/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/ |
Sasl2Test.java | 22 package org.apache.harmony.auth.tests.javax.security.sasl; 30 import javax.security.sasl.Sasl; 31 import javax.security.sasl.SaslClient; 32 import javax.security.sasl.SaslClientFactory; 33 import javax.security.sasl.SaslException; 34 import javax.security.sasl.SaslServer; 35 import javax.security.sasl.SaslServerFactory; 42 * Test for Sasl class 107 Enumeration<SaslClientFactory> en = Sasl.getSaslClientFactories() [all...] |
SaslExceptionTest.java | 22 package org.apache.harmony.auth.tests.javax.security.sasl; 24 import javax.security.sasl.SaslException;
|
/external/qemu/ |
vnc.h | 84 #include "vnc-auth-sasl.h" 103 VncDisplaySASL sasl; member in struct:VncDisplay 142 VncStateSASL sasl; member in struct:VncState
|
vnc-android.c | 142 return "vencrypt+tls+sasl"; 144 return "vencrypt+x509+sasl"; 152 return "sasl"; 177 if (client->sasl.conn && 178 client->sasl.username) 179 monitor_printf(mon, " username: %s\n", client->sasl.username); 965 * be the raw data, or may have already been encoded by SASL. 970 * both SASL, and this TLS layer. It is highly unlikely in practice 971 * though, since SASL encryption will typically be a no-op if TLS 1001 * using any SASL SSF encryption layers. Will write as much dat 2197 int sasl = 0; local [all...] |
vnc.c | 136 return "vencrypt+tls+sasl"; 138 return "vencrypt+x509+sasl"; 146 return "sasl"; 171 if (client->sasl.conn && 172 client->sasl.username) 173 monitor_printf(mon, " username: %s\n", client->sasl.username); 959 * be the raw data, or may have already been encoded by SASL. 964 * both SASL, and this TLS layer. It is highly unlikely in practice 965 * though, since SASL encryption will typically be a no-op if TLS 995 * using any SASL SSF encryption layers. Will write as much dat 2193 int sasl = 0; local [all...] |
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/ |
DigestChallenge.java | 2 * $OpenLDAP: /com/novell/sasl/client/DigestChallenge.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 18 import org.apache.harmony.javax.security.sasl.*;
|
DigestMD5SaslClient.java | 2 * $OpenLDAP: /com/novell/sasl/client/DigestMD5SaslClient.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 17 import org.apache.harmony.javax.security.sasl.*; 27 * Implements the Client portion of DigestMD5 Sasl mechanism. 65 * When the SASL authentication completes 76 * the SASL mechanism and to configure the 78 * See the Sasl class for a list of standard properties. 84 * SASL mechanisms to get further information from the 86 * For example, a SASL mechanism might require the 109 String desiredQOP = (String)props.get(Sasl.QOP) [all...] |
/external/smack/src/com/novell/sasl/client/ |
DigestChallenge.java | 2 * $OpenLDAP: /com/novell/sasl/client/DigestChallenge.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 18 import org.apache.harmony.javax.security.sasl.*;
|
DigestMD5SaslClient.java | 2 * $OpenLDAP: /com/novell/sasl/client/DigestMD5SaslClient.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 17 import org.apache.harmony.javax.security.sasl.*; 27 * Implements the Client portion of DigestMD5 Sasl mechanism. 65 * When the SASL authentication completes 76 * the SASL mechanism and to configure the 78 * See the Sasl class for a list of standard properties. 84 * SASL mechanisms to get further information from the 86 * For example, a SASL mechanism might require the 109 String desiredQOP = (String)props.get(Sasl.QOP) [all...] |
/external/smack/src/org/jivesoftware/smack/sasl/ |
SASLFacebookConnect.java | 1 package org.jivesoftware.smack.sasl; 13 import de.measite.smack.Sasl; 18 import org.jivesoftware.smack.sasl.SASLMechanism; 44 // sc = Sasl.createSaslClient(mechanisms, null, "xmpp", hostname, props, 53 stanza.append("\" xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">"); 88 sc = Sasl.createSaslClient(mechanisms, null, "xmpp", host, props, this); 96 sc = Sasl.createSaslClient(mechanisms, null, "xmpp", host, props, cbh); 150 stanza.append("<response xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
|
/external/smack/src/org/apache/harmony/javax/security/sasl/ |
Sasl.java | 18 package org.apache.harmony.javax.security.sasl; 33 public class Sasl { 40 public static final String POLICY_NOPLAINTEXT = "javax.security.sasl.policy.noplaintext"; //$NON-NLS-1$ 42 public static final String POLICY_NOACTIVE = "javax.security.sasl.policy.noactive"; //$NON-NLS-1$ 44 public static final String POLICY_NODICTIONARY = "javax.security.sasl.policy.nodictionary"; //$NON-NLS-1$ 46 public static final String POLICY_NOANONYMOUS = "javax.security.sasl.policy.noanonymous"; //$NON-NLS-1$ 48 public static final String POLICY_FORWARD_SECRECY = "javax.security.sasl.policy.forward"; //$NON-NLS-1$ 50 public static final String POLICY_PASS_CREDENTIALS = "javax.security.sasl.policy.credentials"; //$NON-NLS-1$ 52 public static final String MAX_BUFFER = "javax.security.sasl.maxbuffer"; //$NON-NLS-1$ 54 public static final String RAW_SEND_SIZE = "javax.security.sasl.rawsendsize"; //$NON-NLS-1 [all...] |
/external/smack/src/org/jivesoftware/smack/ |
SASLAuthentication.java | 28 import org.jivesoftware.smack.sasl.*;
36 * <p>This class is responsible authenticating the user using SASL, binding the resource
40 * register with the server, authenticate using Non-SASL or authenticate using SASL. If the
41 * server supports SASL then Smack will first try to authenticate using SASL. But if that
42 * fails then Non-SASL will be tried.</p>
44 * <p>The server may support many SASL mechanisms to use for authenticating. Out of the box
45 * Smack provides several SASL mechanisms, but it is possible to register new SASL Mechanisms. Use [all...] |
SASLAuthentication.java.orig | 28 import org.jivesoftware.smack.sasl.*;
36 * <p>This class is responsible authenticating the user using SASL, binding the resource
40 * register with the server, authenticate using Non-SASL or authenticate using SASL. If the
41 * server supports SASL then Smack will first try to authenticate using SASL. But if that
42 * fails then Non-SASL will be tried.</p>
44 * <p>The server may support many SASL mechanisms to use for authenticating. Out of the box
45 * Smack provides several SASL mechanisms, but it is possible to register new SASL Mechanisms. Use [all...] |
/external/chromium_org/third_party/icu/source/tools/gensprep/ |
filterRFC3454.pl | 56 "--sasl" => \$writeSASLMap, 303 $comment ="# Map table for SASL profile (rfc4013.txt)\n\n"; 660 --sasl Generate data for SASL map table
|
/external/icu4c/tools/gensprep/ |
filterRFC3454.pl | 56 "--sasl" => \$writeSASLMap, 303 $comment ="# Map table for SASL profile (rfc4013.txt)\n\n"; 660 --sasl Generate data for SASL map table
|
/external/smack/src/org/jivesoftware/smack/util/ |
PacketParserUtils.java.orig | 49 import org.jivesoftware.smack.sasl.SASLMechanism.Failure; 527 * Parse the available SASL mechanisms reported from the server. 665 * Parses SASL authentication error packets. 668 * @return a SASL Failure packet. [all...] |
PacketParserUtils.java | 48 import org.jivesoftware.smack.sasl.SASLMechanism.Failure; 526 * Parse the available SASL mechanisms reported from the server. 664 * Parses SASL authentication error packets. 667 * @return a SASL Failure packet. [all...] |