/external/chromium_org/chromeos/test/data/network/ |
managed_ethernet.onc | 5 "Authentication": "None"
|
settings_with_normalization.json | 8 "Authentication": "None" 30 "Authentication": "None"
|
invalid_settings_with_repairs.json | 8 "Authentication": "None" 18 "Authentication": "None" 26 "Authentication": "None" 39 "Authentication": "None" 47 "Authentication": 123 56 "Authentication": "None" 65 "Authentication": "None" 73 "Authentication": "None" 81 "Authentication": "None" 90 "Authentication": "None [all...] |
/external/iptables/extensions/ |
libipt_ah.man | 1 This module matches the SPIs in Authentication header of IPsec packets.
|
/external/srtp/crypto/include/ |
crypto.h | 28 * @brief An auth_type_id_t is an identifier for a particular authentication 32 * authentication function type, e.g. HMAC-SHA1. A NULL_AUTH is 33 * avaliable; this authentication function performs no computation, 34 * and can be selected to indicate that no authentication is to take 37 * @ingroup Authentication
|
/libcore/luni/src/main/java/java/net/ |
Authenticator.java | 21 * An implementation of this class is able to obtain authentication information 25 * getPasswordAuthentication()} which dictates how the authentication info is 52 * @return collected password authentication data. 98 * example HTTP Basic Authentication. 108 * authenticator to get the authentication info. 110 * @return password authentication info or {@code null} if no authenticator 113 * address of the connection that requests authentication. 115 * port of the connection that requests authentication. 117 * protocol of the connection that requests authentication. 119 * realm of the connection that requests authentication [all...] |
/frameworks/base/obex/javax/obex/ |
Authenticator.java | 36 * This interface provides a way to respond to authentication challenge and 37 * authentication response headers. When a client or server receives an 38 * authentication challenge or authentication response header, the 43 * For more information on how the authentication procedure works in OBEX, 47 * <STRONG>Authentication Challenges</STRONG> 49 * When a client or server receives an authentication challenge header, the 53 * password in this object is not sent in the authentication response. Instead, 54 * the 16-byte challenge received in the authentication challenge is combined 57 * in the authentication response along with the user name if it was provided [all...] |
/external/chromium_org/chrome/browser/chromeos/login/ |
profile_auth_data.h | 15 // Helper class for transferring authentication related data from one profile 16 // to another: proxy authentication cache, cookies, server bound certs. 19 // Transfers proxy authentication cache and optionally |transfer_cookies| and 20 // server bound certs from the profile that was used for authentication.
|
/external/chromium_org/third_party/WebKit/ManualTests/blackberry/ |
http-auth-on-200.php | 5 echo 'PASS if you did not see an authentication dialog';
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/nfsd/ |
auth.h | 4 * nfsd-specific authentication stuff.
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/nfsd/ |
auth.h | 4 * nfsd-specific authentication stuff.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/nfsd/ |
auth.h | 4 * nfsd-specific authentication stuff.
|
/external/chromium/net/http/ |
http_auth_handler.h | 20 // HttpAuthHandler is the interface for the authentication schemes 30 // authentication scheme, but none of the tokens occuring after the 31 // authentication scheme. |target| and |origin| are both stored 44 // is required. For Digest authentication it may also mean that the previous 49 // authentication scheme, but none of the tokens occuring after the 50 // authentication scheme. 54 // Generates an authentication token, potentially asynchronously. 63 // If |OK| is returned, |*auth_token| is filled in with an authentication 78 // The authentication scheme as an enumerated value. 103 // Returns the proxy or server which issued the authentication challeng [all...] |
/external/chromium_org/third_party/tlslite/tlslite/integration/ |
SMTP_TLS.py | 22 For client authentication, use one of these argument 28 For server authentication, you can either rely on the 29 implicit mutual authentication performed by SRP or 31 authentication with one of these argument combinations: 36 Certificate-based server authentication is compatible with 37 SRP or certificate-based client authentication. It is 50 @param password: SRP password for mutual authentication. 54 @param sharedKey: Shared key for mutual authentication. 59 @param certChain: Certificate chain for client authentication. 64 @param privateKey: Private key for client authentication [all...] |
IntegrationHelper.py | 19 #SRP Authentication 25 #Shared Key Authentication 31 #Certificate Chain Authentication 37 #No Authentication 48 "authentication")
|
ClientHelper.py | 20 For client authentication, use one of these argument 26 For server authentication, you can either rely on the 27 implicit mutual authentication performed by SRP or 29 authentication with one of these argument combinations: 34 Certificate-based server authentication is compatible with 35 SRP or certificate-based client authentication. It is 51 @param password: SRP password for mutual authentication. 55 @param sharedKey: Shared key for mutual authentication. 60 @param certChain: Certificate chain for client authentication. 65 @param privateKey: Private key for client authentication [all...] |
/libcore/luni/src/main/java/javax/net/ssl/ |
X509TrustManager.java | 24 * The trust manager for X509 certificates to be used to perform authentication 31 * be validated and is trusted for client authentication for the specified 32 * authentication type. 37 * the authentication type used. 42 * or if the specified authentication type is {@code null} or an 51 * be validated and is trusted for server authentication for the specified 62 * or if the specified authentication type is {@code null} or an 70 * authentication of peers. 73 * authentication of peers.
|
SSLServerSocket.java | 33 * Creates a TCP server socket with the default authentication context. 45 * authentication context. The connection's default backlog size is 50 60 * backlog and the default authentication context. 78 * authentication context. 150 * authentication. The client authentication is one of the following: 152 * <li>authentication required</li> 153 * <li>authentication requested</li> 154 * <li>no authentication needed</li> 159 * {@code true} if client authentication is required [all...] |
/external/okhttp/src/test/java/com/squareup/okhttp/internal/ |
RecordingAuthenticator.java | 28 public final PasswordAuthentication authentication; field in class:RecordingAuthenticator 30 public RecordingAuthenticator(PasswordAuthentication authentication) { 31 this.authentication = authentication; 56 return authentication;
|
/external/apache-http/src/org/apache/http/auth/ |
AuthScheme.java | 39 * authentication scheme. 42 * An authentication scheme should be able to support the following 49 * <li>Provide the realm this authentication scheme is applicable to, 57 * Authentication schemes may ignore method name and URI parameters 58 * if they are not relevant for the given authentication mechanism 61 * Authentication schemes may be stateful involving a series of 74 * Processes the given challenge token. Some authentication schemes 83 * Returns textual designation of the given authentication scheme. 85 * @return the name of the given authentication scheme 90 * Returns authentication parameter with the given name, if available [all...] |
/external/smack/src/org/jivesoftware/smack/ |
NonSASLAuthentication.java | 24 import org.jivesoftware.smack.packet.Authentication;
32 * Implementation of JEP-0078: Non-SASL Authentication. Follow the following
60 // If we send an authentication packet in "get" mode with just the username,
61 // the server will return the list of authentication protocols it supports.
62 Authentication discoveryAuth = new Authentication();
80 Authentication authTypes = (Authentication) response;
83 // Now, create the authentication packet we'll send to the server.
84 Authentication auth = new Authentication(); [all...] |
/libcore/luni/src/main/java/javax/security/auth/login/ |
package.html | 8 This package provides a pluggable and stackable authentication system based on 9 ideas and concepts from the Unix-PAM module. New authentication methods can be
|
/external/openssh/ |
auth-rh-rsa.c | 6 * Rhosts or /etc/hosts.equiv authentication combined with RSA host 7 * authentication. 50 /* Check if we would accept it using rhosts authentication. */ 63 * its host key. Returns true if authentication succeeds. 71 debug("Trying rhosts with RSA host authentication for client user %.100s", 79 debug("Rhosts RSA authentication: canonical host %.900s", chost); 82 debug("Rhosts with RSA host authentication denied: unknown or invalid host key"); 90 logit("Client on %.800s failed to respond correctly to host authentication.", 96 * and the host using RSA. We accept the authentication. 99 verbose("Rhosts with RSA host authentication accepted for %.100s, %.100s on %.700s." [all...] |
/external/chromium_org/net/http/ |
http_auth_handler.h | 19 // HttpAuthHandler is the interface for the authentication schemes 29 // authentication scheme, but none of the tokens occurring after the 30 // authentication scheme. |target| and |origin| are both stored 43 // is required. For Digest authentication it may also mean that the previous 48 // authentication scheme, but none of the tokens occurring after the 49 // authentication scheme. 53 // Generates an authentication token, potentially asynchronously. 63 // If |OK| is returned, |*auth_token| is filled in with an authentication 78 // The authentication scheme as an enumerated value. 103 // Returns the proxy or server which issued the authentication challeng [all...] |
/external/nist-sip/java/javax/sip/header/ |
AuthenticationInfoHeader.java | 6 String NAME = "Authentication-Info";
|