HomeSort by relevance Sort by last modified time
    Searched full:authentication (Results 101 - 125 of 1714) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/ppp/pppd/plugins/radius/etc/
port-id-map 5 # is reported as part of a RADIUS authentication or accouting request.
  /external/tcpdump/
rpc_auth.h 36 * auth.h, Authentication interface.
46 * Status returned from authentication check
66 * Authentication info. Opaque to client.
74 #define SUNRPC_AUTH_NONE 0 /* no authentication */
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.h 2 * hostapd / IEEE 802.11 authentication (ACL)
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
eapol_test.sgml 45 authentication client code from hostapd. In addition, it has
62 test suite for a RADIUS authentication server.</para>
71 <para>tries to complete EAP authentication based on the network
73 on the local host. A re-authentication is triggered to test fast
74 re-authentication. The configuration file uses the same format for
92 <listitem><para>IP address of the authentication server. The
106 <listitem><para>UDP port of the authentication server. The
113 <listitem><para>Shared secret with the authentication server.
180 <listitem><para>Save configuration after authentication.
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.c 2 * RSN pre-authentication (supplicant)
108 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with "
122 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with "
156 * rsn_preauth_init - Start new RSN pre-authentication
160 * Returns: 0 on success, -1 on another pre-authentication is in progress,
164 * This function request an RSN pre-authentication with a given destination
167 * pre-authentication.
179 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst));
186 "processing for pre-authentication");
198 "pre-authentication");
    [all...]
  /external/smack/src/org/jivesoftware/smack/
SASLAuthentication.java 77 * Boolean indication if SASL authentication has failed. When failed the server may end
194 * Returns true if the server offered SASL authentication besides ANONYMOUS SASL.
196 * @return true if the server offered SASL authentication besides ANONYMOUS SASL.
203 * Performs SASL authentication of the specified user. If SASL authentication was successful
234 // Trigger SASL authentication with the selected mechanism. We use
252 // SASL authentication failed and the server may have closed the connection
255 throw new XMPPException("SASL authentication " +
259 throw new XMPPException("SASL authentication failed using mechanism " +
268 // SASL authentication failed
    [all...]
SASLAuthentication.java.orig 77 * Boolean indication if SASL authentication has failed. When failed the server may end
194 * Returns true if the server offered SASL authentication besides ANONYMOUS SASL.
196 * @return true if the server offered SASL authentication besides ANONYMOUS SASL.
203 * Performs SASL authentication of the specified user. If SASL authentication was successful
234 // Trigger SASL authentication with the selected mechanism. We use
252 // SASL authentication failed and the server may have closed the connection
255 throw new XMPPException("SASL authentication " +
259 throw new XMPPException("SASL authentication failed using mechanism " +
268 // SASL authentication failed
    [all...]
  /external/chromium_org/net/ftp/
ftp_response_info.h 18 // True if authentication failed and valid authentication credentials are
  /external/chromium_org/net/http/
http_auth_cache.h 20 // HttpAuthCache stores HTTP authentication identities and challenge info.
25 // - the last auth handler used (contains realm and authentication scheme)
43 // The authentication scheme of the challenge.
48 // The authentication challenge.
121 // |scheme| - the authentication scheme (i.e. basic, negotiate).
142 // |scheme| - the authentication scheme (i.e. basic, negotiate).
158 // |scheme| - the authentication scheme (i.e. basic, negotiate).
184 // An authentication realm entry.
http_auth_controller.h 42 // Generate an authentication token for |target| if necessary. The return
99 // Invalidates any auth cache entries after authentication has failed.
122 // Holds the {scheme, host, path, port} for the authentication target.
125 // Holds the {scheme, host, port} for the authentication target.
128 // The absolute path of the resource needing authentication.
129 // For proxy authentication the path is empty.
155 // in response to an HTTP authentication challenge.
  /external/smack/src/org/jivesoftware/smack/sasl/
SASLAnonymous.java 51 // Send the authentication to the server
57 // and send the authentication to the server
  /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
X509TrustManagerImpl.java 15 throw new IllegalArgumentException("null or zero-length authentication type");
30 throw new IllegalArgumentException("null or zero-length authentication type");
  /external/apache-http/src/org/apache/http/client/
CredentialsProvider.java 46 * Sets the {@link Credentials credentials} for the given authentication
49 * @param authscope the {@link AuthScope authentication scope}
50 * @param credentials the authentication {@link Credentials credentials}
58 * Get the {@link Credentials credentials} for the given authentication scope.
60 * @param authscope the {@link AuthScope authentication scope}
  /external/ppp/pppd/
srp-entry.8 23 authentication files, /etc/ppp/pap\-secrets and /etc/ppp/chap\-secrets.
55 Usernames, passwords and IP addresses for SRP authentication. This
70 .I PPP Extensible Authentication Protocol (EAP).
75 .I EAP SRP\-SHA1 Authentication Protocol.
80 .I The SRP Authentication and Key Exchange System
eap.h 2 * eap.h - Extensible Authentication Protocol for PPP (RFC 2284)
50 #define EAPT_RSA 9 /* RSA Public Key Authentication */
82 eapInitial = 0, /* No EAP authentication yet requested */
84 eapClosed, /* Authentication not in use */
91 eapOpen, /* Completed authentication */
93 eapBadAuth /* Failed authentication */
108 void *ea_session; /* Authentication library linkage */
  /external/smack/src/org/apache/harmony/javax/security/auth/
AuthPermission.java 28 * associated authentication permissions are:
77 * Creates an authentication permission with the specified target name.
80 * the target name of this authentication permission.
87 * Creates an authentication permission with the specified target name.
90 * the target name of this authentication permission.
  /libcore/luni/src/main/java/javax/net/ssl/
SSLParameters.java 21 * client authentication requirements.
34 * protocols are initialized to null and client authentication
108 * Returns true if a server requires authentication from a client
117 * Sets whether or not to a server needs client authentication.
135 * Sets whether or not to a server wants client authentication.
  /external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/
DigestMD5SaslClient.java 64 * ID from the client's authentication credentials.
65 * When the SASL authentication completes
70 * the authentication is being performed (e.g. "ldap")
77 * authentication exchange of the selected mechanism.
85 * application/library to complete the authentication.
87 * authentication ID, password and realm from the
88 * caller. The authentication ID is requested by using
117 //doesn't support server authentication
137 * ID from the client's authentication credentials.
138 * When the SASL authentication complete
    [all...]
  /external/smack/src/com/novell/sasl/client/
DigestMD5SaslClient.java 64 * ID from the client's authentication credentials.
65 * When the SASL authentication completes
70 * the authentication is being performed (e.g. "ldap")
77 * authentication exchange of the selected mechanism.
85 * application/library to complete the authentication.
87 * authentication ID, password and realm from the
88 * caller. The authentication ID is requested by using
117 //doesn't support server authentication
137 * ID from the client's authentication credentials.
138 * When the SASL authentication complete
    [all...]
  /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/net/spdyproxy/
DataReductionProxySettings.java 141 * that a authentication token can be generated. The host must match one of the configured proxy
142 * hosts, and the realm must be prefixed with the authentication realm string used by the data
144 * @param host The host requesting authentication.
145 * @param realm The authentication realm.
153 * Returns an authentication token for the data reduction proxy. If the token cannot be
155 * @param host The host requesting authentication.
156 * @param realm The authentication realm.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/rpc/
auth.h 2 * auth.h, Authentication interface.
50 * Status returned from authentication check
80 * Authentication info. Opaque to client.
109 * Authentication ops.
150 * Unix style authentication
169 #define AUTH_NONE 0 /* no authentication */
204 * XDR an opaque authentication struct.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpc/
auth.h 2 * auth.h, Authentication interface.
50 * Status returned from authentication check
80 * Authentication info. Opaque to client.
109 * Authentication ops.
150 * Unix style authentication
169 #define AUTH_NONE 0 /* no authentication */
204 * XDR an opaque authentication struct.
  /frameworks/base/obex/javax/obex/
ObexSession.java 55 * Called when the server received an authentication challenge header. This
56 * will cause the authenticator to handle the authentication challenge.
57 * @param header the header with the authentication challenge
68 * An authentication challenge is made up of one required and two
70 * the authentication challenge and it represents the challenge digest
146 * Create the authentication response header. It includes 1 required and
184 * Called when the server received an authentication response header. This
185 * will cause the authenticator to handle the authentication response.
186 * @param authResp the authentication response
  /hardware/intel/img/hwcomposer/ips/common/
HdcpControl.cpp 176 ELOGTRACE("failed to enable HDCP authentication");
187 ELOGTRACE("failed to stop disable authentication");
272 WLOGTRACE("HDCP authentication has been stopped");
278 ELOGTRACE("HDCP authentication failed. Retry");
289 WLOGTRACE("HDCP authentication has been stopped");
295 // Adding delay to make sure panel receives video signal so it can start HDCP authentication.
308 // TODO: for CTP platform, IED needs to be disabled during HDCP authentication.
314 // TODO: for CTP platform, IED needs to be disabled during HDCP authentication.
322 ILOGTRACE("signal HDCP authentication completed, status = %d", mAuthenticated);
  /external/apache-harmony/support/src/test/resources/tests/resources/manifest/
hyts_MANIFEST.MF 19 Export-Package: com.ibm.ive.eccomm.client.services.authentication; specification-version=1.0.0,
20 com.ibm.ive.eccomm.service.authentication; specification-version=1.0.0,
23 Export-Service: com.ibm.ive.eccomm.service.authentication.AuthenticationService,

Completed in 315 milliseconds

1 2 3 45 6 7 8 91011>>