenge.begin(), in TEST()
95 challenge.end()); in TEST()
102 const char* challenge; in TEST() member
178 std::string challenge = tests[i].challenge; in TEST() local
181 challenge, HttpAuth::AUTH_SERVER, origin, BoundNetLog(), &basic); in TEST()
Dhttp_auth_handler_basic.cc25 bool HttpAuthHandlerBasic::Init(HttpAuth::ChallengeTokenizer* challenge) { in Init() argument
29 return ParseChallenge(challenge); in Init()
33 HttpAuth::ChallengeTokenizer* challenge) { in ParseChallenge() argument
35 if (!LowerCaseEqualsASCII(challenge->scheme(), "basic")) in ParseChallenge()
38 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); in ParseChallenge()
55 HttpAuth::ChallengeTokenizer* challenge) { in HandleAnotherChallenge() argument
59 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); in HandleAnotherChallenge()
94 HttpAuth::ChallengeTokenizer* challenge, in CreateAuthHandler() argument
104 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) in CreateAuthHandler()
Dhttp_auth_handler_factory.cc19 const std::string& challenge, in CreateAuthHandlerFromString() argument
24 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end()); in CreateAuthHandlerFromString()
30 const std::string& challenge, in CreatePreemptiveAuthHandlerFromString() argument
36 HttpAuth::ChallengeTokenizer props(challenge.begin(), challenge.end()); in CreatePreemptiveAuthHandlerFromString()
168 HttpAuth::ChallengeTokenizer* challenge, in CreateAuthHandler() argument
175 std::string scheme = challenge->scheme(); in CreateAuthHandler()
187 return it->second->CreateAuthHandler(challenge, target, origin, reason, in CreateAuthHandler()
Dhttp_auth_handler_digest.cc90 HttpAuth::ChallengeTokenizer* challenge, in CreateAuthHandler() argument
101 if (!tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) in CreateAuthHandler()
108 HttpAuth::ChallengeTokenizer* challenge) { in HandleAnotherChallenge() argument
113 if (!LowerCaseEqualsASCII(challenge->scheme(), "digest")) in HandleAnotherChallenge()
116 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); in HandleAnotherChallenge()
134 bool HttpAuthHandlerDigest::Init(HttpAuth::ChallengeTokenizer* challenge) { in Init() argument
135 return ParseChallenge(challenge); in Init()
192 HttpAuth::ChallengeTokenizer* challenge) { in ParseChallenge() argument
204 if (!LowerCaseEqualsASCII(challenge->scheme(), "digest")) in ParseChallenge()
207 HttpUtil::NameValuePairsIterator parameters = challenge->param_pairs(); in ParseChallenge()
Dhttp_auth_handler_basic.h25 virtual int CreateAuthHandler(HttpAuth::ChallengeTokenizer* challenge,
35 HttpAuth::ChallengeTokenizer* challenge);
38 virtual bool Init(HttpAuth::ChallengeTokenizer* challenge);
49 bool ParseChallenge(HttpAuth::ChallengeTokenizer* challenge);
Dhttp_auth_handler_ntlm_portable.cc322 const uint8* challenge, in LM_Response() argument
333 DESEncrypt(k1, challenge, response); in LM_Response()
334 DESEncrypt(k2, challenge, response + 8); in LM_Response()
335 DESEncrypt(k3, challenge, response + 16); in LM_Response()
383 uint8 challenge[8]; // 8 byte challenge member
433 memcpy(msg->challenge, cursor, sizeof(msg->challenge)); in ParseType2Msg()
434 cursor += sizeof(msg->challenge); in ParseType2Msg()
440 LogBuf("challenge", msg->challenge, sizeof(msg->challenge)); in ParseType2Msg()
568 memcpy(temp, msg.challenge, 8); in GenerateType3Msg()
576 LM_Response(ntlm_hash, msg.challenge, ntlm_resp); in GenerateType3Msg()
[all …]
/external/openssh/
Dauth-bsdauth.c55 char *challenge = NULL; in bsdauth_query() local
59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query()
60 if (challenge == NULL) { in bsdauth_query()
66 if (challenge == NULL) { in bsdauth_query()
71 authctxt->style, "auth-ssh", &challenge); in bsdauth_query()
73 challenge = NULL; in bsdauth_query()
74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
77 if (challenge == NULL) in bsdauth_query()
85 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
Dauth-rsa.c73 BIGNUM *challenge; in auth_rsa_generate_challenge() local
76 if ((challenge = BN_new()) == NULL) in auth_rsa_generate_challenge()
79 if (BN_rand(challenge, 256, 0, 0) == 0) in auth_rsa_generate_challenge()
83 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0) in auth_rsa_generate_challenge()
87 return challenge; in auth_rsa_generate_challenge()
91 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) in auth_rsa_verify_response() argument
105 len = BN_num_bytes(challenge); in auth_rsa_verify_response()
109 BN_bn2bin(challenge, buf + 32 - len); in auth_rsa_verify_response()
133 BIGNUM *challenge, *encrypted_challenge; in auth_rsa_challenge_dialog() local
140 challenge = PRIVSEP(auth_rsa_generate_challenge(key)); in auth_rsa_challenge_dialog()
[all …]
Dsshconnect1.c71 BIGNUM *challenge; in try_agent_authentication() local
78 if ((challenge = BN_new()) == NULL) in try_agent_authentication()
110 packet_get_bignum(challenge); in try_agent_authentication()
116 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) { in try_agent_authentication()
141 BN_clear_free(challenge); in try_agent_authentication()
151 BN_clear_free(challenge); in try_agent_authentication()
161 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) in respond_to_rsa_challenge() argument
169 if (rsa_private_decrypt(challenge, challenge, prv) <= 0) in respond_to_rsa_challenge()
175 len = BN_num_bytes(challenge); in respond_to_rsa_challenge()
181 BN_bn2bin(challenge, buf + sizeof(buf) - len); in respond_to_rsa_challenge()
[all …]
Dauth-skey.c56 char challenge[1024]; in skey_query() local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, in skey_query()
60 sizeof(challenge)) == -1) in skey_query()
69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT); in skey_query()
/external/wpa_supplicant_8/src/crypto/
Dms_funcs.c82 u8 *challenge) in challenge_hash() argument
97 os_memcpy(challenge, hash, 8); in challenge_hash()
144 void challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response() argument
148 des_encrypt(challenge, password_hash, response); in challenge_response()
149 des_encrypt(challenge, password_hash + 7, response + 8); in challenge_response()
153 des_encrypt(challenge, zpwd, response + 16); in challenge_response()
173 u8 challenge[8]; in generate_nt_response() local
177 username_len, challenge)) in generate_nt_response()
181 challenge_response(challenge, password_hash, response); in generate_nt_response()
202 u8 challenge[8]; in generate_nt_response_pwhash() local
[all …]
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/
D__init__.py463 challenge = _parse_www_authenticate(response, 'www-authenticate')
464 self.challenge = challenge['digest']
465 qop = self.challenge.get('qop', 'auth')
466 self.challenge['qop'] = ('auth' in [x.strip() for x in qop.split()]) and 'auth' or None
467 if self.challenge['qop'] is None:
469 self.challenge['algorithm'] = self.challenge.get('algorithm', 'MD5').upper()
470 if self.challenge['algorithm'] != 'MD5':
471 …ntedDigestAuthOptionError( _("Unsupported value for algorithm: %s." % self.challenge['algorithm']))
472 …self.A1 = "".join([self.credentials[0], ":", self.challenge['realm'], ":", self.credentials[1]])
473 self.challenge['nc'] = 1
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
DNetscapeCertRequest.java51 String challenge; field in NetscapeCertRequest
107 challenge = ((DERIA5String)pkac.getObjectAt(1)).getString(); in NetscapeCertRequest()
131 String challenge, in NetscapeCertRequest() argument
137 this.challenge = challenge; in NetscapeCertRequest()
144 content_der.add(new DERIA5String(challenge)); in NetscapeCertRequest()
158 return challenge; in getChallenge()
163 challenge = value; in setChallenge()
196 public boolean verify(String challenge) throws NoSuchAlgorithmException, in verify() argument
199 if (!challenge.equals(this.challenge)) in verify()
243 pkac.add(new DERIA5String(challenge)); in sign()
[all …]
/external/ppp/pppd/
Dchap_ms.c169 chapms_generate_challenge(unsigned char *challenge) in chapms_generate_challenge() argument
171 *challenge++ = 8; in chapms_generate_challenge()
174 memcpy(challenge, mschap_challenge, 8); in chapms_generate_challenge()
177 random_bytes(challenge, 8); in chapms_generate_challenge()
181 chapms2_generate_challenge(unsigned char *challenge) in chapms2_generate_challenge() argument
183 *challenge++ = 16; in chapms2_generate_challenge()
186 memcpy(challenge, mschap_challenge, 16); in chapms2_generate_challenge()
189 random_bytes(challenge, 16); in chapms2_generate_challenge()
195 unsigned char *challenge, unsigned char *response, in chapms_verify_response() argument
203 challenge_len = *challenge++; /* skip length, is 8 */ in chapms_verify_response()
[all …]
Dchap-md5.c59 unsigned char *challenge, unsigned char *response, in chap_md5_verify_response() argument
67 challenge_len = *challenge++; in chap_md5_verify_response()
74 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_verify_response()
89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument
94 int challenge_len = *challenge++; in chap_md5_make_response()
99 MD5_Update(&ctx, challenge, challenge_len); in chap_md5_make_response()
/external/webkit/Source/WebKit/win/
DWebURLAuthenticationChallengeSenderCFNet.cpp42 /* [in] */ IWebURLAuthenticationChallenge* challenge) in cancelAuthenticationChallenge() argument
44 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); in cancelAuthenticationChallenge()
53 /* [in] */ IWebURLAuthenticationChallenge* challenge) in continueWithoutCredentialForAuthenticationChallenge() argument
55 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); in continueWithoutCredentialForAuthenticationChallenge()
65 /* [in] */ IWebURLAuthenticationChallenge* challenge) in useCredential() argument
67 COMPtr<WebURLAuthenticationChallenge> webChallenge(Query, challenge); in useCredential()
/external/webkit/Source/WebCore/platform/network/cf/
DResourceHandleCFNet.cpp277 void didReceiveChallenge(CFURLConnectionRef conn, CFURLAuthChallengeRef challenge, const void* clie… in didReceiveChallenge() argument
283 handle->didReceiveAuthenticationChallenge(AuthenticationChallenge(challenge, handle)); in didReceiveChallenge()
506 void ResourceHandle::didReceiveAuthenticationChallenge(const AuthenticationChallenge& challenge) in didReceiveAuthenticationChallenge() argument
512 ASSERT(challenge.cfURLAuthChallengeRef()); in didReceiveAuthenticationChallenge()
513 ASSERT(challenge.authenticationClient() == this); // Should be already set. in didReceiveAuthenticationChallenge()
522 if (challenge.failureResponse().httpStatusCode() == 401) in didReceiveAuthenticationChallenge()
524 CredentialStorage::set(core(credential.get()), challenge.protectionSpace(), urlToStore); in didReceiveAuthenticationChallenge()
526 …CFURLConnectionUseCredential(d->m_connection.get(), credential.get(), challenge.cfURLAuthChallenge… in didReceiveAuthenticationChallenge()
534 if (!d->m_initialCredential.isEmpty() || challenge.previousFailureCount()) { in didReceiveAuthenticationChallenge()
538 CredentialStorage::remove(challenge.protectionSpace()); in didReceiveAuthenticationChallenge()
[all …]
/external/apache-http/src/org/apache/http/impl/auth/
DNTLMScheme.java59 private String challenge; field in NTLMScheme
68 this.challenge = null; in NTLMScheme()
92 String challenge = buffer.substringTrimmed(pos, len); in parseChallenge() local
93 if (challenge.length() == 0) { in parseChallenge()
99 this.challenge = null; in parseChallenge()
102 this.challenge = challenge; in parseChallenge()
129 this.challenge); in authenticate()
/external/chromium/net/websockets/
Dwebsocket_handshake_handler.cc108 void GetKeyNumber(const std::string& key, std::string* challenge) { in GetKeyNumber() argument
130 challenge->append(part, 4); in GetKeyNumber()
190 const GURL& url, std::string* challenge) { in GetRequestInfo() argument
205 challenge->clear(); in GetRequestInfo()
209 GetKeyNumber(key, challenge); in GetRequestInfo()
213 GetKeyNumber(key, challenge); in GetRequestInfo()
215 challenge->append(key3_); in GetRequestInfo()
221 const GURL& url, spdy::SpdyHeaderBlock* headers, std::string* challenge) { in GetRequestHeaderBlock() argument
261 challenge->clear(); in GetRequestHeaderBlock()
262 GetKeyNumber(key1, challenge); in GetRequestHeaderBlock()
[all …]
Dwebsocket_handshake_handler_unittest.cc198 std::string challenge; in TEST() local
200 request_handler.GetRequestInfo(url, &challenge); in TEST()
219 EXPECT_EQ(expected_challenge, challenge); in TEST()
245 EXPECT_TRUE(response_handler.ParseResponseInfo(response_info, challenge)); in TEST()
282 std::string challenge; in TEST() local
284 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, &headers, &challenge)); in TEST()
304 EXPECT_EQ(expected_challenge, challenge); in TEST()
313 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers, challenge)); in TEST()
352 std::string challenge; in TEST() local
354 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, &headers, &challenge)); in TEST()
[all …]
/external/libppp/src/
Dchap.c125 chap_BuildAnswer(char *name, char *key, u_char id, char *challenge in chap_BuildAnswer() argument
152 mschap_LANMan(digest, challenge + 1, key); /* LANMan response */ in chap_BuildAnswer()
175 mschap_NT(digest, challenge + 1); in chap_BuildAnswer()
215 GenerateNTResponse(challenge + 1, peerchallenge + 1, name, in chap_BuildAnswer()
223 peerchallenge + 1, challenge + 1, name, in chap_BuildAnswer()
241 MD5Update(&MD5context, challenge + 1, *challenge); in chap_BuildAnswer()
332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer); in chap_StartChild()
361 *chap->challenge.local = *chap->challenge.peer = '\0'; in chap_Cleanup()
376 ans = chap_BuildAnswer(name, key, chap->auth.id, chap->challenge.peer in chap_Respond()
378 , type, chap->challenge.local, chap->authresponse, lm in chap_Respond()
[all …]

12345678910