HomeSort by relevance Sort by last modified time
    Searched refs:sasl (Results 51 - 67 of 67) sorted by null

1 23

  /external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/
Sasl2Test.java 22 package org.apache.harmony.auth.tests.javax.security.sasl;
30 import javax.security.sasl.Sasl;
31 import javax.security.sasl.SaslClient;
32 import javax.security.sasl.SaslClientFactory;
33 import javax.security.sasl.SaslException;
34 import javax.security.sasl.SaslServer;
35 import javax.security.sasl.SaslServerFactory;
42 * Test for Sasl class
107 Enumeration<SaslClientFactory> en = Sasl.getSaslClientFactories()
    [all...]
SaslExceptionTest.java 22 package org.apache.harmony.auth.tests.javax.security.sasl;
24 import javax.security.sasl.SaslException;
  /external/qemu/
vnc.h 84 #include "vnc-auth-sasl.h"
103 VncDisplaySASL sasl; member in struct:VncDisplay
142 VncStateSASL sasl; member in struct:VncState
vnc-android.c 142 return "vencrypt+tls+sasl";
144 return "vencrypt+x509+sasl";
152 return "sasl";
177 if (client->sasl.conn &&
178 client->sasl.username)
179 monitor_printf(mon, " username: %s\n", client->sasl.username);
965 * be the raw data, or may have already been encoded by SASL.
970 * both SASL, and this TLS layer. It is highly unlikely in practice
971 * though, since SASL encryption will typically be a no-op if TLS
1001 * using any SASL SSF encryption layers. Will write as much dat
2197 int sasl = 0; local
    [all...]
vnc.c 136 return "vencrypt+tls+sasl";
138 return "vencrypt+x509+sasl";
146 return "sasl";
171 if (client->sasl.conn &&
172 client->sasl.username)
173 monitor_printf(mon, " username: %s\n", client->sasl.username);
959 * be the raw data, or may have already been encoded by SASL.
964 * both SASL, and this TLS layer. It is highly unlikely in practice
965 * though, since SASL encryption will typically be a no-op if TLS
995 * using any SASL SSF encryption layers. Will write as much dat
2193 int sasl = 0; local
    [all...]
  /external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/
DigestChallenge.java 2 * $OpenLDAP: /com/novell/sasl/client/DigestChallenge.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
18 import org.apache.harmony.javax.security.sasl.*;
DigestMD5SaslClient.java 2 * $OpenLDAP: /com/novell/sasl/client/DigestMD5SaslClient.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
17 import org.apache.harmony.javax.security.sasl.*;
27 * Implements the Client portion of DigestMD5 Sasl mechanism.
65 * When the SASL authentication completes
76 * the SASL mechanism and to configure the
78 * See the Sasl class for a list of standard properties.
84 * SASL mechanisms to get further information from the
86 * For example, a SASL mechanism might require the
109 String desiredQOP = (String)props.get(Sasl.QOP)
    [all...]
  /external/smack/src/com/novell/sasl/client/
DigestChallenge.java 2 * $OpenLDAP: /com/novell/sasl/client/DigestChallenge.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
18 import org.apache.harmony.javax.security.sasl.*;
DigestMD5SaslClient.java 2 * $OpenLDAP: /com/novell/sasl/client/DigestMD5SaslClient.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
17 import org.apache.harmony.javax.security.sasl.*;
27 * Implements the Client portion of DigestMD5 Sasl mechanism.
65 * When the SASL authentication completes
76 * the SASL mechanism and to configure the
78 * See the Sasl class for a list of standard properties.
84 * SASL mechanisms to get further information from the
86 * For example, a SASL mechanism might require the
109 String desiredQOP = (String)props.get(Sasl.QOP)
    [all...]
  /external/smack/src/org/jivesoftware/smack/sasl/
SASLFacebookConnect.java 1 package org.jivesoftware.smack.sasl;
13 import de.measite.smack.Sasl;
18 import org.jivesoftware.smack.sasl.SASLMechanism;
44 // sc = Sasl.createSaslClient(mechanisms, null, "xmpp", hostname, props,
53 stanza.append("\" xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
88 sc = Sasl.createSaslClient(mechanisms, null, "xmpp", host, props, this);
96 sc = Sasl.createSaslClient(mechanisms, null, "xmpp", host, props, cbh);
150 stanza.append("<response xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
  /external/smack/src/org/apache/harmony/javax/security/sasl/
Sasl.java 18 package org.apache.harmony.javax.security.sasl;
33 public class Sasl {
40 public static final String POLICY_NOPLAINTEXT = "javax.security.sasl.policy.noplaintext"; //$NON-NLS-1$
42 public static final String POLICY_NOACTIVE = "javax.security.sasl.policy.noactive"; //$NON-NLS-1$
44 public static final String POLICY_NODICTIONARY = "javax.security.sasl.policy.nodictionary"; //$NON-NLS-1$
46 public static final String POLICY_NOANONYMOUS = "javax.security.sasl.policy.noanonymous"; //$NON-NLS-1$
48 public static final String POLICY_FORWARD_SECRECY = "javax.security.sasl.policy.forward"; //$NON-NLS-1$
50 public static final String POLICY_PASS_CREDENTIALS = "javax.security.sasl.policy.credentials"; //$NON-NLS-1$
52 public static final String MAX_BUFFER = "javax.security.sasl.maxbuffer"; //$NON-NLS-1$
54 public static final String RAW_SEND_SIZE = "javax.security.sasl.rawsendsize"; //$NON-NLS-1
    [all...]
  /external/smack/src/org/jivesoftware/smack/
SASLAuthentication.java 28 import org.jivesoftware.smack.sasl.*;
36 * <p>This class is responsible authenticating the user using SASL, binding the resource
40 * register with the server, authenticate using Non-SASL or authenticate using SASL. If the
41 * server supports SASL then Smack will first try to authenticate using SASL. But if that
42 * fails then Non-SASL will be tried.</p>
44 * <p>The server may support many SASL mechanisms to use for authenticating. Out of the box
45 * Smack provides several SASL mechanisms, but it is possible to register new SASL Mechanisms. Use
    [all...]
SASLAuthentication.java.orig 28 import org.jivesoftware.smack.sasl.*;
36 * <p>This class is responsible authenticating the user using SASL, binding the resource
40 * register with the server, authenticate using Non-SASL or authenticate using SASL. If the
41 * server supports SASL then Smack will first try to authenticate using SASL. But if that
42 * fails then Non-SASL will be tried.</p>
44 * <p>The server may support many SASL mechanisms to use for authenticating. Out of the box
45 * Smack provides several SASL mechanisms, but it is possible to register new SASL Mechanisms. Use
    [all...]
  /external/chromium_org/third_party/icu/source/tools/gensprep/
filterRFC3454.pl 56 "--sasl" => \$writeSASLMap,
303 $comment ="# Map table for SASL profile (rfc4013.txt)\n\n";
660 --sasl Generate data for SASL map table
  /external/icu4c/tools/gensprep/
filterRFC3454.pl 56 "--sasl" => \$writeSASLMap,
303 $comment ="# Map table for SASL profile (rfc4013.txt)\n\n";
660 --sasl Generate data for SASL map table
  /external/smack/src/org/jivesoftware/smack/util/
PacketParserUtils.java.orig 49 import org.jivesoftware.smack.sasl.SASLMechanism.Failure;
527 * Parse the available SASL mechanisms reported from the server.
665 * Parses SASL authentication error packets.
668 * @return a SASL Failure packet.
    [all...]
PacketParserUtils.java 48 import org.jivesoftware.smack.sasl.SASLMechanism.Failure;
526 * Parse the available SASL mechanisms reported from the server.
664 * Parses SASL authentication error packets.
667 * @return a SASL Failure packet.
    [all...]

Completed in 245 milliseconds

1 23