HomeSort by relevance Sort by last modified time
    Searched full:authentication (Results 76 - 100 of 1782) sorted by null

1 2 34 5 6 7 8 91011>>

  /frameworks/base/core/java/android/net/http/
HttpAuthHeader.java 22 * HttpAuthHeader: a class to store HTTP authentication-header parameters.
23 * For more information, see: RFC 2617: HTTP Authentication.
29 * Possible HTTP-authentication header tokens to search for:
42 * An authentication scheme. We currently support two different schemes:
86 * value "auth" indicates authentication; the value "auth-int"
87 * indicates authentication with integrity protection.
98 * Is this authentication request a proxy authentication request?
113 * Creates a new HTTP-authentication header object from the
116 * most one authentication-scheme (ensured by the caller)
    [all...]
  /external/wpa_supplicant_8/hostapd/
README 2 Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
87 Any wired Ethernet driver for wired IEEE 802.1X authentication
111 minimal authentication mechanism for stations, whereas IEEE 802.1X
116 Access Entity, and Authentication Server. Supplicant is a component in
117 a station and it performs the authentication with the Authenticatio
    [all...]
  /external/chromium_org/chrome/browser/resources/gaia_auth_host/
gaia_auth_host.js 8 * authentication flow. There are two events would be raised after this point:
9 * a 'ready' event when the authentication UI is ready to use and a 'completed'
10 * event when the authentication is completed successfully. If caller is
12 * {@code load} call. The callback will be invoked when the authentication is
89 * Invoked when authentication is completed successfully with credential
97 * useOffline: false // Whether the authentication uses the offline flow.
120 * the authentication is completed successfully. The callback is
157 * Invoked to process authentication success.
169 * Checks if message comes from the loaded authentication extension.
194 if (!/^complete(Login|Authentication)$|^offlineLogin$/.test(msg.method)
    [all...]
  /external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/
Socks5Client.java 34 * SOCKS5 proxy requires authentication. This implementation only supports the no-authentication
35 * authentication method.
122 * Initializes the connection to the SOCKS5 proxy by negotiating authentication method and
123 * requesting a stream for the given digest. Currently only the no-authentication method is
143 // authentication negotiation
147 cmd[1] = (byte) 0x01; // number of authentication methods supported
148 cmd[2] = (byte) 0x00; // authentication method: no-authentication required
156 // check if server responded with correct version and no-authentication method
    [all...]
  /external/srtp/crypto/ae_xfm/
xfm.c 36 /* check if we're doing authentication only */
39 /* perform authentication only */
51 /* derive encryption and authentication keys from the input key */
63 /* perform encryption and authentication */
113 /* check if we're doing authentication only */
116 /* perform authentication only */
128 /* derive encryption and authentication keys from the input key */
139 /* perform encryption and authentication */
197 /* check if we're doing authentication only */
200 /* perform authentication only *
    [all...]
  /external/openssh/
sshconnect1.c 7 * login (authentication) dialog.
59 * Checks if the user has an authentication agent, and if so, tries to
86 debug("Trying RSA authentication via agent with '%.100s'", comment);
99 does not support RSA authentication. */
107 packet_disconnect("Protocol error during RSA authentication: %d",
122 logit("Authentication agent failed to decrypt challenge.");
138 /* The server returns success if it accepted the authentication. */
142 debug("RSA authentication accepted by server.");
152 debug("RSA authentication using agent refused.");
202 * Checks if the user has authentication file, and if so, tries to authenticat
    [all...]
ssh-add.0 4 ssh-add - adds private key identities to the authentication agent
12 ssh-add adds private key identities to the authentication agent,
24 The authentication agent must be running and the SSH_AUTH_SOCK
31 before being used for authentication. Confirmation is performed
83 Contains the protocol version 1 RSA authentication identity of
87 Contains the protocol version 2 DSA authentication identity of
91 Contains the protocol version 2 ECDSA authentication identity of
95 Contains the protocol version 2 RSA authentication identity of
103 ssh-add is unable to contact the authentication agent.
ssh.h 15 /* Cipher used for encrypting authentication files. */
22 * Maximum number of RSA authentication identity files that can be specified
56 * authentication agent.
62 * authentication socket.
  /external/chromium/net/http/
http_auth_filter.h 19 // |HttpAuthFilter|s determine whether an authentication scheme should be
25 // Checks if (|url|, |target|) is supported by the authentication scheme.
30 // Whitelist HTTP authentication filter.
  /external/chromium_org/chrome/browser/policy/proto/cloud/
chrome_extension_policy.proto 23 // An authentication method that can be used to verify that the client is
26 // No authentication is performed; knowledge of the URL is enough to
41 // The authentication method that the client must use to fetch |download_url|.
  /external/chromium_org/net/http/
http_auth_filter.h 19 // |HttpAuthFilter|s determine whether an authentication scheme should be
25 // Checks if (|url|, |target|) is supported by the authentication scheme.
30 // Whitelist HTTP authentication filter.
  /external/ppp/pppd/plugins/radius/
pppd-radius.8 10 radius.so \- RADIUS authentication plugin for
21 MS-CHAPv2 authentication against a RADIUS server instead of the usual
58 appropriately. If you use the RADIUS plugin, the normal pppd authentication
  /frameworks/base/core/java/android/webkit/
HttpAuthHandler.java 22 * Represents a request for HTTP authentication. Instances of this class are
50 * Instructs the WebView to cancel the authentication request.
56 * Instructs the WebView to proceed with the authentication with the given
  /external/apache-http/src/org/apache/http/client/params/
AuthPolicy.java 41 * The NTLM scheme is a proprietary Microsoft Windows Authentication
43 * authentication schemes).
48 * Digest authentication scheme as defined in RFC2617.
53 * Basic authentication scheme as defined in RFC2617 (considered inherently
  /external/apache-http/src/org/apache/http/impl/auth/
BasicScheme.java 47 * Basic authentication scheme as defined in RFC 2617.
64 /** Whether the basic authentication process is complete */
76 * Returns textual designation of the basic authentication scheme.
89 * @throws MalformedChallengeException is thrown if the authentication challenge
100 * Tests if the Basic authentication process has been completed.
110 * Returns <tt>false</tt>. Basic authentication scheme is request based.
123 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials
124 * are not valid or not applicable for this authentication scheme
126 * be generated due to an authentication failure
RFC2617Scheme.java 45 * Abstract authentication scheme class that lays foundation for all
47 * to all authentication schemes defined in RFC 2617.
54 * Authentication parameter map.
72 throw new MalformedChallengeException("Authentication challenge is empty");
82 * Returns authentication parameters map. Keys in the map are lower-cased.
84 * @return the map of authentication parameters
94 * Returns authentication parameter with the given name, if available.
111 * Returns authentication realm. The realm may not be null.
113 * @return the authentication realm
  /external/apache-http/src/org/apache/http/impl/client/
BasicCredentialsProvider.java 66 * Sets the {@link Credentials credentials} for the given authentication
69 * @param authscope the {@link AuthScope authentication scope}
70 * @param credentials the authentication {@link Credentials credentials}
79 throw new IllegalArgumentException("Authentication scope may not be null");
85 * Find matching {@link Credentials credentials} for the given authentication scope.
88 * @param authscope the {@link AuthScope authentication scope}
117 * Get the {@link Credentials credentials} for the given authentication scope.
119 * @param authscope the {@link AuthScope authentication scope}
126 throw new IllegalArgumentException("Authentication scope may not be null");
  /external/chromium_org/chrome/browser/chromeos/login/enrollment/
enrollment_screen_actor.h 24 // Existing enrollment domain doesn't match authentication user.
66 // Resets the authentication state and invokes the passed callback on
79 // Show an authentication error.
82 // Show non-authentication error.
  /external/chromium_org/remoting/protocol/
authentication_method.h 5 // AuthenticationMethod represents an authentication algorithm and its
6 // configuration. It knows how to parse and format authentication
36 // Constructors for various authentication methods.
42 // Parses a string that defines an authentication method. Returns an
  /external/dropbear/
TODO 11 - check that there aren't timing issues with valid/invalid user authentication
  /external/kernel-headers/original/linux/nfsd/
auth.h 4 * nfsd-specific authentication stuff.
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
package.html 2 This package contains a set of utilities for client side Authentication Challenge handling. It has been
  /external/ppp/pppd/plugins/radius/etc/
port-id-map 5 # is reported as part of a RADIUS authentication or accouting request.
  /external/tcpdump/
rpc_auth.h 36 * auth.h, Authentication interface.
46 * Status returned from authentication check
66 * Authentication info. Opaque to client.
74 #define SUNRPC_AUTH_NONE 0 /* no authentication */
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.h 2 * hostapd / IEEE 802.11 authentication (ACL)

Completed in 1192 milliseconds

1 2 34 5 6 7 8 91011>>