/external/nist-sip/java/gov/nist/javax/sip/ |
SipStackExt.java | 55 * Get the authentication helper. 61 * @return - the authentication helper which can be used for generating the appropriate 62 * headers for handling authentication challenges for user agents. 70 * Get the authentication helper. 76 * @return - the authentication helper which can be used for generating the appropriate 77 * headers for handling authentication challenges for user agents.
|
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 53 * Digest authentication scheme as defined in RFC 2617. 64 * Authentication header, the charset of the username must be compatible 86 * in case of authentication. 95 /** Whether the digest authentication process is complete */ 120 * @throws MalformedChallengeException is thrown if the authentication challenge 162 * Tests if the Digest authentication process has been completed. 177 * Returns textual designation of the digest authentication scheme. 186 * Returns <tt>false</tt>. Digest authentication scheme is request based. 212 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials 213 * are not valid or not applicable for this authentication schem [all...] |
AuthSchemeBase.java | 42 * Abstract authentication scheme class that serves as a basis 43 * for all authentication schemes supported by HttpClient. This class 44 * defines the generic way of parsing an authentication challenge. It 62 * Processes the given challenge token. Some authentication schemes 68 * @throws MalformedChallengeException is thrown if the authentication challenge
|
/external/chromium_org/chrome/browser/chromeos/login/managed/ |
managed_user_creation_controller_old.cc | 155 SupervisedUserAuthentication* authentication = manager->GetAuthentication(); local 157 if (authentication->FillDataForNewUser(creation_context_->local_user_id, 161 authentication->StorePasswordData(creation_context_->local_user_id, 172 authentication->TransformKey(context).GetKey()->GetSecret()); 200 SupervisedUserAuthentication* authentication = local 205 creation_context_->master_key = authentication->GenerateMasterKey(); 214 authentication->TransformKey(context).GetKey()->GetSecret(),
|
/external/ipsec-tools/src/racoon/doc/ |
README.plainrsa | 3 Before you begin, you should understand that the RSA authentication 19 RSA authentication. For the purpose of this document, we assume that 20 we are setting up RSA authentication between two networked hosts 64 each host to (a) turn on RSA authentication, and (b) designate each 70 directory you have just specified it will fail the authentication 87 5) You have finished configuring the host for RSA authentication. 102 3) You have specified the "rsasig" method for authentication in the
|
FAQ | 54 Enable hybrid authentication, and ISAKMP mode config and 58 Enable the use of RADIUS with hybrid authentication on the 59 server side. RADIUS is used for authentication, configuration 62 Enable the use of PAM with hybrid authentication on the 63 server side. PAM can be used for authentication and accounting.
|
/external/wpa_supplicant_8/hs20/server/www/ |
est.php | 26 die('Authentication failed'); 31 die('Authentication failed'); 62 die('Authentication failed'); 70 error_log("EST: Incorrect authentication response for user=$user realm=$realm"); 71 die('Authentication failed'); 100 error_log("EST: simpleenroll - require authentication"); 101 die('Authentication required');
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 34 * real identity (identity field) only to the authentication server. 56 * only be used with authentication mechanism that use this hash as the 117 * This field is used with EAP method that use TLS authentication. 167 * authentication does not use this configuration. However, it is 183 * This substring is matched against the subject of the authentication 196 * alternative subject name of the authentication server certificate. 239 * EAP-TTLS/PEAP/FAST tunnel) authentication. 256 * EAP-TTLS/PEAP/FAST tunnel) authentication. 264 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 277 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to th [all...] |
/libcore/luni/src/main/java/javax/net/ssl/ |
SSLEngine.java | 774 * Returns whether this engine instance will require client authentication. 776 * @return {@code true} if this engine will require client authentication, 777 * {@code false} if no client authentication is needed. 815 * Returns whether this engine will request client authentication. 817 * @return {@code true} if client authentication will be requested, 874 * Sets whether this engine must require client authentication. The client 875 * authentication is one of: 877 * <li>authentication required</li> 878 * <li>authentication requested</li> 879 * <li>no authentication needed</li [all...] |
/external/chromium_org/chrome/browser/chromeos/login/ |
profile_auth_data.cc | 133 // CookieMonster if its jar is completely empty. If authentication was 154 // Callback for receiving |cookies_to_transfer| from the authentication profile 178 // Callback for receiving |cookies_to_transfer| from the authentication profile 199 // Transfers HTTP authentication cache from the |from_context_| 201 // during the login, this authentication information will be transferred
|
/external/chromium_org/remoting/protocol/ |
authenticator.h | 27 // Authenticator is an abstract interface for authentication protocol 32 // authentication is reported. 92 // Returns whether authentication has started. The chromoting host uses this 109 // authentication message that needs to be sent to the peer. 126 // authentication part of the session-initiate stanza so that
|
content_description_unittest.cc | 47 " <authentication/>" 70 " <authentication/>" 90 " <authentication/>"
|
/external/smack/src/org/apache/qpid/management/common/sasl/ |
PlainSaslClient.java | 62 throw new IllegalStateException("PLAIN: authentication already " + 117 throw new IllegalStateException("PLAIN: authentication not " + 131 throw new IllegalStateException("PLAIN: authentication not " + 151 throw new IllegalStateException("PLAIN: authentication not " + 182 final String userPrompt = "PLAIN authentication id: ";
|
/external/wpa_supplicant_8/src/ap/ |
ap_mlme.c | 40 * mlme_authenticate_indication - Report the establishment of an authentication 46 * authentication relationship with a specific peer MAC entity that 47 * resulted from an authentication procedure that was initiated by 67 * authentication relationship with a specific peer MAC entity 73 * authentication relationship with a specific peer MAC entity.
|
preauth_auth.c | 2 * hostapd - Authenticator for IEEE 802.11i RSN pre-authentication 27 #define ETH_P_PREAUTH 0x88C7 /* IEEE 802.11i pre-authentication */ 189 wpa_printf(MSG_DEBUG, "RSN: Removing pre-authentication STA entry for " 201 HOSTAPD_LEVEL_INFO, "pre-authentication %s", 245 wpa_printf(MSG_DEBUG, "RSN: Could not find pre-authentication "
|
/hardware/samsung_slsi/exynos5/mobicore/daemon/Registry/Public/ |
MobiCoreRegistry.h | 58 /** Stores an authentication token in registry. 59 * @param so Authentication token secure object. 64 /** Reads an authentication token from registry. 65 * @param[out] so Authentication token secure object. 70 /** Deletes the authentication token secure object from the registry.
|
/external/chromium_org/third_party/libsrtp/srtp/doc/ |
rfc3711.txt | 35 can provide confidentiality, message authentication, and replay 69 4.2. Message Authentication and Integrity . . . . . . . . . . 25 77 5.2. Message Authentication/Integrity: HMAC-SHA1. . . . . . . 29 84 7.4. Data Origin Authentication Considerations. . . . . . . . 31 85 7.5. Short and Zero-length Message Authentication . . . . . . 32 96 9.5.1. Risks of Weak or Null Message Authentication. . . 42 97 9.5.2. Implicit Header Authentication . . . . . . . . . 43 130 can provide confidentiality, message authentication, and replay 134 SRTP provides a framework for encryption and message authentication 145 encryption, a keyed-hash based function for message authentication, [all...] |
/external/srtp/doc/ |
rfc3711.txt | 35 can provide confidentiality, message authentication, and replay 69 4.2. Message Authentication and Integrity . . . . . . . . . . 25 77 5.2. Message Authentication/Integrity: HMAC-SHA1. . . . . . . 29 84 7.4. Data Origin Authentication Considerations. . . . . . . . 31 85 7.5. Short and Zero-length Message Authentication . . . . . . 32 96 9.5.1. Risks of Weak or Null Message Authentication. . . 42 97 9.5.2. Implicit Header Authentication . . . . . . . . . 43 130 can provide confidentiality, message authentication, and replay 134 SRTP provides a framework for encryption and message authentication 145 encryption, a keyed-hash based function for message authentication, [all...] |
/external/chromium_org/third_party/libsrtp/srtp/include/ |
srtp.h | 83 * (authentication tag and MKI) supported by libSRTP. This value is 107 sec_serv_auth = 2, /**< authentication */ 108 sec_serv_conf_and_auth = 3 /**< confidentiality and authentication */ 127 * authentication function. */ 128 int auth_key_len; /**< The length of the authentication 130 int auth_tag_len; /**< The length of the authentication 302 * @warning This function assumes that it can write the authentication 361 * authentication check. 506 * policy structure to a short-authentication tag policy 514 * Counter Mode encryption and HMAC-SHA1 authentication, with a [all...] |
ekt.h | 155 * authentication (copying the auth tag into a temporary location, 176 * This function does the pre-processing of the SRTCP authentication 179 * fields. The Base Authentication Tag field is set to the all-zero
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
ErrorCodeConversionHelper.java | 19 // Unsupported authentication scheme (not basic or digest) 21 // User authentication failed on server 23 // User authentication failed on proxy
|
/external/chromium_org/chrome/browser/chromeos/login/auth/ |
authenticator.h | 23 // 1. On successful authentication, will call consumer_->OnLoginSuccess(). 31 // |user_context|), this method attempts to complete authentication process. 90 // authentication process.
|
/external/chromium_org/net/third_party/nss/ssl/ |
sslt.h | 121 /* server authentication info */ 148 /* server authentication info */ 166 * bits of the authentication tag. */
|
/external/chromium_org/remoting/host/policy_hack/ |
policy_watcher.h | 52 // The name of the policy for requiring 2-factor authentication. 69 // The names of the policies for token authentication URLs. 74 // The name of the policy for disabling PIN-less authentication.
|
/external/srtp/include/ |
ekt.h | 155 * authentication (copying the auth tag into a temporary location, 176 * This function does the pre-processing of the SRTCP authentication 179 * fields. The Base Authentication Tag field is set to the all-zero
|