HomeSort by relevance Sort by last modified time
    Searched full:authentication (Results 201 - 225 of 1782) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/wpa_supplicant_8/hostapd/
hostapd_cli.1 18 is a user space daemon for access point and authentication servers.
19 It implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP Authenticators and RADIUS authentication server.
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
Connection.java 36 * <li>calls some of the authentication methods (e.g., {@link #authenticateWithPublicKey(String, File, String) authenticateWithPublicKey()}).</li>
148 * If the authentication phase is complete, <code>true</code> will be
150 * authentication steps are needed), <code>false</code> is returned and
151 * one can retry either by using this or any other authentication method
228 * If the authentication phase is complete, <code>true</code> will be
230 * authentication steps are needed), <code>false</code> is returned and
231 * one can retry either by using this or any other authentication method
282 * If the authentication phase is complete, <code>true</code> will be
284 * authentication steps are needed), <code>false</code> is returned and
285 * one can retry either by using this or any other authentication metho
    [all...]
  /external/openssh/
ssh.0 39 -A Enables forwarding of the authentication agent connection. This
51 -a Disables forwarding of the authentication agent connection.
139 key authentication is read. The default is ~/.ssh/identity for
148 -K Enables GSSAPI-based authentication and forwarding (delegation)
184 MAC (message authentication code) algorithms can be specified in
340 authentication, and configuration problems. Multiple -v options
387 AUTHENTICATION
391 support similar authentication methods, but protocol 2 is the default
398 The methods available for authentication are: GSSAPI-based
399 authentication, host-based authentication, public key authentication
    [all...]
ssh.1 111 Enables forwarding of the authentication agent connection.
123 Disables forwarding of the authentication agent connection.
271 public key authentication is read.
292 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI
355 (message authentication code) algorithms can
569 debugging connection, authentication, and configuration problems.
654 .Sh AUTHENTICATION
666 Both protocols support similar authentication methods,
676 The methods available for authentication are:
677 GSSAPI-based authentication,
    [all...]
sshd_config.5 156 for user authentication.
176 certificate authentication.
180 to be accepted for authentication.
206 is only used when authentication proceeds using a CA listed in
217 authentication is allowed.
224 Specifies whether challenge-response authentication is allowed (e.g. via
225 PAM or though authentication styles supported in
232 to after authentication.
423 Specifies whether user authentication based on GSSAPI is allowed.
434 Specifies whether rhosts or /etc/hosts.equiv authentication togethe
    [all...]
auth-rsa.c 6 * RSA-based authentication. This code determines whether to admit a login
7 * based on RSA authentication. This file also contains functions to check
55 * Session identifier that is used to bind key exchange and authentication
125 * Performs the RSA authentication challenge-response dialog with the client,
291 * Performs the RSA authentication dialog with the client. This returns
292 * 0 if the client could not be authenticated, and 1 if authentication was
314 verbose("Wrong response to RSA authentication challenge.");
315 packet_send_debug("Wrong response to RSA authentication challenge.");
327 * authentication to be rejected.
335 packet_send_debug("RSA authentication accepted.")
    [all...]
sshd.8 76 key exchange, encryption, authentication, command execution,
222 authentication, and termination of each connection is logged.
257 from making DNS requests unless the authentication
259 Authentication mechanisms that may require DNS include
271 .Sh AUTHENTICATION
316 through a cryptographic message authentication code
320 Finally, the server and the client enter an authentication dialog.
322 host-based authentication,
323 public key authentication,
324 challenge-response authentication,
    [all...]
auth.h 52 int postponed; /* authentication needs another step */
78 * Every authentication method has to handle authentication requests for
189 /* debug messages during authentication */
198 #define AUTH_FAIL_MSG "Too many authentication failures for %.100s"
  /external/ipsec-tools/src/racoon/doc/
README.gssapi 1 The gss-api authentication mechanism implementation for racoon was
11 by login authentication daemons) in these situations is to add
12 a set of special credentials to be used. For example, authentication
42 * The racoon.conf file accepts "gssapi_krb" as authentication
93 With the Heimdal gss-api implementation, the gssapi_krb authentication
96 gss_accept_sec_context when mutual authentication is requested.
README.plainrsa 3 Before you begin, you should understand that the RSA authentication
19 RSA authentication. For the purpose of this document, we assume that
20 we are setting up RSA authentication between two networked hosts
64 each host to (a) turn on RSA authentication, and (b) designate each
70 directory you have just specified it will fail the authentication
87 5) You have finished configuring the host for RSA authentication.
102 3) You have specified the "rsasig" method for authentication in the
FAQ 54 Enable hybrid authentication, and ISAKMP mode config and
58 Enable the use of RADIUS with hybrid authentication on the
59 server side. RADIUS is used for authentication, configuration
62 Enable the use of PAM with hybrid authentication on the
63 server side. PAM can be used for authentication and accounting.
  /external/kernel-headers/original/linux/sunrpc/
svcauth.h 4 * RPC server-side authentication stuff.
28 /* Authentication is done in the context of a domain.
34 * a common mechanism for authentication and having a common mapping
40 * A domain is created by an authentication flavour module based on name
55 * Each authentication flavour registers an auth_ops
61 * If there is a problem with the authentication *authp should be set.
  /external/nist-sip/java/gov/nist/javax/sip/
SipStackExt.java 55 * Get the authentication helper.
61 * @return - the authentication helper which can be used for generating the appropriate
62 * headers for handling authentication challenges for user agents.
70 * Get the authentication helper.
76 * @return - the authentication helper which can be used for generating the appropriate
77 * headers for handling authentication challenges for user agents.
  /external/apache-http/src/org/apache/http/impl/auth/
DigestScheme.java 53 * Digest authentication scheme as defined in RFC 2617.
64 * Authentication header, the charset of the username must be compatible
86 * in case of authentication.
95 /** Whether the digest authentication process is complete */
120 * @throws MalformedChallengeException is thrown if the authentication challenge
162 * Tests if the Digest authentication process has been completed.
177 * Returns textual designation of the digest authentication scheme.
186 * Returns <tt>false</tt>. Digest authentication scheme is request based.
212 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials
213 * are not valid or not applicable for this authentication schem
    [all...]
AuthSchemeBase.java 42 * Abstract authentication scheme class that serves as a basis
43 * for all authentication schemes supported by HttpClient. This class
44 * defines the generic way of parsing an authentication challenge. It
62 * Processes the given challenge token. Some authentication schemes
68 * @throws MalformedChallengeException is thrown if the authentication challenge
  /external/chromium_org/chrome/browser/chromeos/login/
profile_auth_data.cc 133 // CookieMonster if its jar is completely empty. If authentication was
154 // Callback for receiving |cookies_to_transfer| from the authentication profile
178 // Callback for receiving |cookies_to_transfer| from the authentication profile
199 // Transfers HTTP authentication cache from the |from_context_|
201 // during the login, this authentication information will be transferred
  /external/libppp/src/
lcp.h 56 u_short his_auth; /* Peer wants this type of authentication */
69 u_short want_auth; /* We want this type of authentication */
94 unsigned chap05 : 2; /* Challenge Handshake Authentication proto */
102 unsigned pap : 2; /* Password Authentication protocol */
113 #define TY_AUTHPROTO 3 /* Authentication-Protocol */
  /external/smack/src/org/apache/qpid/management/common/sasl/
PlainSaslClient.java 62 throw new IllegalStateException("PLAIN: authentication already " +
117 throw new IllegalStateException("PLAIN: authentication not " +
131 throw new IllegalStateException("PLAIN: authentication not " +
151 throw new IllegalStateException("PLAIN: authentication not " +
182 final String userPrompt = "PLAIN authentication id: ";
  /external/wpa_supplicant_8/src/ap/
ap_mlme.c 39 * mlme_authenticate_indication - Report the establishment of an authentication
45 * authentication relationship with a specific peer MAC entity that
46 * resulted from an authentication procedure that was initiated by
66 * authentication relationship with a specific peer MAC entity
72 * authentication relationship with a specific peer MAC entity.
preauth_auth.c 2 * hostapd - Authenticator for IEEE 802.11i RSN pre-authentication
27 #define ETH_P_PREAUTH 0x88C7 /* IEEE 802.11i pre-authentication */
189 wpa_printf(MSG_DEBUG, "RSN: Removing pre-authentication STA entry for "
201 HOSTAPD_LEVEL_INFO, "pre-authentication %s",
245 wpa_printf(MSG_DEBUG, "RSN: Could not find pre-authentication "
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 34 * real identity (identity field) only to the authentication server.
56 * only be used with authentication mechanism that use this hash as the
117 * This field is used with EAP method that use TLS authentication.
167 * authentication does not use this configuration. However, it is
183 * This substring is matched against the subject of the authentication
196 * alternative subject name of the authentication server certificate.
221 * EAP-TTLS/PEAP/FAST tunnel) authentication.
238 * EAP-TTLS/PEAP/FAST tunnel) authentication.
246 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
259 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to th
    [all...]
  /hardware/samsung_slsi/exynos5/mobicore/daemon/Registry/Public/
MobiCoreRegistry.h 58 /** Stores an authentication token in registry.
59 * @param so Authentication token secure object.
64 /** Reads an authentication token from registry.
65 * @param[out] so Authentication token secure object.
70 /** Deletes the authentication token secure object from the registry.
  /external/srtp/doc/
rfc3711.txt 35 can provide confidentiality, message authentication, and replay
69 4.2. Message Authentication and Integrity . . . . . . . . . . 25
77 5.2. Message Authentication/Integrity: HMAC-SHA1. . . . . . . 29
84 7.4. Data Origin Authentication Considerations. . . . . . . . 31
85 7.5. Short and Zero-length Message Authentication . . . . . . 32
96 9.5.1. Risks of Weak or Null Message Authentication. . . 42
97 9.5.2. Implicit Header Authentication . . . . . . . . . 43
130 can provide confidentiality, message authentication, and replay
134 SRTP provides a framework for encryption and message authentication
145 encryption, a keyed-hash based function for message authentication,
    [all...]
  /external/chromium/chrome/browser/policy/
cloud_policy_identity_strategy.h 32 // Authentication credentials for talking to the device management service
66 // Retrieves authentication credentials to use when talking to the device
82 // Notify observers about authentication data change.
  /external/chromium_org/android_webview/java/src/org/chromium/android_webview/
ErrorCodeConversionHelper.java 19 // Unsupported authentication scheme (not basic or digest)
21 // User authentication failed on server
23 // User authentication failed on proxy

Completed in 1100 milliseconds

1 2 3 4 5 6 7 891011>>