HomeSort by relevance Sort by last modified time
    Searched full:authentication (Results 51 - 75 of 1782) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium/chrome/browser/ui/login/
login_prompt.h 28 // authentication info to the net::URLRequest that needs it. These functions
46 // Sets information about the authentication type (|form|) and the
51 // Returns the TabContents that needs authentication.
54 // Returns the RenderViewHostDelegate for the page that needs authentication.
57 // Resend the request with authentication credentials.
72 // if it was waiting for the same authentication.
77 // Who/where/what asked for the authentication.
80 // Returns whether authentication had been handled (SetAuth or CancelAuth).
88 // Notify observers that authentication is needed.
101 // Notify observers that authentication is supplied
    [all...]
  /external/chromium_org/chrome/browser/chromeos/login/
authentication_notification_details.h 8 // A class to hold the parameters we get back from an authentication attempt
  /external/chromium_org/remoting/protocol/
auth_util.h 29 // Size of the HMAC-SHA-256 digest used for channel authentication.
33 // authentication. Remove them when we finally switch to V2
34 // authentication method. crbug.com/110483 .
45 // Returns authentication bytes that must be used for the given
channel_authenticator.h 21 // authentication. Depending on implementation channel authenticators
31 // Start authentication of the given |socket|. |done_callback| is
32 // called when authentication is finished. Callback may be invoked
third_party_authenticator_base.h 24 // Implements an authentication method that relies on a third party server for
25 // authentication of both client and host.
26 // When third party authentication is being used, the client must request both a
32 // an authentication key, which is used to establish the connection.
47 // XML tag names for third party authentication fields.
third_party_client_authenticator.h 21 // Implements the client side of the third party authentication mechanism.
25 // interactive authentication, the |TokenFetcher| implementation will show the
34 // authentication finishes. |token| is an opaque string that should be sent
48 // |token_fetched_callback| is called when the client authentication ends,
58 // |host_public_key|. |token_fetcher| is used to get the authentication token.
  /external/iptables/extensions/
libip6t_ah.man 1 This module matches the parameters in Authentication header of IPsec packets.
  /external/openssh/contrib/aix/
pam.conf 6 # Authentication Management
  /external/openssh/
ssh-keysign.0 4 ssh-keysign - ssh helper program for host-based authentication
11 the digital signature required during host-based authentication with SSH
20 authentication.
33 host-based authentication is used.
sshd_config 37 # Authentication:
79 # Set this to 'yes' to enable PAM authentication, account processing,
80 # and session processing. If this is enabled, PAM authentication will
83 # PAM authentication via ChallengeResponseAuthentication may bypass
86 # PAM authentication, then enable this but set PasswordAuthentication
sshd_config.android 36 # Authentication:
78 # Set this to 'yes' to enable PAM authentication, account processing,
79 # and session processing. If this is enabled, PAM authentication will
82 # PAM authentication via ChallengeResponseAuthentication may bypass
85 # PAM authentication, then enable this but set PasswordAuthentication
ssh-agent.0 4 ssh-agent - authentication agent
12 authentication (RSA, DSA, ECDSA). The idea is that ssh-agent is started
16 automatically used for authentication when logging in to other machines
52 If neither of these is the case then the authentication will fail. It
58 terminal. Authentication data need not be stored on any other machine,
59 and authentication passphrases never go over the network. However, the
92 Contains the protocol version 1 RSA authentication identity of
96 Contains the protocol version 2 DSA authentication identity of
100 Contains the protocol version 2 ECDSA authentication identity of
104 Contains the protocol version 2 RSA authentication identity o
    [all...]
ssh2.h 36 * different authentication methods)
38 * User authentication protocol:
40 * 50-59 User authentication generic
41 * 60-79 User authentication method specific (numbers can be reused
42 * for different authentication methods)
105 /* user authentication: generic */
112 /* user authentication: method specific, can be reused */
  /development/samples/SampleSyncAdapter/src/com/example/android/samplesync/authenticator/
AuthenticationService.java 25 * Service to handle Account authentication. It instantiates the authenticator
37 Log.v(TAG, "SampleSyncAdapter Authentication Service started.");
45 Log.v(TAG, "SampleSyncAdapter Authentication Service stopped.");
  /external/chromium_org/third_party/WebKit/ManualTests/blackberry/
http-auth-challenge.html 4 <p>This test case is to test the behavior of http authentication challenge dialog. This is for <a href="https://bugs.webkit.org/show_bug.cgi?id=80135">https://bugs.webkit.org/show_bug.cgi?id=80135</a></p>
10 <li>Start test case, then press Cancel button when authentication dialog pops up;</li>
15 <li>Start test case again, then press Ok button without input anything when authentication dialog pops up;</li>
  /external/wpa_supplicant_8/hostapd/
hostapd.8 13 is a user space daemon for access point and authentication servers.
14 It implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP Authenticators and RADIUS authentication server.
18 is designed to be a "daemon" program that runs in the background and acts as the backend component controlling authentication.
wired.conf 21 # for IEEE 802.1X with external Authentication Server, IEEE 802.11
22 # authentication with external ACL for MAC addresses, and accounting
32 # RADIUS authentication server
hlr_auc_gw.txt 4 database/authentication gateway interface to HLR/AuC. It could be
6 authentication center (HLR/AuC). hostapd will send SIM/AKA
7 authentication queries over a UNIX domain socket to and external
10 hlr_auc_gw can be configured with GSM and UMTS authentication data with
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
34 -g<triplet file> = path for GSM authentication triplets
79 authentication server for EAP-SIM/AKA/AKA':
  /external/chromium_org/chrome/browser/ui/login/
login_prompt.h 30 // authentication info to the net::URLRequest that needs it. These functions
50 // Sets information about the authentication type (|form|) and the
55 // Returns the WebContents that needs authentication.
58 // Resend the request with authentication credentials.
69 // if it was waiting for the same authentication.
74 // Who/where/what asked for the authentication.
77 // Returns whether authentication had been handled (SetAuth or CancelAuth).
85 // Notify observers that authentication is needed.
101 // Notify observers that authentication is supplied.
105 // Notify observers that authentication is cancelled
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
AuthenticationHelper.java 42 * @param cacheTime The amount of time (seconds ) for which the authentication helper
44 * If you specify -1, then the authentication credentials are cached
61 * Attach authentication headers to the given request. This looks up
62 * the credential cache and picks up any stored authentication headers
64 * @param request - the request for which we attach the authentication headers.
  /frameworks/base/core/java/android/webkit/
WebViewDatabase.java 27 * <li>HTTP authentication username/password pairs</li>
49 * Note that these are unrelated to HTTP authentication credentials.
63 * Note that these are unrelated to HTTP authentication credentials.
75 * Gets whether there are any saved credentials for HTTP authentication.
87 * Clears any saved credentials for HTTP authentication.
  /external/chromium_org/crypto/
p224_spake.h 22 // permitted authentication attempts otherwise they get many one-shot oracles.)
29 // kResultFailed: The authentication has failed. You can get a human readable
31 // kResultSuccess: The authentication was successful.
50 // peer_type: the type of the local authentication party.
52 // authentication must pass the same value. For the case of a
58 // in the authentication.
74 // The authentication state machine is very simple and each party proceeds
  /external/chromium_org/net/base/
auth.h 17 // Holds info about an authentication challenge that we may want to display
33 // The authentication scheme used, such as "basic" or "digest". If the
45 // Authentication Credentials for an authentication credentials.
84 // Authentication structures
94 AuthState state; // whether we need, have, or gave up on authentication.
97 // We wouldn't instantiate this class if we didn't need authentication.
  /external/ipsec-tools/src/racoon/samples/roadwarrior/
README 2 remote access using hybrid authentication. In this setup, the VPN
18 using authentication against the system password database, and using
22 authentication, IP allocation and accounting. The address and secret
27 is set up to use hybrid authentication (aka mutual group authentication,
60 Note that for now there is no feedback in racoonctl if the authentication
67 hybrid authentication, though this has not been tested.
  /external/chromium/net/http/
http_auth.h 25 // Utility class for http authentication.
28 // Http authentication can be done the the proxy server, origin server,
52 AUTHORIZATION_RESULT_INVALID, // The authentication challenge headers are
64 // Describes where the identity used for authentication came from.
122 // Returns a string representation of an authentication Scheme.
132 // |origin| is used by the NTLM and Negotiation authentication scheme to
144 // authentication attempt. For connection-based authentication schemes, the
145 // new response may be another round in a multi-round authentication sequence.
151 // authentication round
    [all...]

Completed in 358 milliseconds

1 23 4 5 6 7 8 91011>>