OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:authentication
(Results
51 - 75
of
1782
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/chromium/chrome/browser/ui/login/
login_prompt.h
28
//
authentication
info to the net::URLRequest that needs it. These functions
46
// Sets information about the
authentication
type (|form|) and the
51
// Returns the TabContents that needs
authentication
.
54
// Returns the RenderViewHostDelegate for the page that needs
authentication
.
57
// Resend the request with
authentication
credentials.
72
// if it was waiting for the same
authentication
.
77
// Who/where/what asked for the
authentication
.
80
// Returns whether
authentication
had been handled (SetAuth or CancelAuth).
88
// Notify observers that
authentication
is needed.
101
// Notify observers that
authentication
is supplied
[
all
...]
/external/chromium_org/chrome/browser/chromeos/login/
authentication_notification_details.h
8
// A class to hold the parameters we get back from an
authentication
attempt
/external/chromium_org/remoting/protocol/
auth_util.h
29
// Size of the HMAC-SHA-256 digest used for channel
authentication
.
33
//
authentication
. Remove them when we finally switch to V2
34
//
authentication
method. crbug.com/110483 .
45
// Returns
authentication
bytes that must be used for the given
channel_authenticator.h
21
//
authentication
. Depending on implementation channel authenticators
31
// Start
authentication
of the given |socket|. |done_callback| is
32
// called when
authentication
is finished. Callback may be invoked
third_party_authenticator_base.h
24
// Implements an
authentication
method that relies on a third party server for
25
//
authentication
of both client and host.
26
// When third party
authentication
is being used, the client must request both a
32
// an
authentication
key, which is used to establish the connection.
47
// XML tag names for third party
authentication
fields.
third_party_client_authenticator.h
21
// Implements the client side of the third party
authentication
mechanism.
25
// interactive
authentication
, the |TokenFetcher| implementation will show the
34
//
authentication
finishes. |token| is an opaque string that should be sent
48
// |token_fetched_callback| is called when the client
authentication
ends,
58
// |host_public_key|. |token_fetcher| is used to get the
authentication
token.
/external/iptables/extensions/
libip6t_ah.man
1
This module matches the parameters in
Authentication
header of IPsec packets.
/external/openssh/contrib/aix/
pam.conf
6
#
Authentication
Management
/external/openssh/
ssh-keysign.0
4
ssh-keysign - ssh helper program for host-based
authentication
11
the digital signature required during host-based
authentication
with SSH
20
authentication
.
33
host-based
authentication
is used.
sshd_config
37
#
Authentication
:
79
# Set this to 'yes' to enable PAM
authentication
, account processing,
80
# and session processing. If this is enabled, PAM
authentication
will
83
# PAM
authentication
via ChallengeResponseAuthentication may bypass
86
# PAM
authentication
, then enable this but set PasswordAuthentication
sshd_config.android
36
#
Authentication
:
78
# Set this to 'yes' to enable PAM
authentication
, account processing,
79
# and session processing. If this is enabled, PAM
authentication
will
82
# PAM
authentication
via ChallengeResponseAuthentication may bypass
85
# PAM
authentication
, then enable this but set PasswordAuthentication
ssh-agent.0
4
ssh-agent -
authentication
agent
12
authentication
(RSA, DSA, ECDSA). The idea is that ssh-agent is started
16
automatically used for
authentication
when logging in to other machines
52
If neither of these is the case then the
authentication
will fail. It
58
terminal.
Authentication
data need not be stored on any other machine,
59
and
authentication
passphrases never go over the network. However, the
92
Contains the protocol version 1 RSA
authentication
identity of
96
Contains the protocol version 2 DSA
authentication
identity of
100
Contains the protocol version 2 ECDSA
authentication
identity of
104
Contains the protocol version 2 RSA
authentication
identity o
[
all
...]
ssh2.h
36
* different
authentication
methods)
38
* User
authentication
protocol:
40
* 50-59 User
authentication
generic
41
* 60-79 User
authentication
method specific (numbers can be reused
42
* for different
authentication
methods)
105
/* user
authentication
: generic */
112
/* user
authentication
: method specific, can be reused */
/development/samples/SampleSyncAdapter/src/com/example/android/samplesync/authenticator/
AuthenticationService.java
25
* Service to handle Account
authentication
. It instantiates the authenticator
37
Log.v(TAG, "SampleSyncAdapter
Authentication
Service started.");
45
Log.v(TAG, "SampleSyncAdapter
Authentication
Service stopped.");
/external/chromium_org/third_party/WebKit/ManualTests/blackberry/
http-auth-challenge.html
4
<p>This test case is to test the behavior of http
authentication
challenge dialog. This is for <a href="https://bugs.webkit.org/show_bug.cgi?id=80135">https://bugs.webkit.org/show_bug.cgi?id=80135</a></p>
10
<li>Start test case, then press Cancel button when
authentication
dialog pops up;</li>
15
<li>Start test case again, then press Ok button without input anything when
authentication
dialog pops up;</li>
/external/wpa_supplicant_8/hostapd/
hostapd.8
13
is a user space daemon for access point and
authentication
servers.
14
It implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP Authenticators and RADIUS
authentication
server.
18
is designed to be a "daemon" program that runs in the background and acts as the backend component controlling
authentication
.
wired.conf
21
# for IEEE 802.1X with external
Authentication
Server, IEEE 802.11
22
#
authentication
with external ACL for MAC addresses, and accounting
32
# RADIUS
authentication
server
hlr_auc_gw.txt
4
database/
authentication
gateway interface to HLR/AuC. It could be
6
authentication
center (HLR/AuC). hostapd will send SIM/AKA
7
authentication
queries over a UNIX domain socket to and external
10
hlr_auc_gw can be configured with GSM and UMTS
authentication
data with
13
dynamic
authentication
data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
34
-g<triplet file> = path for GSM
authentication
triplets
79
authentication
server for EAP-SIM/AKA/AKA':
/external/chromium_org/chrome/browser/ui/login/
login_prompt.h
30
//
authentication
info to the net::URLRequest that needs it. These functions
50
// Sets information about the
authentication
type (|form|) and the
55
// Returns the WebContents that needs
authentication
.
58
// Resend the request with
authentication
credentials.
69
// if it was waiting for the same
authentication
.
74
// Who/where/what asked for the
authentication
.
77
// Returns whether
authentication
had been handled (SetAuth or CancelAuth).
85
// Notify observers that
authentication
is needed.
101
// Notify observers that
authentication
is supplied.
105
// Notify observers that
authentication
is cancelled
[
all
...]
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
AuthenticationHelper.java
42
* @param cacheTime The amount of time (seconds ) for which the
authentication
helper
44
* If you specify -1, then the
authentication
credentials are cached
61
* Attach
authentication
headers to the given request. This looks up
62
* the credential cache and picks up any stored
authentication
headers
64
* @param request - the request for which we attach the
authentication
headers.
/frameworks/base/core/java/android/webkit/
WebViewDatabase.java
27
* <li>HTTP
authentication
username/password pairs</li>
49
* Note that these are unrelated to HTTP
authentication
credentials.
63
* Note that these are unrelated to HTTP
authentication
credentials.
75
* Gets whether there are any saved credentials for HTTP
authentication
.
87
* Clears any saved credentials for HTTP
authentication
.
/external/chromium_org/crypto/
p224_spake.h
22
// permitted
authentication
attempts otherwise they get many one-shot oracles.)
29
// kResultFailed: The
authentication
has failed. You can get a human readable
31
// kResultSuccess: The
authentication
was successful.
50
// peer_type: the type of the local
authentication
party.
52
//
authentication
must pass the same value. For the case of a
58
// in the
authentication
.
74
// The
authentication
state machine is very simple and each party proceeds
/external/chromium_org/net/base/
auth.h
17
// Holds info about an
authentication
challenge that we may want to display
33
// The
authentication
scheme used, such as "basic" or "digest". If the
45
//
Authentication
Credentials for an
authentication
credentials.
84
//
Authentication
structures
94
AuthState state; // whether we need, have, or gave up on
authentication
.
97
// We wouldn't instantiate this class if we didn't need
authentication
.
/external/ipsec-tools/src/racoon/samples/roadwarrior/
README
2
remote access using hybrid
authentication
. In this setup, the VPN
18
using
authentication
against the system password database, and using
22
authentication
, IP allocation and accounting. The address and secret
27
is set up to use hybrid
authentication
(aka mutual group
authentication
,
60
Note that for now there is no feedback in racoonctl if the
authentication
67
hybrid
authentication
, though this has not been tested.
/external/chromium/net/http/
http_auth.h
25
// Utility class for http
authentication
.
28
// Http
authentication
can be done the the proxy server, origin server,
52
AUTHORIZATION_RESULT_INVALID, // The
authentication
challenge headers are
64
// Describes where the identity used for
authentication
came from.
122
// Returns a string representation of an
authentication
Scheme.
132
// |origin| is used by the NTLM and Negotiation
authentication
scheme to
144
//
authentication
attempt. For connection-based
authentication
schemes, the
145
// new response may be another round in a multi-round
authentication
sequence.
151
//
authentication
round
[
all
...]
Completed in 358 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>