Searched refs:challenge (Results 1 - 25 of 57) sorted by relevance

123

/forgerock/openam/openam-push-notification/src/main/java/org/forgerock/openam/services/push/utils/
H A DHS256Helper.java29 * over a supplied challenge using a provided secret.
34 private String challenge; field in class:HS256Helper
42 * @param challenge The challenge to apply the algorithm to.
44 public HS256Helper(byte[] secret, String challenge) { argument
46 this.challenge = challenge;
63 this.result = hmac.doFinal(Base64.decode(challenge));
71 * Returns the result of the HS256 algorithm over the challenge using the secret. Returns null if no valid answer
85 * Returns the result of the HS256 algorithm over the challenge usin
106 setChallenge(String challenge) argument
[all...]
/forgerock/openam-v13/openam-authentication/openam-auth-radius/src/main/java/com/sun/identity/authentication/modules/radius/client/
H A DChallengeException.java42 * Used for handling received challenge responses from radius servers.
48 private final AccessChallenge challenge; field in class:ChallengeException
56 challenge = res;
65 return challenge.getAttributeSet();
74 return ((StateAttribute) (challenge.getAttributeSet().
84 ReplyMessageAttribute a = ((ReplyMessageAttribute) (challenge.getAttributeSet().
/forgerock/openam/openam-authentication/openam-auth-radius/src/main/java/com/sun/identity/authentication/modules/radius/client/
H A DChallengeException.java42 * Used for handling received challenge responses from radius servers.
48 private final AccessChallenge challenge; field in class:ChallengeException
56 challenge = res;
65 return challenge.getAttributeSet();
74 return ((StateAttribute) (challenge.getAttributeSet().
84 ReplyMessageAttribute a = ((ReplyMessageAttribute) (challenge.getAttributeSet().
/forgerock/openam/openam-push-notification/src/test/java/org/forgerock/openam/services/push/utils/
H A DHS256HelperTest.java40 String challenge = "challenge";
41 String response = figureResponse(secretBytes, challenge);
44 HS256Helper helper = new HS256Helper(secretBytes, challenge);
56 String challenge = "challenge";
59 HS256Helper helper = new HS256Helper(secretBytes, challenge);
72 String challenge = null;
75 HS256Helper helper = new HS256Helper(secretBytes, challenge);
83 private String figureResponse(byte[] secret, String challenge) { argument
[all...]
/forgerock/authenticator-ios-v2/ForgeRock-Authenticator/
H A DFRANotification.m37 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie pending:(BOOL)pendingState approved:(BOOL)approvedState {
44 _challenge = challenge;
53 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie{
54 return [self initWithDatabase:database identityModel:identityModel messageId:messageId challenge:challenge timeReceived:timeReceived timeToLive:timeToLive loadBalancerCookieData:loadBalancerCookie pending:YES approved:NO];
57 + (instancetype)notificationWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie pending:(BOOL)pendingState approved:(BOOL)approvedState{
58 return [[FRANotification alloc] initWithDatabase:database identityModel:identityModel messageId:messageId challenge
[all...]
H A DFRANotification.h79 * The push challenge.
81 @property (nonatomic, readonly) NSString *challenge; variable
97 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie pending:(BOOL)pendingState approved:(BOOL)approvedState;
102 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie;
107 + (instancetype)notificationWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceived:(NSDate *)timeReceived timeToLive:(NSTimeInterval)timeToLive loadBalancerCookieData:(NSString *)loadBalancerCookie pending:(BOOL)pendingState approved:(BOOL)approvedState;
112 + (instancetype)notificationWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel messageId:(NSString *)messageId challenge:(NSString *)challenge timeReceive
[all...]
H A DFRAMessageUtils.h61 * Generate challenge response.
63 * @param challenge The challenge.
65 * @return The challenge response.
67 + (NSString *) generateChallengeResponse:(NSString *) challenge secret:(NSString *) secret;
H A DFRAPushMechanismFactory.m92 NSString *challenge = [FRAQRUtils replaceCharactersForURLDecoding:[query objectForKey:REGISTRATION_CHALLENGE_QR_KEY]];
98 if (![self isValidSecret:secret] || ![self isValid:regEndpoint] || ![self isValid:authEndpoint] || ![self isValid:messageId] || ![self isValid:challenge] || ![self isValid:issuer]) {
110 [self registerMechanismWithEndpoint:regEndpoint secret:secret challenge:challenge messageId:messageId mechanismUid:mechanism.mechanismUID identity:identity mechanism:mechanism identityModel:identityModel loadBalancerCookieData:loadBalancer handler:handler];
203 - (void)registerMechanismWithEndpoint:(NSString *)regEndpoint secret:(NSString *)secret challenge:(NSString *)challenge messageId:(NSString *)messageId mechanismUid:(NSString *)uid identity:(FRAIdentity *)identity mechanism:(FRAMechanism *)mechanism identityModel:(FRAIdentityModel *)identityModel loadBalancerCookieData:(NSString *)loadBalancerCookieData handler:(void(^)(BOOL, NSError *))handler {
209 data:@{@"response":[FRAMessageUtils generateChallengeResponse:challenge secret:secret],
H A DFRAMessageUtils.m116 + (NSString *)generateChallengeResponse:(NSString *)challenge secret:(NSString *)secret {
119 NSData *paramData = [FRAQRUtils decodeBase64:challenge];
H A DFRAModelsFromDatabase.m267 NSString *challenge = [[NSString alloc] initWithData:[FRASerialization deserializeBytes:[dataMap valueForKey:NOTIFICATION_PUSH_CHALLENGE]] encoding:NSUTF8StringEncoding];
275 challenge:challenge
/forgerock/openam-v13/openam-radius/openam-radius-common/src/main/java/org/forgerock/openam/radius/common/packet/
H A DCHAPChallengeAttribute.java63 * @param challenge The CHAP challenge value.
65 public CHAPChallengeAttribute(String challenge) { argument
66 super(OctetUtils.toOctets(AttributeType.CHAP_CHALLENGE, challenge));
/forgerock/openam/openam-radius/openam-radius-common/src/main/java/org/forgerock/openam/radius/common/packet/
H A DCHAPChallengeAttribute.java63 * @param challenge The CHAP challenge value.
65 public CHAPChallengeAttribute(String challenge) { argument
66 super(OctetUtils.toOctets(AttributeType.CHAP_CHALLENGE, challenge));
/forgerock/openam/openam-push-notification/src/main/java/org/forgerock/openam/services/push/dispatch/
H A DPushMessageChallengeResponsePredicate.java31 * contents is the correct response to the challenge (HmacSHA-256 encoded version
32 * of the challenge sent out).
41 * location of the JsonPointer location is equal to a predicted challenge response value.
44 * @param challenge Random challenge.
45 * @param location Json Pointer string of the location of the value expected to the the challenge response.
47 public PushMessageChallengeResponsePredicate(byte[] secret, String challenge, String location) { argument
48 Reject.ifNull(secret, challenge, location);
50 this.answer = new HS256Helper(secret, challenge).answerAsString();
/forgerock/authenticator-android-v2/app/src/main/java/com/forgerock/authenticator/notifications/
H A DPushNotification.java50 private static final String CHALLENGE_KEY = "challenge";
114 byte[] challenge;
116 challenge = Base64.decode(base64Challenge);
124 logger.error("Failed to generate challenge-response", e);
126 byte[] output = hmac.doFinal(challenge);
157 * Set the challenge that was sent with this notification.
158 * @param challenge The base64 encoded challenge.
160 public PushNotificationBuilder setChallenge(String challenge) { argument
161 this.base64Challenge = challenge;
[all...]
/forgerock/authenticator-ios-v2/unit-tests/
H A DFRANotificationTest.m50 notification = [[FRANotification alloc] initWithDatabase:database identityModel:mockIdentityModel messageId:@"messageId" challenge:@"challenge" timeReceived:[NSDate date] timeToLive:timeToLive loadBalancerCookieData:@"amlbcookie=03"];
80 FRANotification *expiringNotification = [[FRANotification alloc] initWithDatabase:database identityModel:mockIdentityModel messageId:@"messageId" challenge:@"challenge" timeReceived:timeReceived timeToLive:timeToLive loadBalancerCookieData:@"amlbcookie=03"];
107 data:@{@"response":[FRAMessageUtils generateChallengeResponse:@"challenge"
134 @"response":[FRAMessageUtils generateChallengeResponse:@"challenge" secret:@"secret"],
160 data:@{@"response":[FRAMessageUtils generateChallengeResponse:@"challenge"
196 data:@{@"response":[FRAMessageUtils generateChallengeResponse:@"challenge"
210 FRANotification *expiredNotification = [[FRANotification alloc] initWithDatabase:database identityModel:mockIdentityModel messageId:@"messageId" challenge:@"challenge" timeReceive
[all...]
H A DFRANotificationHandlerTest.m96 XCTAssertEqualObjects(notification.challenge, CHALLENGE, @"Notification not initialized with challenge");
/forgerock/opendj-b2.6/src/server/org/opends/server/extensions/
H A DCRAMMD5SASLMechanismHandler.java100 // challenge.
186 // challenge to the client.
193 // challenge and store it in the client connection so we can verify the
205 ByteString challenge =
207 clientConnection.setSASLAuthStateInfo(challenge);
208 bindOperation.setServerSASLCredentials(challenge);
237 ByteString challenge = (ByteString) saslStateInfo;
239 // Wipe out the stored challenge so it can't be used again.
458 // in conjunction with the challenge to construct the provided digest.
462 byte[] generatedDigest = generateDigest(clearPassword, challenge);
504 generateDigest(ByteString password, ByteString challenge) argument
[all...]
/forgerock/opendj2/src/server/org/opends/server/extensions/
H A DCRAMMD5SASLMechanismHandler.java99 // challenge.
185 // challenge to the client.
192 // challenge and store it in the client connection so we can verify the
204 ByteString challenge =
206 clientConnection.setSASLAuthStateInfo(challenge);
207 bindOperation.setServerSASLCredentials(challenge);
236 ByteString challenge = (ByteString) saslStateInfo;
238 // Wipe out the stored challenge so it can't be used again.
457 // in conjunction with the challenge to construct the provided digest.
461 byte[] generatedDigest = generateDigest(clearPassword, challenge);
500 generateDigest(ByteString password, ByteString challenge) argument
[all...]
/forgerock/opendj2.6.2/src/server/org/opends/server/extensions/
H A DCRAMMD5SASLMechanismHandler.java100 // challenge.
186 // challenge to the client.
193 // challenge and store it in the client connection so we can verify the
205 ByteString challenge =
207 clientConnection.setSASLAuthStateInfo(challenge);
208 bindOperation.setServerSASLCredentials(challenge);
237 ByteString challenge = (ByteString) saslStateInfo;
239 // Wipe out the stored challenge so it can't be used again.
458 // in conjunction with the challenge to construct the provided digest.
462 byte[] generatedDigest = generateDigest(clearPassword, challenge);
501 generateDigest(ByteString password, ByteString challenge) argument
[all...]
/forgerock/opendj2-jel-hg/src/server/org/opends/server/extensions/
H A DCRAMMD5SASLMechanismHandler.java100 // challenge.
186 // challenge to the client.
193 // challenge and store it in the client connection so we can verify the
205 ByteString challenge =
207 clientConnection.setSASLAuthStateInfo(challenge);
208 bindOperation.setServerSASLCredentials(challenge);
237 ByteString challenge = (ByteString) saslStateInfo;
239 // Wipe out the stored challenge so it can't be used again.
458 // in conjunction with the challenge to construct the provided digest.
462 byte[] generatedDigest = generateDigest(clearPassword, challenge);
504 generateDigest(ByteString password, ByteString challenge) argument
[all...]
/forgerock/opendj2-hg/src/server/org/opends/server/extensions/
H A DCRAMMD5SASLMechanismHandler.java99 // challenge.
185 // challenge to the client.
192 // challenge and store it in the client connection so we can verify the
204 ByteString challenge =
206 clientConnection.setSASLAuthStateInfo(challenge);
207 bindOperation.setServerSASLCredentials(challenge);
236 ByteString challenge = (ByteString) saslStateInfo;
238 // Wipe out the stored challenge so it can't be used again.
457 // in conjunction with the challenge to construct the provided digest.
461 byte[] generatedDigest = generateDigest(clearPassword, challenge);
500 generateDigest(ByteString password, ByteString challenge) argument
[all...]
/forgerock/opendj-v3/opendj-server-legacy/src/main/java/org/opends/server/extensions/
H A DCRAMMD5SASLMechanismHandler.java94 * The random number generator that we will use to create the server challenge.
172 // challenge to the client.
179 // challenge and store it in the client connection so we can verify the
191 final ByteString challenge = ByteString.valueOfUtf8(challengeString);
192 clientConnection.setSASLAuthStateInfo(challenge);
193 bindOperation.setServerSASLCredentials(challenge);
222 ByteString challenge = (ByteString) saslStateInfo;
224 // Wipe out the stored challenge so it can't be used again.
411 // in conjunction with the challenge to construct the provided digest.
415 byte[] generatedDigest = generateDigest(clearPassword, challenge);
454 generateDigest(ByteString password, ByteString challenge) argument
[all...]
/forgerock/openam/openam-authentication/openam-auth-push/src/main/java/org/forgerock/openam/authentication/modules/push/registration/
H A DAuthenticatorPushRegistration.java245 String challenge = userPushDeviceProfileManager.createRandomBytes(SECRET_BYTE_LENGTH);
247 paintRegisterDeviceCallback(amIdentityPrincipal, messageId, challenge);
254 servicePredicates.add(new PushMessageChallengeResponsePredicate(secret, challenge, JWT));
365 private void paintRegisterDeviceCallback(AMIdentity id, String messageId, String challenge) argument
371 challenge));
375 int callbackIndex, String challenge) throws AuthLoginException {
389 .addUriQueryComponent(CHALLENGE_QR_CODE_KEY, Base64url.encode(Base64.decode(challenge)))
374 createQRCodeCallback(PushDeviceSettings deviceProfile, AMIdentity id, String messageId, int callbackIndex, String challenge) argument
/forgerock/openam-v13/openam-federation/OpenFM/src/main/java/com/sun/identity/liberty/ws/authnsvc/mechanism/
H A DCramMD5MechanismHandler.java187 byte[] challenge = generateChallenge();
192 challengeMap.put(respMessageID, challenge);
193 saslResp.setData(challenge);
260 "CramMD5MechanismHandler.authenticate: no challenge found");
/forgerock/openam/openam-authentication/openam-auth-push/src/main/java/org/forgerock/openam/authentication/modules/push/
H A DAuthenticatorPush.java329 String challenge = userPushDeviceProfileManager.createRandomBytes(SECRET_BYTE_LENGTH);
334 .claim(CHALLENGE_KEY, challenge)
352 new PushMessageChallengeResponsePredicate(Base64.decode(device.getSharedSecret()), challenge, JWT));

Completed in 245 milliseconds

123