/forgerock/authenticator-ios-v2/ForgeRock-Authenticator/ |
H A D | FRAPushMechanism.m | 27 return [self initWithDatabase:database identityModel:identityModel authEndpoint:nil secret:nil version:1 mechanismIdentifier:[NSUUID UUID].UUIDString]; 30 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel authEndpoint:(NSString *)authEndPoint secret:(NSString *)secret { 31 return [self initWithDatabase:database identityModel:identityModel authEndpoint:authEndPoint secret:secret version:1 mechanismIdentifier:[NSUUID UUID].UUIDString]; 34 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel authEndpoint:(NSString *)authEndPoint secret:(NSString *)secret version:(NSInteger)version mechanismIdentifier:(NSString *)mechanismIdentifier{ 39 _secret = secret; 52 + (instancetype)pushMechanismWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel authEndpoint:(NSString *)authEndPoint secret:(NSString *)secret versio [all...] |
H A D | FRAPushMechanism.h | 28 @property (nonatomic, readonly) NSString *secret; variable 59 * @param secret Shared secret key required for authentication. 65 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel authEndpoint:(NSString *)authEndPoint secret:(NSString *)secret version:(NSInteger)version mechanismIdentifier:(NSString *)mechanismIdentifier; 73 * @param secret Shared secret key required for authentication. 77 - (instancetype)initWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel authEndpoint:(NSString *)authEndPoint secret:(NSString *)secret; 97 + (instancetype)pushMechanismWithDatabase:(FRAIdentityDatabase *)database identityModel:(FRAIdentityModel *)identityModel authEndpoint:(NSString *)authEndPoint secret [all...] |
H A D | FRAMessageUtils.h | 30 * @param base64Secret The secret used to sign the JWT. 46 * @param base64Secret The secret used to sign the JWT. 64 * @param secret The secret. 67 + (NSString *) generateChallengeResponse:(NSString *) challenge secret:(NSString *) secret;
|
H A D | FRAPushMechanismFactory.m | 28 /*! QR code key for the secret. */ 87 NSString *secret = [query objectForKey:SECRET_QR_KEY]; 98 if (![self isValidSecret:secret] || ![self isValid:regEndpoint] || ![self isValid:authEndpoint] || ![self isValid:messageId] || ![self isValid:challenge] || ![self isValid:issuer]) { 103 FRAPushMechanism* mechanism = [FRAPushMechanism pushMechanismWithDatabase:database identityModel:identityModel authEndpoint:authEndpoint secret:secret]; 110 [self registerMechanismWithEndpoint:regEndpoint secret:secret challenge:challenge messageId:messageId mechanismUid:mechanism.mechanismUID identity:identity mechanism:mechanism identityModel:identityModel loadBalancerCookieData:loadBalancer handler:handler]; 115 - (BOOL)isValidSecret:(NSString *)secret { 116 return [self isValid:secret] && [FRAQRUtils isBase64:[FRAQRUtils replaceCharactersForURLDecoding:secret]]; [all...] |
/forgerock/openam/openam-push-notification/src/main/java/org/forgerock/openam/services/push/utils/ |
H A D | HS256Helper.java | 29 * over a supplied challenge using a provided secret. 33 private byte[] secret; field in class:HS256Helper 41 * @param secret The secret to use. 44 public HS256Helper(byte[] secret, String challenge) { argument 45 this.secret = secret; 53 if (secret == null) { 58 SecretKey key = new SecretKeySpec(secret, 0, secret 98 setSecret(byte[] secret) argument [all...] |
/forgerock/authenticator-android-v2/app/src/main/java/com/forgerock/authenticator/mechanisms/push/ |
H A D | Push.java | 37 private String secret; field in class:Push 39 private Push(Identity owner, long id, String mechanismUID, String secret, String endpoint) { argument 42 this.secret = secret; 67 * Get the secret used for signing messages. 68 * @return The base 64 encoded secret. 71 return secret; 78 result.put(PushAuthMapper.BASE_64_SHARED_SECRET_KEY, secret); 92 private String secret; field in class:Push.PushBuilder 105 * Set the secret tha 109 setBase64Secret(String secret) argument [all...] |
/forgerock/openam-v13/openam-radius/openam-radius-common/src/test/java/org/forgerock/openam/radius/common/ |
H A D | Rfc2865Examples.java | 31 * A shared secret. 33 public static String secret = "xyzzy5461"; field in class:Rfc2865Examples
|
H A D | TestUserPasswordAttribute.java | 32 final UserPasswordAttribute upa = new UserPasswordAttribute(authnctr, Rfc2865Examples.secret, 39 final String pwd = upa2.extractPassword(authnctr, Rfc2865Examples.secret); 47 final String wireSeq = "02 12 f0 82 69 17 e4 ef 18 e5 44 e1 53 c0 06 b0 43 df"; // depends on client secret and 53 Assert.assertEquals(pwd, "secret", "passwords should be 'secret'"); 57 String secret = "my-secret"; field in class:TestUserPasswordAttribute 70 final RequestAuthenticator ra = new RequestAuthenticator(rand, secret); 71 final UserPasswordAttribute upa = new UserPasswordAttribute(ra, secret, pwd15); 74 final String pwd = upa2.extractPassword(ra, secret); [all...] |
/forgerock/openam/openam-radius/openam-radius-common/src/test/java/org/forgerock/openam/radius/common/ |
H A D | Rfc2865Examples.java | 31 * A shared secret. 33 public static String secret = "xyzzy5461"; field in class:Rfc2865Examples
|
H A D | TestUserPasswordAttribute.java | 32 final UserPasswordAttribute upa = new UserPasswordAttribute(authnctr, Rfc2865Examples.secret, 39 final String pwd = upa2.extractPassword(authnctr, Rfc2865Examples.secret); 47 final String wireSeq = "02 12 f0 82 69 17 e4 ef 18 e5 44 e1 53 c0 06 b0 43 df"; // depends on client secret and 53 Assert.assertEquals(pwd, "secret", "passwords should be 'secret'"); 57 String secret = "my-secret"; field in class:TestUserPasswordAttribute 70 final RequestAuthenticator ra = new RequestAuthenticator(rand, secret); 71 final UserPasswordAttribute upa = new UserPasswordAttribute(ra, secret, pwd15); 74 final String pwd = upa2.extractPassword(ra, secret); [all...] |
/forgerock/openam/openam-push-notification/src/main/java/org/forgerock/openam/services/push/dispatch/ |
H A D | SignedJwtVerificationPredicate.java | 29 * signed by the appropriate user (their shared secret is retrieved from the user store). 33 private byte[] secret; field in class:SignedJwtVerificationPredicate 37 * Create a new SNS Predicate, for use with the supplied secret and challenge. 39 * @param secret Used to verify JWT messages and content. 42 public SignedJwtVerificationPredicate(byte[] secret, String location) { argument 43 Reject.ifNull(secret); 44 this.secret = secret; 50 SigningHandler signingHandler = new SigningManager().newHmacSigningHandler(secret); 65 * Sets the secret fo 68 setSecret(byte[] secret) argument [all...] |
H A D | PushMessageChallengeResponsePredicate.java | 43 * @param secret Secret used to generate the response value. 47 public PushMessageChallengeResponsePredicate(byte[] secret, String challenge, String location) { argument 48 Reject.ifNull(secret, challenge, location); 50 this.answer = new HS256Helper(secret, challenge).answerAsString();
|
/forgerock/openam-v13/openam-radius/openam-radius-server/src/test/java/org/forgerock/openam/radius/server/config/ |
H A D | DefaultClientSecretGeneratorTest.java | 57 final String secret = secretHolder.iterator().next(); 58 logger.debug("Generated secret was {}", secret); 59 final boolean containsOnlyValidChars = secret.matches("[a-zA-Z0-9+/]{16}"); 61 assertThat(secret.matches("[a-zA-Z0-9+/]{16}")).isTrue();
|
/forgerock/openam/openam-radius/openam-radius-server/src/test/java/org/forgerock/openam/radius/server/config/ |
H A D | DefaultClientSecretGeneratorTest.java | 57 final String secret = secretHolder.iterator().next(); 58 logger.debug("Generated secret was {}", secret); 59 final boolean containsOnlyValidChars = secret.matches("[a-zA-Z0-9+/]{16}"); 61 assertThat(secret.matches("[a-zA-Z0-9+/]{16}")).isTrue();
|
/forgerock/openam-v13/openam-radius/openam-radius-common/src/main/java/org/forgerock/openam/radius/common/ |
H A D | UserPasswordAttribute.java | 43 * password, request authenticator, and shared secret and the on-the-wire bytes are extracted via the super class's 46 * and shared secret. 82 * @param secret 83 * the shared secret between the client and the server used for the creation of the cipher text. 87 public UserPasswordAttribute(Authenticator ra, String secret, String password) { argument 88 super(UserPasswordAttribute.toOctets(ra, secret, password)); 92 * Custom toOctets implementation that takes a clear text password, shared secret, and authenticator and prepares 97 * @param secret 98 * the shared secret 103 private static final byte[] toOctets(Authenticator ra, String secret, Strin argument 133 convert(byte[] value, Direction direction, String secret, Authenticator ra) argument 191 extractPassword(Authenticator a, String secret) argument [all...] |
H A D | RequestAuthenticator.java | 56 * @param secret the secret shared between a radius client and server. 60 public RequestAuthenticator(SecureRandom rand, String secret) argument 67 md5.update(secret.getBytes(StandardCharsets.UTF_8));
|
/forgerock/openam/openam-radius/openam-radius-common/src/main/java/org/forgerock/openam/radius/common/ |
H A D | UserPasswordAttribute.java | 43 * password, request authenticator, and shared secret and the on-the-wire bytes are extracted via the super class's 46 * and shared secret. 82 * @param secret 83 * the shared secret between the client and the server used for the creation of the cipher text. 87 public UserPasswordAttribute(Authenticator ra, String secret, String password) { argument 88 super(UserPasswordAttribute.toOctets(ra, secret, password)); 92 * Custom toOctets implementation that takes a clear text password, shared secret, and authenticator and prepares 97 * @param secret 98 * the shared secret 103 private static final byte[] toOctets(Authenticator ra, String secret, Strin argument 133 convert(byte[] value, Direction direction, String secret, Authenticator ra) argument 191 extractPassword(Authenticator a, String secret) argument [all...] |
H A D | RequestAuthenticator.java | 56 * @param secret the secret shared between a radius client and server. 60 public RequestAuthenticator(SecureRandom rand, String secret) argument 67 md5.update(secret.getBytes(StandardCharsets.UTF_8));
|
/forgerock/openam-v13/openam-radius/openam-radius-server/src/main/java/org/forgerock/openam/radius/server/config/ |
H A D | ClientConfig.java | 35 * The shared secret used by both client and server for encryption and decryption and signing of the packets. 37 private String secret; field in class:ClientConfig 108 * Get the shared secret used by both client and server for encryption and decryption and signing of the packets. 110 * @return the secret 113 return this.secret; 117 * Set the shared secret used by both client and server for encryption and decryption and signing of the packets. 119 * @param secret 120 * the secret to set 122 public void setSecret(String secret) { argument 123 this.secret [all...] |
H A D | DefaultClientSecretGenerator.java | 51 * Generates client secret of 16 octets in length with characters selected randomly from allowedChars. 53 * @return a set containing a string (Base64) encoded that may server as the secret between RADIUS client and 57 // rfc2865 says "It is preferred that the secret be 16 octets". However, we use 16 characters since ascii 61 final String secret = Base64.encode(buff, true); 63 holder.add(secret);
|
/forgerock/openam/openam-radius/openam-radius-server/src/main/java/org/forgerock/openam/radius/server/config/ |
H A D | ClientConfig.java | 35 * The shared secret used by both client and server for encryption and decryption and signing of the packets. 37 private String secret; field in class:ClientConfig 108 * Get the shared secret used by both client and server for encryption and decryption and signing of the packets. 110 * @return the secret 113 return this.secret; 117 * Set the shared secret used by both client and server for encryption and decryption and signing of the packets. 119 * @param secret 120 * the secret to set 122 public void setSecret(String secret) { argument 123 this.secret [all...] |
H A D | DefaultClientSecretGenerator.java | 53 * Generates client secret of 16 octets in length with characters selected randomly from allowedChars. 55 * @return a set containing a string (Base64) encoded that may server as the secret between RADIUS client and 59 // rfc2865 says "It is preferred that the secret be 16 octets". However, we use 16 characters since ascii 63 final String secret = Base64.encode(buff, true); 65 holder.add(secret);
|
/forgerock/openam/openam-push-notification/src/main/java/org/forgerock/openam/services/push/ |
H A D | PushNotificationServiceConfig.java | 29 private String secret; field in class:PushNotificationServiceConfig 55 private void setSecret(String secret) { argument 56 this.secret = secret; 84 && StringUtils.isNotBlank(secret) 105 return secret; 181 && Objects.equals(this.secret, that.secret) 192 return Objects.hash(accessKey, secret, appleEndpoint, googleEndpoint, messageDispatcherConcurrency, 232 * Sets the secret fo 236 withSecret(String secret) argument [all...] |
/forgerock/authenticator-android-v2/app/src/main/java/com/forgerock/authenticator/mechanisms/oath/ |
H A D | Oath.java | 71 private byte[] secret; field in class:Oath 79 private Oath(Identity owner, long id, String mechanismUID, TokenType type, String algo, byte[] secret, int digits, argument 84 this.secret = secret; 104 result.put(SECRET, Base32String.encode(secret)); 155 * Validates that the base 64 secret for this object is the one passed in. 156 * @param base64Secret The base 64 secret to test against. 161 return new String(Base64.encode(secret)).equals(base64Secret); 207 mac.init(new SecretKeySpec(secret, "Hmac" + algo)); 242 private byte[] secret; field in class:Oath.OathBuilder 386 validateAlgoSecretPair(String algo, byte[] secret) argument [all...] |
/forgerock/openam-v13/openam-core/src/main/java/com/iplanet/dpro/session/share/ |
H A D | SessionInfo.java | 51 private String secret; field in class:SessionInfo 122 return secret; 125 public void setSecret(final String secret) { argument 126 this.secret = secret; 306 && !(secret != null ? !secret.equals(that.secret) : that.secret != null) 316 result = 31 * result + (secret ! [all...] |