HomeSort by relevance Sort by last modified time
    Searched full:authentication (Results 126 - 150 of 1782) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/chromium/net/http/
http_auth_controller.h 41 // Generate an authentication token for |target| if necessary. The return
97 // Invalidates any auth cache entries after authentication has failed.
120 // Holds the {scheme, host, path, port} for the authentication target.
123 // Holds the {scheme, host, port} for the authentication target.
126 // The absolute path of the resource needing authentication.
127 // For proxy authentication the path is empty.
153 // in response to an HTTP authentication challenge.
url_security_manager.h 28 // can be used with during NTLM or Negotiate authentication. If
48 // |auth_origin| for HTTP NTLM or Negotiate authentication.
52 // |auth_origin| for HTTP Negotiate authentication.
  /external/chromium_org/net/http/
http_auth_controller.h 42 // Generate an authentication token for |target| if necessary. The return
98 // Invalidates any auth cache entries after authentication has failed.
121 // Holds the {scheme, host, path, port} for the authentication target.
124 // Holds the {scheme, host, port} for the authentication target.
127 // The absolute path of the resource needing authentication.
128 // For proxy authentication the path is empty.
154 // in response to an HTTP authentication challenge.
url_security_manager.h 28 // can be used with during NTLM or Negotiate authentication. If
48 // |auth_origin| for HTTP NTLM or Negotiate authentication.
52 // |auth_origin| for HTTP Negotiate authentication.
  /external/openssh/
readconf.h 34 int forward_agent; /* Forward authentication agent. */
43 * authentication. */
44 int rsa_authentication; /* Try RSA authentication. */
45 int pubkey_authentication; /* Try ssh2 pubkey authentication. */
48 /* Try S/Key or TIS, authentication. */
49 int gss_authentication; /* Try GSS authentication */
52 * authentication. */
servconf.h 89 * authentication. */
92 int rsa_authentication; /* If true, permit RSA authentication. */
93 int pubkey_authentication; /* If true, permit ssh2 pubkey authentication. */
95 * authentication. */
98 * authentication mechanism,
105 int gss_authentication; /* If true, permit GSSAPI authentication */
108 * authentication. */
ssh-add.1 43 .Nd adds private key identities to the authentication agent
55 adds private key identities to the authentication agent,
78 The authentication agent must be running and the
88 being used for authentication.
164 Contains the protocol version 1 RSA authentication identity of the user.
166 Contains the protocol version 2 DSA authentication identity of the user.
168 Contains the protocol version 2 ECDSA authentication identity of the user.
170 Contains the protocol version 2 RSA authentication identity of the user.
181 is unable to contact the authentication agent.
sshd.0 18 The forked daemons handle key exchange, encryption, authentication,
117 beginning, authentication, and termination of each connection is
136 making DNS requests unless the authentication mechanism or
137 configuration requires it. Authentication mechanisms that may
143 AUTHENTICATION
170 cryptographic message authentication code (hmac-md5, hmac-sha1, umac-64,
173 Finally, the server and the client enter an authentication dialog. The
174 client tries to authenticate itself using host-based authentication,
175 public key authentication, challenge-response authentication, or passwor
    [all...]
auth-rhosts.c 6 * Rhosts authentication. This file contains code to check whether to admit
7 * the login based on rhosts authentication. This file also processes
50 * /etc/hosts.equiv). This returns true if authentication can be granted
171 /* Accept authentication. */
175 /* Authentication using this file denied. */
182 * true if authentication succeeds. If ignore_rhosts is true, only
252 logit("Rhosts authentication refused for %.100s: "
254 auth_debug_add("Rhosts authentication refused for %.100s: "
261 logit("Rhosts authentication refused for %.100s: "
263 auth_debug_add("Rhosts authentication refused for %.100s:
    [all...]
  /external/ppp/pppd/
eap.h 2 * eap.h - Extensible Authentication Protocol for PPP (RFC 2284)
50 #define EAPT_RSA 9 /* RSA Public Key Authentication */
82 eapInitial = 0, /* No EAP authentication yet requested */
84 eapClosed, /* Authentication not in use */
91 eapOpen, /* Completed authentication */
93 eapBadAuth /* Failed authentication */
108 void *ea_session; /* Authentication library linkage */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpc/
auth.h 32 * auth.h, Authentication interface.
53 * Status returned from authentication check
83 * Authentication info. Opaque to client.
112 * Authentication ops.
153 * Unix style authentication
172 #define AUTH_NONE 0 /* no authentication */
207 * XDR an opaque authentication struct.
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpc/
auth.h 32 * auth.h, Authentication interface.
53 * Status returned from authentication check
83 * Authentication info. Opaque to client.
112 * Authentication ops.
153 * Unix style authentication
172 #define AUTH_NONE 0 /* no authentication */
207 * XDR an opaque authentication struct.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpc/
auth.h 32 * auth.h, Authentication interface.
53 * Status returned from authentication check
83 * Authentication info. Opaque to client.
112 * Authentication ops.
153 * Unix style authentication
172 #define AUTH_NONE 0 /* no authentication */
207 * XDR an opaque authentication struct.
  /frameworks/base/obex/javax/obex/
ObexSession.java 55 * Called when the server received an authentication challenge header. This
56 * will cause the authenticator to handle the authentication challenge.
57 * @param header the header with the authentication challenge
68 * An authentication challenge is made up of one required and two
70 * the authentication challenge and it represents the challenge digest
146 * Create the authentication response header. It includes 1 required and
184 * Called when the server received an authentication response header. This
185 * will cause the authenticator to handle the authentication response.
186 * @param authResp the authentication response
  /external/apache-harmony/support/src/test/resources/tests/resources/manifest/
hyts_MANIFEST.MF 19 Export-Package: com.ibm.ive.eccomm.client.services.authentication; specification-version=1.0.0,
20 com.ibm.ive.eccomm.service.authentication; specification-version=1.0.0,
23 Export-Service: com.ibm.ive.eccomm.service.authentication.AuthenticationService,
  /external/chromium_org/chrome/browser/google_apis/
auth_service.h 25 // This class provides authentication for Google services.
32 // |url_request_context_getter| is used to perform authentication with
61 // Called when authentication request from StartAuthentication() is
  /external/chromium_org/remoting/resources/
strings.xml 32 <string name="error_auth_canceled">Authentication prompt canceled by user</string>
34 <string name="error_auth_failed">Authentication with specified account failed</string>
57 <item>Host rejected authentication</item>
  /external/dropbear/libtomcrypt/src/encauth/ocb/
ocb_encrypt_authenticate_memory.c 21 Encrypt and generate an authentication code for a buffer of memory
29 @param tag [out] The authentication tag
30 @param taglen [in/out] The max size and resulting size of the authentication tag
  /external/dropbear/libtomcrypt/src/mac/hmac/
hmac_memory.c 21 HMAC a block of memory to produce the authentication tag
27 @param out [out] Destination of the authentication tag
28 @param outlen [in/out] Max size and resulting size of authentication tag
hmac_memory_multi.c 22 HMAC multiple blocks of memory to produce the authentication tag
26 @param out [out] Destination of the authentication tag
27 @param outlen [in/out] Max size and resulting size of authentication tag
  /external/ganymed-ssh2/examples/
BasicWithHTTPProxy.java 36 // if the proxy requires basic authentication:
45 * "Authentication method password not supported by the server at this stage."
52 throw new IOException("Authentication failed.");
  /external/tcpdump/
ah.h 34 * RFC1826/2402 authentication header.
45 /* variable size, 32bit bound*/ /* Authentication data */
54 /* variable size, 32bit bound*/ /* Authentication data */
esp.h 48 /*variable size, 32bit bound*/ /* Authentication data (new IPsec) */
59 /*variable size, 32bit bound*/ /* Authentication data */
65 /*variable size, 32bit bound*/ /* Authentication data (new IPsec)*/
  /external/wpa_supplicant_8/src/eap_server/
eap.h 41 Boolean eapResp; /* shared with EAPOL Backend Authentication */
50 Boolean eapReq; /* shared with EAPOL Backend Authentication */
51 Boolean eapNoReq; /* shared with EAPOL Backend Authentication */
  /libcore/support/src/test/java/tests/resources/manifest/
hyts_MANIFEST.MF 19 Export-Package: com.ibm.ive.eccomm.client.services.authentication; specification-version=1.0.0,
20 com.ibm.ive.eccomm.service.authentication; specification-version=1.0.0,
23 Export-Service: com.ibm.ive.eccomm.service.authentication.AuthenticationService,

Completed in 3028 milliseconds

1 2 3 4 56 7 8 91011>>