/external/ppp/pppd/plugins/radius/etc/ |
port-id-map | 5 # is reported as part of a RADIUS authentication or accouting request.
|
/external/tcpdump/ |
rpc_auth.h | 36 * auth.h, Authentication interface. 46 * Status returned from authentication check 66 * Authentication info. Opaque to client. 74 #define SUNRPC_AUTH_NONE 0 /* no authentication */
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.h | 2 * hostapd / IEEE 802.11 authentication (ACL)
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
eapol_test.sgml | 45 authentication client code from hostapd. In addition, it has 62 test suite for a RADIUS authentication server.</para> 71 <para>tries to complete EAP authentication based on the network 73 on the local host. A re-authentication is triggered to test fast 74 re-authentication. The configuration file uses the same format for 92 <listitem><para>IP address of the authentication server. The 106 <listitem><para>UDP port of the authentication server. The 113 <listitem><para>Shared secret with the authentication server. 180 <listitem><para>Save configuration after authentication.
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 2 * RSN pre-authentication (supplicant) 108 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " 122 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " 156 * rsn_preauth_init - Start new RSN pre-authentication 160 * Returns: 0 on success, -1 on another pre-authentication is in progress, 164 * This function request an RSN pre-authentication with a given destination 167 * pre-authentication. 179 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); 186 "processing for pre-authentication"); 198 "pre-authentication"); [all...] |
/external/smack/src/org/jivesoftware/smack/ |
SASLAuthentication.java | 77 * Boolean indication if SASL authentication has failed. When failed the server may end
194 * Returns true if the server offered SASL authentication besides ANONYMOUS SASL.
196 * @return true if the server offered SASL authentication besides ANONYMOUS SASL.
203 * Performs SASL authentication of the specified user. If SASL authentication was successful
234 // Trigger SASL authentication with the selected mechanism. We use
252 // SASL authentication failed and the server may have closed the connection
255 throw new XMPPException("SASL authentication " +
259 throw new XMPPException("SASL authentication failed using mechanism " +
268 // SASL authentication failed [all...] |
SASLAuthentication.java.orig | 77 * Boolean indication if SASL authentication has failed. When failed the server may end
194 * Returns true if the server offered SASL authentication besides ANONYMOUS SASL.
196 * @return true if the server offered SASL authentication besides ANONYMOUS SASL.
203 * Performs SASL authentication of the specified user. If SASL authentication was successful
234 // Trigger SASL authentication with the selected mechanism. We use
252 // SASL authentication failed and the server may have closed the connection
255 throw new XMPPException("SASL authentication " +
259 throw new XMPPException("SASL authentication failed using mechanism " +
268 // SASL authentication failed [all...] |
/external/chromium_org/net/ftp/ |
ftp_response_info.h | 18 // True if authentication failed and valid authentication credentials are
|
/external/chromium_org/net/http/ |
http_auth_cache.h | 20 // HttpAuthCache stores HTTP authentication identities and challenge info. 25 // - the last auth handler used (contains realm and authentication scheme) 43 // The authentication scheme of the challenge. 48 // The authentication challenge. 121 // |scheme| - the authentication scheme (i.e. basic, negotiate). 142 // |scheme| - the authentication scheme (i.e. basic, negotiate). 158 // |scheme| - the authentication scheme (i.e. basic, negotiate). 184 // An authentication realm entry.
|
http_auth_controller.h | 42 // Generate an authentication token for |target| if necessary. The return 99 // Invalidates any auth cache entries after authentication has failed. 122 // Holds the {scheme, host, path, port} for the authentication target. 125 // Holds the {scheme, host, port} for the authentication target. 128 // The absolute path of the resource needing authentication. 129 // For proxy authentication the path is empty. 155 // in response to an HTTP authentication challenge.
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
SASLAnonymous.java | 51 // Send the authentication to the server
57 // and send the authentication to the server
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
X509TrustManagerImpl.java | 15 throw new IllegalArgumentException("null or zero-length authentication type"); 30 throw new IllegalArgumentException("null or zero-length authentication type");
|
/external/apache-http/src/org/apache/http/client/ |
CredentialsProvider.java | 46 * Sets the {@link Credentials credentials} for the given authentication 49 * @param authscope the {@link AuthScope authentication scope} 50 * @param credentials the authentication {@link Credentials credentials} 58 * Get the {@link Credentials credentials} for the given authentication scope. 60 * @param authscope the {@link AuthScope authentication scope}
|
/external/ppp/pppd/ |
srp-entry.8 | 23 authentication files, /etc/ppp/pap\-secrets and /etc/ppp/chap\-secrets. 55 Usernames, passwords and IP addresses for SRP authentication. This 70 .I PPP Extensible Authentication Protocol (EAP). 75 .I EAP SRP\-SHA1 Authentication Protocol. 80 .I The SRP Authentication and Key Exchange System
|
eap.h | 2 * eap.h - Extensible Authentication Protocol for PPP (RFC 2284) 50 #define EAPT_RSA 9 /* RSA Public Key Authentication */ 82 eapInitial = 0, /* No EAP authentication yet requested */ 84 eapClosed, /* Authentication not in use */ 91 eapOpen, /* Completed authentication */ 93 eapBadAuth /* Failed authentication */ 108 void *ea_session; /* Authentication library linkage */
|
/external/smack/src/org/apache/harmony/javax/security/auth/ |
AuthPermission.java | 28 * associated authentication permissions are: 77 * Creates an authentication permission with the specified target name. 80 * the target name of this authentication permission. 87 * Creates an authentication permission with the specified target name. 90 * the target name of this authentication permission.
|
/libcore/luni/src/main/java/javax/net/ssl/ |
SSLParameters.java | 21 * client authentication requirements. 34 * protocols are initialized to null and client authentication 108 * Returns true if a server requires authentication from a client 117 * Sets whether or not to a server needs client authentication. 135 * Sets whether or not to a server wants client authentication.
|
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/ |
DigestMD5SaslClient.java | 64 * ID from the client's authentication credentials. 65 * When the SASL authentication completes 70 * the authentication is being performed (e.g. "ldap") 77 * authentication exchange of the selected mechanism. 85 * application/library to complete the authentication. 87 * authentication ID, password and realm from the 88 * caller. The authentication ID is requested by using 117 //doesn't support server authentication 137 * ID from the client's authentication credentials. 138 * When the SASL authentication complete [all...] |
/external/smack/src/com/novell/sasl/client/ |
DigestMD5SaslClient.java | 64 * ID from the client's authentication credentials. 65 * When the SASL authentication completes 70 * the authentication is being performed (e.g. "ldap") 77 * authentication exchange of the selected mechanism. 85 * application/library to complete the authentication. 87 * authentication ID, password and realm from the 88 * caller. The authentication ID is requested by using 117 //doesn't support server authentication 137 * ID from the client's authentication credentials. 138 * When the SASL authentication complete [all...] |
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/net/spdyproxy/ |
DataReductionProxySettings.java | 141 * that a authentication token can be generated. The host must match one of the configured proxy 142 * hosts, and the realm must be prefixed with the authentication realm string used by the data 144 * @param host The host requesting authentication. 145 * @param realm The authentication realm. 153 * Returns an authentication token for the data reduction proxy. If the token cannot be 155 * @param host The host requesting authentication. 156 * @param realm The authentication realm.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/rpc/ |
auth.h | 2 * auth.h, Authentication interface. 50 * Status returned from authentication check 80 * Authentication info. Opaque to client. 109 * Authentication ops. 150 * Unix style authentication 169 #define AUTH_NONE 0 /* no authentication */ 204 * XDR an opaque authentication struct.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpc/ |
auth.h | 2 * auth.h, Authentication interface. 50 * Status returned from authentication check 80 * Authentication info. Opaque to client. 109 * Authentication ops. 150 * Unix style authentication 169 #define AUTH_NONE 0 /* no authentication */ 204 * XDR an opaque authentication struct.
|
/frameworks/base/obex/javax/obex/ |
ObexSession.java | 55 * Called when the server received an authentication challenge header. This 56 * will cause the authenticator to handle the authentication challenge. 57 * @param header the header with the authentication challenge 68 * An authentication challenge is made up of one required and two 70 * the authentication challenge and it represents the challenge digest 146 * Create the authentication response header. It includes 1 required and 184 * Called when the server received an authentication response header. This 185 * will cause the authenticator to handle the authentication response. 186 * @param authResp the authentication response
|
/hardware/intel/img/hwcomposer/ips/common/ |
HdcpControl.cpp | 176 ELOGTRACE("failed to enable HDCP authentication"); 187 ELOGTRACE("failed to stop disable authentication"); 272 WLOGTRACE("HDCP authentication has been stopped"); 278 ELOGTRACE("HDCP authentication failed. Retry"); 289 WLOGTRACE("HDCP authentication has been stopped"); 295 // Adding delay to make sure panel receives video signal so it can start HDCP authentication. 308 // TODO: for CTP platform, IED needs to be disabled during HDCP authentication. 314 // TODO: for CTP platform, IED needs to be disabled during HDCP authentication. 322 ILOGTRACE("signal HDCP authentication completed, status = %d", mAuthenticated);
|
/external/apache-harmony/support/src/test/resources/tests/resources/manifest/ |
hyts_MANIFEST.MF | 19 Export-Package: com.ibm.ive.eccomm.client.services.authentication; specification-version=1.0.0, 20 com.ibm.ive.eccomm.service.authentication; specification-version=1.0.0, 23 Export-Service: com.ibm.ive.eccomm.service.authentication.AuthenticationService,
|