/external/chromium/net/http/ |
http_auth.h | 69 // The identity came from the auth cache, by doing a path-based 77 // The identity was retrieved from the auth cache, by doing a 110 // Get the name of the header containing the auth challenge 171 // Breaks up a challenge string into the the auth scheme and parameter list, 173 // challenge = auth-scheme 1*SP 1#auth-param 197 // Get the auth scheme of the challenge.
|
http_auth_cache.h | 25 // - the last auth handler used (contains realm and authentication scheme) 57 // proxy auth (which does not use the concept of paths). 66 // |realm| - the auth realm for the challenge. 96 // scheme |scheme|. The cached auth challenge is replaced with 168 // Note that proxy auth cache entries are associated with empty
|
http_network_transaction.h | 182 // Sets up the state machine to restart the transaction with auth. 194 // to be maintained for multi-round auth. 208 // Returns true if we have auth credentials for the given target. 220 // Whether this transaction is waiting for proxy auth, server auth, or is 221 // not waiting for any auth at all. |pending_auth_target_| is read and
|
/external/dropbear/ |
cli-auth.c | 28 #include "auth.h" 41 /* Send a "none" auth request to get available methods */ 68 TRACE(("leave recv_msg_userauth_banner: banner after auth done")) 126 * implement it, and password auth is last-resort 153 /* If it was a pubkey auth request, we should cross that key 198 TRACE(("auth method '%s'", tok)) 276 dropbear_exit("No auth methods could be used.");
|
session.h | 33 #include "auth.h" 212 cli_state state; /* Used to progress auth/channelsession etc */ 227 for the last type of auth we tried */ 229 int auth_interact_failed; /* flag whether interactive auth can still 233 interactive auth.*/ 240 struct AgentkeyList *agentkeys; /* Keys to use for public-key auth */
|
/frameworks/base/docs/html/sdk/api_diff/9/changes/ |
javax.security.auth.x500.X500Principal.html | 10 javax.security.auth.x500.X500Principal 74 Class javax.security.auth.x500.<A HREF="../../../../reference/javax/security/auth/x500/X500Principal.html" target="_top"><font size="+2"><code>X500Principal</code></font></A> 85 <A NAME="javax.security.auth.x500.X500Principal.ctor_added(java.lang.String, java.util.Map<java.lang.String, java.lang.String>)"></A> 86 <nobr><A HREF="../../../../reference/javax/security/auth/x500/X500Principal.html#X500Principal(java.lang.String, java.util.Map<java.lang.String, java.lang.String>)" target="_top"><code>X500Principal</code></A>(<code>String,</nobr> Map<String<nobr>,</nobr> String><nobr><nobr></code>)</nobr> 101 <A NAME="javax.security.auth.x500.X500Principal.getName_added(java.lang.String, java.util.Map<java.lang.String, java.lang.String>)"></A> 102 <nobr><code>String</code> <A HREF="../../../../reference/javax/security/auth/x500/X500Principal.html#getName(java.lang.String, java.util.Map<java.lang.String, java.lang.String>)" target="_top"><code>getName</code></A>(<code>String,</nobr> Map<String<nobr>,</nobr> String><nobr><nobr></code>)</nobr>
|
/external/srtp/test/ |
srtp_driver.c | 732 printf("testing for false positives in auth check..."); 931 printf("testing for false positives in auth check..."); 991 "# rtp auth: %s\r\n" 994 "# rtcp auth: %s\r\n" 1017 "# rtp auth: %s\r\n" 1020 "# rtcp auth: %s\r\n" [all...] |
/external/openssh/regress/ |
cert-userkey.sh | 154 auth=$1 155 if test "x$auth" = "xauthorized_keys" ; then 168 _prefix="${ktype} privsep $privsep $auth" 199 verbose "$tid: ${ktype} $auth revoked CA key" 212 verbose "$tid: $auth CA does not authenticate" 239 for auth in $auth_choice ; do 247 if test "x$auth" = "xauthorized_keys" ; then 262 verbose "$tid: $ident auth $auth expect $result $ktype"
|
/packages/apps/Email/src/com/android/email/mail/transport/ |
SmtpSender.java | 133 * server. It won't let you use AUTH without EHLO. 135 * and only attempting auth if it's available, and warning the user 158 boolean authLoginSupported = result.matches(".*AUTH.*LOGIN.*$"); 159 boolean authPlainSupported = result.matches(".*AUTH.*PLAIN.*$"); 284 // C: AUTH LOGIN 294 // C: AUTH LOGIN 304 executeSimpleCommand("AUTH LOGIN"); 325 executeSensitiveCommand("AUTH PLAIN " + new String(data), "AUTH PLAIN /redacted/");
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/internal/kerberos/v5/ |
KDCReplyTest.java | 18 package org.apache.harmony.auth.tests.internal.kerberos.v5; 25 import org.apache.harmony.auth.internal.kerberos.v5.EncryptedData; 26 import org.apache.harmony.auth.internal.kerberos.v5.KDCReply; 27 import org.apache.harmony.auth.internal.kerberos.v5.PrincipalName; 28 import org.apache.harmony.auth.internal.kerberos.v5.Ticket;
|
/external/dbus/dbus/ |
dbus-transport-protected.h | 30 #include <dbus/dbus-auth.h> 90 DBusAuth *auth; /**< Authentication conversation */ member in struct:DBusTransport 114 unsigned int authenticated : 1; /**< Cache of auth state; use _dbus_transport_get_is_authenticated() to query value */ 118 unsigned int unused_bytes_recovered : 1; /**< #TRUE if we've recovered unused bytes from auth */ 142 _dbus_auth_get_unix_fd_negotiated((x)->auth)
|
dbus-transport-socket.c | 148 auth_state = _dbus_auth_do_work (transport->auth); 205 * to write or for some other part of the auth process 209 auth_state = _dbus_auth_do_work (transport->auth); 253 _dbus_auth_get_buffer (transport->auth, &buffer); 258 _dbus_auth_return_buffer (transport->auth, buffer, 263 _dbus_verbose (" read %d bytes in auth phase\n", bytes_read); 305 if (!_dbus_auth_get_bytes_to_send (transport->auth, 315 _dbus_auth_bytes_sent (transport->auth, bytes_written); 388 if (!_dbus_auth_set_credentials (transport->auth, 442 switch (_dbus_auth_do_work (transport->auth)) [all...] |
/external/srtp/crypto/test/ |
auth_driver.c | 4 * a driver for auth functions 51 #include "auth.h" 111 printf("auth driver\nDavid A. McGrew\nCisco Systems, Inc.\n"); 141 printf("error initializaing auth function\n"); 153 printf("error deallocating auth function\n");
|
/frameworks/base/core/java/android/accounts/ |
AccountManager.java | 63 * the user's actual password. (Auth tokens are normally created with a 65 * can generate auth tokens for applications, so the application doesn't need to 66 * handle passwords directly. Auth tokens are normally reusable and cached by 68 * of applications to <em>invalidate</em> auth tokens when they stop working so 91 * of accounts returned by {@link #getAccountsByType}. Requesting an auth token 94 * <li>Request an auth token for the selected account(s) using one of the 98 * <li>Make the request using the auth token. The form of the auth token, 104 * it could be that a cached auth token is stale and no longer honored by 107 * invalidating the auth token, immediately go back to the "Request an aut [all...] |
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/callback/ |
ChoiceCallbackTest.java | 22 package org.apache.harmony.auth.tests.javax.security.auth.callback; 24 import javax.security.auth.callback.ChoiceCallback;
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/module/ |
LoginModuleUtilsTest.java | 18 package org.apache.harmony.auth.tests.module; 24 import javax.security.auth.login.LoginException; 26 import org.apache.harmony.auth.module.LoginModuleUtils;
|
/external/apache-http/src/org/apache/http/client/ |
AuthenticationHandler.java | 38 import org.apache.http.auth.AuthScheme; 39 import org.apache.http.auth.AuthenticationException; 40 import org.apache.http.auth.MalformedChallengeException;
|
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMEngineException.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/NTLMEngineException.java $ 31 package org.apache.http.impl.auth; 33 import org.apache.http.auth.AuthenticationException;
|
/external/apache-http/src/org/apache/http/impl/client/ |
DefaultUserTokenHandler.java | 37 import org.apache.http.auth.AuthScheme; 38 import org.apache.http.auth.AuthState; 39 import org.apache.http.auth.Credentials;
|
/external/chromium/chrome/browser/sync/ |
sync_setup_wizard.h | 63 // for a transient auth failure, it will just run as far as is necessary 64 // based on |advance_state| (so for auth failure, up to GAIA_SUCCESS). 79 // gaia credentials in the event of a steady-state auth failure, this is
|
/external/dbus/bus/ |
config-parser-common.c | 46 else if (strcmp (name, "auth") == 0) 66 else if (strcmp (name, "auth") == 0) 149 return "auth";
|
system.conf.in | 8 auth mechanisms, run as a different user, etc. --> 36 <auth>EXTERNAL</auth>
|
/external/kernel-headers/original/linux/sunrpc/ |
auth.h | 2 * linux/include/linux/sunrpc/auth.h 68 /* guess at number of u32's auth adds before 107 const char * cr_name; /* Name of the auth flavour */
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
DefaultHttpClientTest.java | 31 import org.apache.http.auth.AuthenticationException; 32 import org.apache.http.auth.UsernamePasswordCredentials; 34 import org.apache.http.impl.auth.DigestScheme;
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
MessageDigestAlgorithm.java | 64 || qop_value.trim().equalsIgnoreCase("auth")) { 75 && (qop_value.equalsIgnoreCase("auth") || qop_value.equalsIgnoreCase("auth-int"))) 149 || qop_value.trim().equalsIgnoreCase("auth")) { 160 && (qop_value.equalsIgnoreCase("auth") || qop_value.equalsIgnoreCase("auth-int")))
|