HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 201 - 225 of 1342) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/chromium/net/http/
http_auth.h 69 // The identity came from the auth cache, by doing a path-based
77 // The identity was retrieved from the auth cache, by doing a
110 // Get the name of the header containing the auth challenge
171 // Breaks up a challenge string into the the auth scheme and parameter list,
173 // challenge = auth-scheme 1*SP 1#auth-param
197 // Get the auth scheme of the challenge.
http_auth_cache.h 25 // - the last auth handler used (contains realm and authentication scheme)
57 // proxy auth (which does not use the concept of paths).
66 // |realm| - the auth realm for the challenge.
96 // scheme |scheme|. The cached auth challenge is replaced with
168 // Note that proxy auth cache entries are associated with empty
http_network_transaction.h 182 // Sets up the state machine to restart the transaction with auth.
194 // to be maintained for multi-round auth.
208 // Returns true if we have auth credentials for the given target.
220 // Whether this transaction is waiting for proxy auth, server auth, or is
221 // not waiting for any auth at all. |pending_auth_target_| is read and
  /external/dropbear/
cli-auth.c 28 #include "auth.h"
41 /* Send a "none" auth request to get available methods */
68 TRACE(("leave recv_msg_userauth_banner: banner after auth done"))
126 * implement it, and password auth is last-resort
153 /* If it was a pubkey auth request, we should cross that key
198 TRACE(("auth method '%s'", tok))
276 dropbear_exit("No auth methods could be used.");
session.h 33 #include "auth.h"
212 cli_state state; /* Used to progress auth/channelsession etc */
227 for the last type of auth we tried */
229 int auth_interact_failed; /* flag whether interactive auth can still
233 interactive auth.*/
240 struct AgentkeyList *agentkeys; /* Keys to use for public-key auth */
  /frameworks/base/docs/html/sdk/api_diff/9/changes/
javax.security.auth.x500.X500Principal.html 10 javax.security.auth.x500.X500Principal
74 Class javax.security.auth.x500.<A HREF="../../../../reference/javax/security/auth/x500/X500Principal.html" target="_top"><font size="+2"><code>X500Principal</code></font></A>
85 <A NAME="javax.security.auth.x500.X500Principal.ctor_added(java.lang.String, java.util.Map<java.lang.String, java.lang.String>)"></A>
86 <nobr><A HREF="../../../../reference/javax/security/auth/x500/X500Principal.html#X500Principal(java.lang.String, java.util.Map<java.lang.String, java.lang.String>)" target="_top"><code>X500Principal</code></A>(<code>String,</nobr> Map&lt;String<nobr>,</nobr> String&gt;<nobr><nobr></code>)</nobr>
101 <A NAME="javax.security.auth.x500.X500Principal.getName_added(java.lang.String, java.util.Map<java.lang.String, java.lang.String>)"></A>
102 <nobr><code>String</code>&nbsp;<A HREF="../../../../reference/javax/security/auth/x500/X500Principal.html#getName(java.lang.String, java.util.Map<java.lang.String, java.lang.String>)" target="_top"><code>getName</code></A>(<code>String,</nobr> Map&lt;String<nobr>,</nobr> String&gt;<nobr><nobr></code>)</nobr>
  /external/srtp/test/
srtp_driver.c 732 printf("testing for false positives in auth check...");
931 printf("testing for false positives in auth check...");
991 "# rtp auth: %s\r\n"
994 "# rtcp auth: %s\r\n"
1017 "# rtp auth: %s\r\n"
1020 "# rtcp auth: %s\r\n"
    [all...]
  /external/openssh/regress/
cert-userkey.sh 154 auth=$1
155 if test "x$auth" = "xauthorized_keys" ; then
168 _prefix="${ktype} privsep $privsep $auth"
199 verbose "$tid: ${ktype} $auth revoked CA key"
212 verbose "$tid: $auth CA does not authenticate"
239 for auth in $auth_choice ; do
247 if test "x$auth" = "xauthorized_keys" ; then
262 verbose "$tid: $ident auth $auth expect $result $ktype"
  /packages/apps/Email/src/com/android/email/mail/transport/
SmtpSender.java 133 * server. It won't let you use AUTH without EHLO.
135 * and only attempting auth if it's available, and warning the user
158 boolean authLoginSupported = result.matches(".*AUTH.*LOGIN.*$");
159 boolean authPlainSupported = result.matches(".*AUTH.*PLAIN.*$");
284 // C: AUTH LOGIN
294 // C: AUTH LOGIN
304 executeSimpleCommand("AUTH LOGIN");
325 executeSensitiveCommand("AUTH PLAIN " + new String(data), "AUTH PLAIN /redacted/");
  /external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/internal/kerberos/v5/
KDCReplyTest.java 18 package org.apache.harmony.auth.tests.internal.kerberos.v5;
25 import org.apache.harmony.auth.internal.kerberos.v5.EncryptedData;
26 import org.apache.harmony.auth.internal.kerberos.v5.KDCReply;
27 import org.apache.harmony.auth.internal.kerberos.v5.PrincipalName;
28 import org.apache.harmony.auth.internal.kerberos.v5.Ticket;
  /external/dbus/dbus/
dbus-transport-protected.h 30 #include <dbus/dbus-auth.h>
90 DBusAuth *auth; /**< Authentication conversation */ member in struct:DBusTransport
114 unsigned int authenticated : 1; /**< Cache of auth state; use _dbus_transport_get_is_authenticated() to query value */
118 unsigned int unused_bytes_recovered : 1; /**< #TRUE if we've recovered unused bytes from auth */
142 _dbus_auth_get_unix_fd_negotiated((x)->auth)
dbus-transport-socket.c 148 auth_state = _dbus_auth_do_work (transport->auth);
205 * to write or for some other part of the auth process
209 auth_state = _dbus_auth_do_work (transport->auth);
253 _dbus_auth_get_buffer (transport->auth, &buffer);
258 _dbus_auth_return_buffer (transport->auth, buffer,
263 _dbus_verbose (" read %d bytes in auth phase\n", bytes_read);
305 if (!_dbus_auth_get_bytes_to_send (transport->auth,
315 _dbus_auth_bytes_sent (transport->auth, bytes_written);
388 if (!_dbus_auth_set_credentials (transport->auth,
442 switch (_dbus_auth_do_work (transport->auth))
    [all...]
  /external/srtp/crypto/test/
auth_driver.c 4 * a driver for auth functions
51 #include "auth.h"
111 printf("auth driver\nDavid A. McGrew\nCisco Systems, Inc.\n");
141 printf("error initializaing auth function\n");
153 printf("error deallocating auth function\n");
  /frameworks/base/core/java/android/accounts/
AccountManager.java 63 * the user's actual password. (Auth tokens are normally created with a
65 * can generate auth tokens for applications, so the application doesn't need to
66 * handle passwords directly. Auth tokens are normally reusable and cached by
68 * of applications to <em>invalidate</em> auth tokens when they stop working so
91 * of accounts returned by {@link #getAccountsByType}. Requesting an auth token
94 * <li>Request an auth token for the selected account(s) using one of the
98 * <li>Make the request using the auth token. The form of the auth token,
104 * it could be that a cached auth token is stale and no longer honored by
107 * invalidating the auth token, immediately go back to the "Request an aut
    [all...]
  /external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/callback/
ChoiceCallbackTest.java 22 package org.apache.harmony.auth.tests.javax.security.auth.callback;
24 import javax.security.auth.callback.ChoiceCallback;
  /external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/module/
LoginModuleUtilsTest.java 18 package org.apache.harmony.auth.tests.module;
24 import javax.security.auth.login.LoginException;
26 import org.apache.harmony.auth.module.LoginModuleUtils;
  /external/apache-http/src/org/apache/http/client/
AuthenticationHandler.java 38 import org.apache.http.auth.AuthScheme;
39 import org.apache.http.auth.AuthenticationException;
40 import org.apache.http.auth.MalformedChallengeException;
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMEngineException.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/NTLMEngineException.java $
31 package org.apache.http.impl.auth;
33 import org.apache.http.auth.AuthenticationException;
  /external/apache-http/src/org/apache/http/impl/client/
DefaultUserTokenHandler.java 37 import org.apache.http.auth.AuthScheme;
38 import org.apache.http.auth.AuthState;
39 import org.apache.http.auth.Credentials;
  /external/chromium/chrome/browser/sync/
sync_setup_wizard.h 63 // for a transient auth failure, it will just run as far as is necessary
64 // based on |advance_state| (so for auth failure, up to GAIA_SUCCESS).
79 // gaia credentials in the event of a steady-state auth failure, this is
  /external/dbus/bus/
config-parser-common.c 46 else if (strcmp (name, "auth") == 0)
66 else if (strcmp (name, "auth") == 0)
149 return "auth";
system.conf.in 8 auth mechanisms, run as a different user, etc. -->
36 <auth>EXTERNAL</auth>
  /external/kernel-headers/original/linux/sunrpc/
auth.h 2 * linux/include/linux/sunrpc/auth.h
68 /* guess at number of u32's auth adds before
107 const char * cr_name; /* Name of the auth flavour */
  /frameworks/base/core/tests/coretests/src/android/net/http/
DefaultHttpClientTest.java 31 import org.apache.http.auth.AuthenticationException;
32 import org.apache.http.auth.UsernamePasswordCredentials;
34 import org.apache.http.impl.auth.DigestScheme;
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
MessageDigestAlgorithm.java 64 || qop_value.trim().equalsIgnoreCase("auth")) {
75 && (qop_value.equalsIgnoreCase("auth") || qop_value.equalsIgnoreCase("auth-int")))
149 || qop_value.trim().equalsIgnoreCase("auth")) {
160 && (qop_value.equalsIgnoreCase("auth") || qop_value.equalsIgnoreCase("auth-int")))

Completed in 1165 milliseconds

1 2 3 4 5 6 7 891011>>