/forgerock/openam/openam-push-notification/src/main/java/org/forgerock/openam/services/push/utils/ |
H A D | HS256Helper.java | 29 * over a supplied challenge using a provided secret. 34 private String challenge; field in class:HS256Helper 42 * @param challenge The challenge to apply the algorithm to. 44 public HS256Helper(byte[] secret, String challenge) { argument 46 this.challenge = challenge; 63 this.result = hmac.doFinal(Base64.decode(challenge)); 71 * Returns the result of the HS256 algorithm over the challenge using the secret. Returns null if no valid answer 85 * Returns the result of the HS256 algorithm over the challenge usin 106 setChallenge(String challenge) argument [all...] |
/forgerock/openam-v13/openam-authentication/openam-auth-radius/src/main/java/com/sun/identity/authentication/modules/radius/client/ |
H A D | ChallengeException.java | 42 * Used for handling received challenge responses from radius servers. 48 private final AccessChallenge challenge; field in class:ChallengeException 56 challenge = res; 65 return challenge.getAttributeSet(); 74 return ((StateAttribute) (challenge.getAttributeSet(). 84 ReplyMessageAttribute a = ((ReplyMessageAttribute) (challenge.getAttributeSet().
|
/forgerock/openam/openam-authentication/openam-auth-radius/src/main/java/com/sun/identity/authentication/modules/radius/client/ |
H A D | ChallengeException.java | 42 * Used for handling received challenge responses from radius servers. 48 private final AccessChallenge challenge; field in class:ChallengeException 56 challenge = res; 65 return challenge.getAttributeSet(); 74 return ((StateAttribute) (challenge.getAttributeSet(). 84 ReplyMessageAttribute a = ((ReplyMessageAttribute) (challenge.getAttributeSet().
|
/forgerock/openam/openam-push-notification/src/test/java/org/forgerock/openam/services/push/utils/ |
H A D | HS256HelperTest.java | 40 String challenge = "challenge"; 41 String response = figureResponse(secretBytes, challenge); 44 HS256Helper helper = new HS256Helper(secretBytes, challenge); 56 String challenge = "challenge"; 59 HS256Helper helper = new HS256Helper(secretBytes, challenge); 72 String challenge = null; 75 HS256Helper helper = new HS256Helper(secretBytes, challenge); 83 private String figureResponse(byte[] secret, String challenge) { argument [all...] |
/forgerock/authenticator-ios-v2/ForgeRock-Authenticator/ |
H A D | FRANotification.m | 37 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie pending:(BOOL)pendingState approved:(BOOL)approvedState { 44 _challenge = challenge; 53 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie{ 54 return [self initWithDatabase:database identityModel:identityModel messageId:messageId challenge:challenge timeReceived:timeReceived timeToLive:timeToLive loadBalancerCookieData:loadBalancerCookie pending:YES approved:NO]; 57 + (instancetype)notificationWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie pending:(BOOL)pendingState approved:(BOOL)approvedState{ 58 return [[FRANotification alloc] initWithDatabase:database identityModel:identityModel messageId:messageId challenge [all...] |
H A D | FRANotification.h | 79 * The push challenge. 81 @property (nonatomic, readonly) NSString *challenge; variable 97 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie pending:(BOOL)pendingState approved:(BOOL)approvedState; 102 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie; 107 + (instancetype)notificationWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie pending:(BOOL)pendingState approved:(BOOL)approvedState; 112 + (instancetype)notificationWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceive [all...] |
H A D | FRAMessageUtils.h | 61 * Generate challenge response. 63 * @param challenge The challenge. 65 * @return The challenge response. 67 + (NSString *) generateChallengeResponse:(NSString *) challenge secret:(NSString *) secret;
|
H A D | FRAPushMechanismFactory.m | 92 NSString *challenge = [FRAQRUtils replaceCharactersForURLDecoding:[query objectForKey:REGISTRATION_CHALLENGE_QR_KEY]]; 98 if (![self isValidSecret:secret] || ![self isValid:regEndpoint] || ![self isValid:authEndpoint] || ![self isValid:messageId] || ![self isValid:challenge] || ![self isValid:issuer]) { 110 [self registerMechanismWithEndpoint:regEndpoint secret:secret challenge:challenge messageId:messageId mechanismUid:mechanism.mechanismUID identity:identity mechanism:mechanism identityModel:identityModel loadBalancerCookieData:loadBalancer handler:handler]; 203 - (void)registerMechanismWithEndpoint:(NSString *)regEndpoint secret:(NSString *)secret challenge:(NSString *)challenge messageId:(NSString *)messageId mechanismUid:(NSString *)uid identity:(FRAIdentity *)identity mechanism:(FRAMechanism *)mechanism identityModel:(FRAIdentityModel *)identityModel loadBalancerCookieData:(NSString *)loadBalancerCookieData handler:(void(^)(BOOL, NSError *))handler { 209 data:@{@"response":[FRAMessageUtils generateChallengeResponse:challenge secret:secret],
|
H A D | FRAMessageUtils.m | 116 + (NSString *)generateChallengeResponse:(NSString *)challenge secret:(NSString *)secret { 119 NSData *paramData = [FRAQRUtils decodeBase64:challenge];
|
H A D | FRAModelsFromDatabase.m | 267 NSString *challenge = [[NSString alloc] initWithData:[FRASerialization deserializeBytes:[dataMap valueForKey:NOTIFICATION_PUSH_CHALLENGE]] encoding:NSUTF8StringEncoding]; 275 challenge:challenge
|
/forgerock/openam-v13/openam-radius/openam-radius-common/src/main/java/org/forgerock/openam/radius/common/packet/ |
H A D | CHAPChallengeAttribute.java | 63 * @param challenge The CHAP challenge value. 65 public CHAPChallengeAttribute(String challenge) { argument 66 super(OctetUtils.toOctets(AttributeType.CHAP_CHALLENGE, challenge));
|
/forgerock/openam/openam-radius/openam-radius-common/src/main/java/org/forgerock/openam/radius/common/packet/ |
H A D | CHAPChallengeAttribute.java | 63 * @param challenge The CHAP challenge value. 65 public CHAPChallengeAttribute(String challenge) { argument 66 super(OctetUtils.toOctets(AttributeType.CHAP_CHALLENGE, challenge));
|
/forgerock/openam/openam-push-notification/src/main/java/org/forgerock/openam/services/push/dispatch/ |
H A D | PushMessageChallengeResponsePredicate.java | 31 * contents is the correct response to the challenge (HmacSHA-256 encoded version 32 * of the challenge sent out). 41 * location of the JsonPointer location is equal to a predicted challenge response value. 44 * @param challenge Random challenge. 45 * @param location Json Pointer string of the location of the value expected to the the challenge response. 47 public PushMessageChallengeResponsePredicate(byte[] secret, String challenge, String location) { argument 48 Reject.ifNull(secret, challenge, location); 50 this.answer = new HS256Helper(secret, challenge).answerAsString();
|
/forgerock/authenticator-android-v2/app/src/main/java/com/forgerock/authenticator/notifications/ |
H A D | PushNotification.java | 50 private static final String CHALLENGE_KEY = "challenge"; 114 byte[] challenge; 116 challenge = Base64.decode(base64Challenge); 124 logger.error("Failed to generate challenge-response", e); 126 byte[] output = hmac.doFinal(challenge); 157 * Set the challenge that was sent with this notification. 158 * @param challenge The base64 encoded challenge. 160 public PushNotificationBuilder setChallenge(String challenge) { argument 161 this.base64Challenge = challenge; [all...] |
/forgerock/authenticator-ios-v2/unit-tests/ |
H A D | FRANotificationTest.m | 50 notification = [[FRANotification alloc] initWithDatabase:database identityModel:mockIdentityModel messageId:@"messageId" challenge:@"challenge" timeReceived:[NSDate date] timeToLive:timeToLive loadBalancerCookieData:@"amlbcookie=03"]; 80 FRANotification *expiringNotification = [[FRANotification alloc] initWithDatabase:database identityModel:mockIdentityModel messageId:@"messageId" challenge:@"challenge" timeReceived:timeReceived timeToLive:timeToLive loadBalancerCookieData:@"amlbcookie=03"]; 107 data:@{@"response":[FRAMessageUtils generateChallengeResponse:@"challenge" 134 @"response":[FRAMessageUtils generateChallengeResponse:@"challenge" secret:@"secret"], 160 data:@{@"response":[FRAMessageUtils generateChallengeResponse:@"challenge" 196 data:@{@"response":[FRAMessageUtils generateChallengeResponse:@"challenge" 210 FRANotification *expiredNotification = [[FRANotification alloc] initWithDatabase:database identityModel:mockIdentityModel messageId:@"messageId" challenge:@"challenge" timeReceive [all...] |
H A D | FRANotificationHandlerTest.m | 96 XCTAssertEqualObjects(notification.challenge, CHALLENGE, @"Notification not initialized with challenge");
|
/forgerock/opendj-b2.6/src/server/org/opends/server/extensions/ |
H A D | CRAMMD5SASLMechanismHandler.java | 100 // challenge. 186 // challenge to the client. 193 // challenge and store it in the client connection so we can verify the 205 ByteString challenge = 207 clientConnection.setSASLAuthStateInfo(challenge); 208 bindOperation.setServerSASLCredentials(challenge); 237 ByteString challenge = (ByteString) saslStateInfo; 239 // Wipe out the stored challenge so it can't be used again. 458 // in conjunction with the challenge to construct the provided digest. 462 byte[] generatedDigest = generateDigest(clearPassword, challenge); 504 generateDigest(ByteString password, ByteString challenge) argument [all...] |
/forgerock/opendj2/src/server/org/opends/server/extensions/ |
H A D | CRAMMD5SASLMechanismHandler.java | 99 // challenge. 185 // challenge to the client. 192 // challenge and store it in the client connection so we can verify the 204 ByteString challenge = 206 clientConnection.setSASLAuthStateInfo(challenge); 207 bindOperation.setServerSASLCredentials(challenge); 236 ByteString challenge = (ByteString) saslStateInfo; 238 // Wipe out the stored challenge so it can't be used again. 457 // in conjunction with the challenge to construct the provided digest. 461 byte[] generatedDigest = generateDigest(clearPassword, challenge); 500 generateDigest(ByteString password, ByteString challenge) argument [all...] |
/forgerock/opendj2.6.2/src/server/org/opends/server/extensions/ |
H A D | CRAMMD5SASLMechanismHandler.java | 100 // challenge. 186 // challenge to the client. 193 // challenge and store it in the client connection so we can verify the 205 ByteString challenge = 207 clientConnection.setSASLAuthStateInfo(challenge); 208 bindOperation.setServerSASLCredentials(challenge); 237 ByteString challenge = (ByteString) saslStateInfo; 239 // Wipe out the stored challenge so it can't be used again. 458 // in conjunction with the challenge to construct the provided digest. 462 byte[] generatedDigest = generateDigest(clearPassword, challenge); 501 generateDigest(ByteString password, ByteString challenge) argument [all...] |
/forgerock/opendj2-jel-hg/src/server/org/opends/server/extensions/ |
H A D | CRAMMD5SASLMechanismHandler.java | 100 // challenge. 186 // challenge to the client. 193 // challenge and store it in the client connection so we can verify the 205 ByteString challenge = 207 clientConnection.setSASLAuthStateInfo(challenge); 208 bindOperation.setServerSASLCredentials(challenge); 237 ByteString challenge = (ByteString) saslStateInfo; 239 // Wipe out the stored challenge so it can't be used again. 458 // in conjunction with the challenge to construct the provided digest. 462 byte[] generatedDigest = generateDigest(clearPassword, challenge); 504 generateDigest(ByteString password, ByteString challenge) argument [all...] |
/forgerock/opendj2-hg/src/server/org/opends/server/extensions/ |
H A D | CRAMMD5SASLMechanismHandler.java | 99 // challenge. 185 // challenge to the client. 192 // challenge and store it in the client connection so we can verify the 204 ByteString challenge = 206 clientConnection.setSASLAuthStateInfo(challenge); 207 bindOperation.setServerSASLCredentials(challenge); 236 ByteString challenge = (ByteString) saslStateInfo; 238 // Wipe out the stored challenge so it can't be used again. 457 // in conjunction with the challenge to construct the provided digest. 461 byte[] generatedDigest = generateDigest(clearPassword, challenge); 500 generateDigest(ByteString password, ByteString challenge) argument [all...] |
/forgerock/opendj-v3/opendj-server-legacy/src/main/java/org/opends/server/extensions/ |
H A D | CRAMMD5SASLMechanismHandler.java | 94 * The random number generator that we will use to create the server challenge. 172 // challenge to the client. 179 // challenge and store it in the client connection so we can verify the 191 final ByteString challenge = ByteString.valueOfUtf8(challengeString); 192 clientConnection.setSASLAuthStateInfo(challenge); 193 bindOperation.setServerSASLCredentials(challenge); 222 ByteString challenge = (ByteString) saslStateInfo; 224 // Wipe out the stored challenge so it can't be used again. 411 // in conjunction with the challenge to construct the provided digest. 415 byte[] generatedDigest = generateDigest(clearPassword, challenge); 454 generateDigest(ByteString password, ByteString challenge) argument [all...] |
/forgerock/openam/openam-authentication/openam-auth-push/src/main/java/org/forgerock/openam/authentication/modules/push/registration/ |
H A D | AuthenticatorPushRegistration.java | 245 String challenge = userPushDeviceProfileManager.createRandomBytes(SECRET_BYTE_LENGTH); 247 paintRegisterDeviceCallback(amIdentityPrincipal, messageId, challenge); 254 servicePredicates.add(new PushMessageChallengeResponsePredicate(secret, challenge, JWT)); 365 private void paintRegisterDeviceCallback(AMIdentity id, String messageId, String challenge) argument 371 challenge)); 375 int callbackIndex, String challenge) throws AuthLoginException { 389 .addUriQueryComponent(CHALLENGE_QR_CODE_KEY, Base64url.encode(Base64.decode(challenge))) 374 createQRCodeCallback(PushDeviceSettings deviceProfile, AMIdentity id, String messageId, int callbackIndex, String challenge) argument
|
/forgerock/openam-v13/openam-federation/OpenFM/src/main/java/com/sun/identity/liberty/ws/authnsvc/mechanism/ |
H A D | CramMD5MechanismHandler.java | 187 byte[] challenge = generateChallenge(); 192 challengeMap.put(respMessageID, challenge); 193 saslResp.setData(challenge); 260 "CramMD5MechanismHandler.authenticate: no challenge found");
|
/forgerock/openam/openam-authentication/openam-auth-push/src/main/java/org/forgerock/openam/authentication/modules/push/ |
H A D | AuthenticatorPush.java | 329 String challenge = userPushDeviceProfileManager.createRandomBytes(SECRET_BYTE_LENGTH); 334 .claim(CHALLENGE_KEY, challenge) 352 new PushMessageChallengeResponsePredicate(Base64.decode(device.getSharedSecret()), challenge, JWT));
|