/external/wpa_supplicant_8/hostapd/ |
hostapd_cli.1 | 18 is a user space daemon for access point and authentication servers. 19 It implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP Authenticators and RADIUS authentication server.
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
Connection.java | 36 * <li>calls some of the authentication methods (e.g., {@link #authenticateWithPublicKey(String, File, String) authenticateWithPublicKey()}).</li> 148 * If the authentication phase is complete, <code>true</code> will be 150 * authentication steps are needed), <code>false</code> is returned and 151 * one can retry either by using this or any other authentication method 228 * If the authentication phase is complete, <code>true</code> will be 230 * authentication steps are needed), <code>false</code> is returned and 231 * one can retry either by using this or any other authentication method 282 * If the authentication phase is complete, <code>true</code> will be 284 * authentication steps are needed), <code>false</code> is returned and 285 * one can retry either by using this or any other authentication metho [all...] |
/external/openssh/ |
ssh.0 | 39 -A Enables forwarding of the authentication agent connection. This 51 -a Disables forwarding of the authentication agent connection. 139 key authentication is read. The default is ~/.ssh/identity for 148 -K Enables GSSAPI-based authentication and forwarding (delegation) 184 MAC (message authentication code) algorithms can be specified in 340 authentication, and configuration problems. Multiple -v options 387 AUTHENTICATION 391 support similar authentication methods, but protocol 2 is the default 398 The methods available for authentication are: GSSAPI-based 399 authentication, host-based authentication, public key authentication [all...] |
ssh.1 | 111 Enables forwarding of the authentication agent connection. 123 Disables forwarding of the authentication agent connection. 271 public key authentication is read. 292 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI 355 (message authentication code) algorithms can 569 debugging connection, authentication, and configuration problems. 654 .Sh AUTHENTICATION 666 Both protocols support similar authentication methods, 676 The methods available for authentication are: 677 GSSAPI-based authentication, [all...] |
sshd_config.5 | 156 for user authentication. 176 certificate authentication. 180 to be accepted for authentication. 206 is only used when authentication proceeds using a CA listed in 217 authentication is allowed. 224 Specifies whether challenge-response authentication is allowed (e.g. via 225 PAM or though authentication styles supported in 232 to after authentication. 423 Specifies whether user authentication based on GSSAPI is allowed. 434 Specifies whether rhosts or /etc/hosts.equiv authentication togethe [all...] |
auth-rsa.c | 6 * RSA-based authentication. This code determines whether to admit a login 7 * based on RSA authentication. This file also contains functions to check 55 * Session identifier that is used to bind key exchange and authentication 125 * Performs the RSA authentication challenge-response dialog with the client, 291 * Performs the RSA authentication dialog with the client. This returns 292 * 0 if the client could not be authenticated, and 1 if authentication was 314 verbose("Wrong response to RSA authentication challenge."); 315 packet_send_debug("Wrong response to RSA authentication challenge."); 327 * authentication to be rejected. 335 packet_send_debug("RSA authentication accepted.") [all...] |
sshd.8 | 76 key exchange, encryption, authentication, command execution, 222 authentication, and termination of each connection is logged. 257 from making DNS requests unless the authentication 259 Authentication mechanisms that may require DNS include 271 .Sh AUTHENTICATION 316 through a cryptographic message authentication code 320 Finally, the server and the client enter an authentication dialog. 322 host-based authentication, 323 public key authentication, 324 challenge-response authentication, [all...] |
auth.h | 52 int postponed; /* authentication needs another step */ 78 * Every authentication method has to handle authentication requests for 189 /* debug messages during authentication */ 198 #define AUTH_FAIL_MSG "Too many authentication failures for %.100s"
|
/external/ipsec-tools/src/racoon/doc/ |
README.gssapi | 1 The gss-api authentication mechanism implementation for racoon was 11 by login authentication daemons) in these situations is to add 12 a set of special credentials to be used. For example, authentication 42 * The racoon.conf file accepts "gssapi_krb" as authentication 93 With the Heimdal gss-api implementation, the gssapi_krb authentication 96 gss_accept_sec_context when mutual authentication is requested.
|
README.plainrsa | 3 Before you begin, you should understand that the RSA authentication 19 RSA authentication. For the purpose of this document, we assume that 20 we are setting up RSA authentication between two networked hosts 64 each host to (a) turn on RSA authentication, and (b) designate each 70 directory you have just specified it will fail the authentication 87 5) You have finished configuring the host for RSA authentication. 102 3) You have specified the "rsasig" method for authentication in the
|
FAQ | 54 Enable hybrid authentication, and ISAKMP mode config and 58 Enable the use of RADIUS with hybrid authentication on the 59 server side. RADIUS is used for authentication, configuration 62 Enable the use of PAM with hybrid authentication on the 63 server side. PAM can be used for authentication and accounting.
|
/external/kernel-headers/original/linux/sunrpc/ |
svcauth.h | 4 * RPC server-side authentication stuff. 28 /* Authentication is done in the context of a domain. 34 * a common mechanism for authentication and having a common mapping 40 * A domain is created by an authentication flavour module based on name 55 * Each authentication flavour registers an auth_ops 61 * If there is a problem with the authentication *authp should be set.
|
/external/nist-sip/java/gov/nist/javax/sip/ |
SipStackExt.java | 55 * Get the authentication helper. 61 * @return - the authentication helper which can be used for generating the appropriate 62 * headers for handling authentication challenges for user agents. 70 * Get the authentication helper. 76 * @return - the authentication helper which can be used for generating the appropriate 77 * headers for handling authentication challenges for user agents.
|
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 53 * Digest authentication scheme as defined in RFC 2617. 64 * Authentication header, the charset of the username must be compatible 86 * in case of authentication. 95 /** Whether the digest authentication process is complete */ 120 * @throws MalformedChallengeException is thrown if the authentication challenge 162 * Tests if the Digest authentication process has been completed. 177 * Returns textual designation of the digest authentication scheme. 186 * Returns <tt>false</tt>. Digest authentication scheme is request based. 212 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials 213 * are not valid or not applicable for this authentication schem [all...] |
AuthSchemeBase.java | 42 * Abstract authentication scheme class that serves as a basis 43 * for all authentication schemes supported by HttpClient. This class 44 * defines the generic way of parsing an authentication challenge. It 62 * Processes the given challenge token. Some authentication schemes 68 * @throws MalformedChallengeException is thrown if the authentication challenge
|
/external/chromium_org/chrome/browser/chromeos/login/ |
profile_auth_data.cc | 133 // CookieMonster if its jar is completely empty. If authentication was 154 // Callback for receiving |cookies_to_transfer| from the authentication profile 178 // Callback for receiving |cookies_to_transfer| from the authentication profile 199 // Transfers HTTP authentication cache from the |from_context_| 201 // during the login, this authentication information will be transferred
|
/external/libppp/src/ |
lcp.h | 56 u_short his_auth; /* Peer wants this type of authentication */ 69 u_short want_auth; /* We want this type of authentication */ 94 unsigned chap05 : 2; /* Challenge Handshake Authentication proto */ 102 unsigned pap : 2; /* Password Authentication protocol */ 113 #define TY_AUTHPROTO 3 /* Authentication-Protocol */
|
/external/smack/src/org/apache/qpid/management/common/sasl/ |
PlainSaslClient.java | 62 throw new IllegalStateException("PLAIN: authentication already " + 117 throw new IllegalStateException("PLAIN: authentication not " + 131 throw new IllegalStateException("PLAIN: authentication not " + 151 throw new IllegalStateException("PLAIN: authentication not " + 182 final String userPrompt = "PLAIN authentication id: ";
|
/external/wpa_supplicant_8/src/ap/ |
ap_mlme.c | 39 * mlme_authenticate_indication - Report the establishment of an authentication 45 * authentication relationship with a specific peer MAC entity that 46 * resulted from an authentication procedure that was initiated by 66 * authentication relationship with a specific peer MAC entity 72 * authentication relationship with a specific peer MAC entity.
|
preauth_auth.c | 2 * hostapd - Authenticator for IEEE 802.11i RSN pre-authentication 27 #define ETH_P_PREAUTH 0x88C7 /* IEEE 802.11i pre-authentication */ 189 wpa_printf(MSG_DEBUG, "RSN: Removing pre-authentication STA entry for " 201 HOSTAPD_LEVEL_INFO, "pre-authentication %s", 245 wpa_printf(MSG_DEBUG, "RSN: Could not find pre-authentication "
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 34 * real identity (identity field) only to the authentication server. 56 * only be used with authentication mechanism that use this hash as the 117 * This field is used with EAP method that use TLS authentication. 167 * authentication does not use this configuration. However, it is 183 * This substring is matched against the subject of the authentication 196 * alternative subject name of the authentication server certificate. 221 * EAP-TTLS/PEAP/FAST tunnel) authentication. 238 * EAP-TTLS/PEAP/FAST tunnel) authentication. 246 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 259 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to th [all...] |
/hardware/samsung_slsi/exynos5/mobicore/daemon/Registry/Public/ |
MobiCoreRegistry.h | 58 /** Stores an authentication token in registry. 59 * @param so Authentication token secure object. 64 /** Reads an authentication token from registry. 65 * @param[out] so Authentication token secure object. 70 /** Deletes the authentication token secure object from the registry.
|
/external/srtp/doc/ |
rfc3711.txt | 35 can provide confidentiality, message authentication, and replay 69 4.2. Message Authentication and Integrity . . . . . . . . . . 25 77 5.2. Message Authentication/Integrity: HMAC-SHA1. . . . . . . 29 84 7.4. Data Origin Authentication Considerations. . . . . . . . 31 85 7.5. Short and Zero-length Message Authentication . . . . . . 32 96 9.5.1. Risks of Weak or Null Message Authentication. . . 42 97 9.5.2. Implicit Header Authentication . . . . . . . . . 43 130 can provide confidentiality, message authentication, and replay 134 SRTP provides a framework for encryption and message authentication 145 encryption, a keyed-hash based function for message authentication, [all...] |
/external/chromium/chrome/browser/policy/ |
cloud_policy_identity_strategy.h | 32 // Authentication credentials for talking to the device management service 66 // Retrieves authentication credentials to use when talking to the device 82 // Notify observers about authentication data change.
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
ErrorCodeConversionHelper.java | 19 // Unsupported authentication scheme (not basic or digest) 21 // User authentication failed on server 23 // User authentication failed on proxy
|