/openjdk7/jdk/src/share/classes/javax/security/sasl/ |
H A D | SaslClient.java | 81 * challenge and to get initial response. 86 * When the server responds to the command, it sends an initial challenge. 88 * have issued a challenge with no data. This will then result in a call 89 * (on the client) to <tt>evaluateChallenge()</tt> with an empty challenge. 118 * Evaluates the challenge data and generates a response. 119 * If a challenge is received from the server during the authentication 123 * @param challenge The non-null challenge sent from the server. 124 * The challenge array may have zero length. 127 * It is null if the challenge accompanie 134 evaluateChallenge(byte[] challenge) argument [all...] |
/openjdk7/jdk/test/com/sun/security/sasl/ |
H A D | Cram.java | 92 byte[] challenge; 95 challenge = srv.evaluateResponse(response); 97 if (challenge != null) { 98 response = clnt.evaluateChallenge(challenge);
|
/openjdk7/jdk/test/com/sun/security/sasl/digest/ |
H A D | AuthNoUtf8.java | 108 byte[] challenge; 111 challenge = srv.evaluateResponse(response); 113 if (challenge != null) { 114 response = clnt.evaluateChallenge(challenge);
|
H A D | AuthOnly.java | 101 byte[] challenge; 104 challenge = srv.evaluateResponse(response); 106 if (challenge != null) { 107 response = clnt.evaluateChallenge(challenge);
|
H A D | AuthRealms.java | 109 byte[] challenge; 112 challenge = srv.evaluateResponse(response); 114 if (challenge != null) { 115 response = clnt.evaluateChallenge(challenge);
|
H A D | NoQuoteParams.java | 50 * According to RFC 2831, DIGEST-MD5 servers must generate challenge strings 53 * challenge: realm="127.0.0.1",nonce="8GBOabRGeIqZB5BiaYJ1NDTuteV+D7n+qbSTH1fo",qop="auth",charset=utf-8,algorithm=md5-sess 82 byte[] challenge = null; 91 challenge = server.evaluateResponse(response); 93 logger.info("challenge: " + new String(challenge)); 95 if (challenge != null) { 96 response = client.evaluateChallenge(challenge); 100 String challengeString = new String(challenge, "UTF-8").toLowerCase(); 104 throw new Exception("The challenge strin [all...] |
H A D | Integrity.java | 115 byte[] challenge; 118 challenge = srv.evaluateResponse(response); 120 if (challenge != null) { 121 response = clnt.evaluateChallenge(challenge);
|
H A D | Privacy.java | 115 byte[] challenge; 118 challenge = srv.evaluateResponse(response); 120 if (challenge != null) { 121 response = clnt.evaluateChallenge(challenge);
|
H A D | PrivacyRc4.java | 117 byte[] challenge; 120 challenge = srv.evaluateResponse(response); 122 if (challenge != null) { 123 response = clnt.evaluateChallenge(challenge);
|
H A D | CheckNegotiatedQOPs.java | 190 byte[] challenge; 197 challenge = server.evaluate(response); 198 response = saslClient.evaluateChallenge(challenge);
|
/openjdk7/jdk/src/share/classes/com/sun/security/ntlm/ |
H A D | Client.java | 133 byte[] challenge = r.readBytes(24, 8); 155 if (writeLM) lm = calcResponse (lmhash, challenge); 156 if (writeNTLM) ntlm = calcResponse (nthash, challenge); 160 ntlm = ntlm2NTLM(nthash, nonce, challenge); 164 username.toUpperCase(Locale.US)+domain, nonce, challenge); 184 blob, challenge);
|
H A D | NTLM.java | 379 byte[] calcV2(byte[] nthash, String text, byte[] blob, byte[] challenge) { argument 384 System.arraycopy(challenge, 0, cn, 0, 8); 402 byte[] ntlm2NTLM(byte[] ntlmHash, byte[] nonce, byte[] challenge) { argument 403 byte[] b = Arrays.copyOf(challenge, 16);
|
/openjdk7/jdk/test/com/sun/security/sasl/gsskerb/ |
H A D | AuthOnly.java | 115 byte[] challenge; 125 challenge = (byte[]) Subject.doAs(srvSubj, 131 if (challenge != null) { 132 final byte[] challengeCopy = challenge;
|
H A D | NoSecurityLayer.java | 116 byte[] challenge; 126 challenge = (byte[]) Subject.doAs(srvSubj, 132 if (challenge != null) { 133 final byte[] challengeCopy = challenge;
|
H A D | ConfSecurityLayer.java | 116 byte[] challenge; 126 challenge = (byte[]) Subject.doAs(srvSubj, 132 if (challenge != null) { 133 final byte[] challengeCopy = challenge;
|
/openjdk7/jdk/src/share/classes/com/sun/security/sasl/digest/ |
H A D | DigestMD5Server.java | 194 byte[] challenge; 202 /* Generate first challenge */ 222 challenge = generateChallenge(serverRealms, specifiedQops, 226 return challenge; 229 "DIGEST-MD5: Error encoding challenge", e); 232 "DIGEST-MD5: Error generating challenge", e); 238 /* Validates client's response and generate challenge: 244 challenge = validateClientResponse(responseVal); 263 return challenge; 272 * Generates challenge t [all...] |
/openjdk7/jdk/src/share/classes/com/sun/security/sasl/ntlm/ |
H A D | NTLMClient.java | 220 public byte[] evaluateChallenge(byte[] challenge) throws SaslException { argument 228 return client.type3(challenge, nonce);
|
/openjdk7/jdk/src/solaris/classes/sun/net/www/protocol/http/ntlm/ |
H A D | NTLMAuthentication.java | 237 private String buildType3Msg (String challenge) throws GeneralSecurityException, argument 242 byte[] type2 = (new sun.misc.BASE64Decoder()).decodeBuffer (challenge);
|
/openjdk7/jdk/test/com/sun/security/sasl/ntlm/ |
H A D | NTLMTest.java | 371 byte[] challenge; 374 challenge = srv.evaluateResponse(response); 376 if (challenge != null) { 378 new sun.misc.HexDumpEncoder().encodeBuffer(challenge, System.out); 379 response = clnt.evaluateChallenge(challenge);
|