/external/wpa_supplicant_8/hs20/server/www/ |
spp.php | 38 error_log("spp.php - Authentication failed - missing: " . print_r($needed)); 39 die('Authentication failed'); 43 error_log("spp.php - Authentication failed - empty username"); 44 die('Authentication failed'); 62 error_log("spp.php - Authentication failed - user '$user' not found"); 63 die('Authentication failed'); 66 error_log("spp.php - Authentication failed - empty password"); 67 die('Authentication failed'); 75 error_log("Authentication failure - response mismatch"); 76 die('Authentication failed') [all...] |
/external/smack/src/org/jivesoftware/smack/ |
NonSASLAuthentication.java | 24 import org.jivesoftware.smack.packet.Authentication;
32 * Implementation of JEP-0078: Non-SASL Authentication. Follow the following
60 // If we send an authentication packet in "get" mode with just the username,
61 // the server will return the list of authentication protocols it supports.
62 Authentication discoveryAuth = new Authentication();
80 Authentication authTypes = (Authentication) response;
83 // Now, create the authentication packet we'll send to the server.
84 Authentication auth = new Authentication(); [all...] |
/external/smack/src/org/jivesoftware/smack/packet/ |
Authentication.java | 26 * Authentication packet, which can be used to login to a XMPP server as well 29 public class Authentication extends IQ { 37 * Create a new authentication packet. By default, the packet will be in 38 * "set" mode in order to perform an actual authentication with the server. 39 * In order to send a "get" request to get the available authentication 44 public Authentication() { 88 * authentication compared to plain text. The digest is the hex-encoded 90 * digest and password are set, digest authentication will be used. If 91 * only one value is set, the respective authentication mode will be used. 101 * digests offer a more secure alternative for authentication compared t [all...] |
/external/chromium_org/third_party/icu/source/data/sprep/ |
spreplocal.mk | 27 # rfc4505 : Anonymous Simple Authentication and Security Layer (SASL) Mechanism
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/ |
__init__.py | 251 if headername == 'authentication-info': 408 # Then we also need a list of URIs that have already demanded authentication 414 class Authentication(object): 448 class BasicAuthentication(Authentication): 450 Authentication.__init__(self, credentials, host, request_uri, headers, response, content, http) 458 class DigestAuthentication(Authentication): 462 Authentication.__init__(self, credentials, host, request_uri, headers, response, content, http) 500 if not response.has_key('authentication-info'): 507 updated_challenge = _parse_www_authenticate(response, 'authentication-info').get('digest', {}) 515 class HmacDigestAuthentication(Authentication) [all...] |
/external/smack/src/org/jivesoftware/smack/util/ |
PacketParserUtils.java.orig | 34 import org.jivesoftware.smack.packet.Authentication; 384 private static Authentication parseAuthentication(XmlPullParser parser) throws Exception { 385 Authentication authentication = new Authentication(); 391 authentication.setUsername(parser.nextText()); 394 authentication.setPassword(parser.nextText()); 397 authentication.setDigest(parser.nextText()); 400 authentication.setResource(parser.nextText()); 409 return authentication; [all...] |
PacketParserUtils.java | 33 import org.jivesoftware.smack.packet.Authentication; 383 private static Authentication parseAuthentication(XmlPullParser parser) throws Exception { 384 Authentication authentication = new Authentication(); local 390 authentication.setUsername(parser.nextText()); 393 authentication.setPassword(parser.nextText()); 396 authentication.setDigest(parser.nextText()); 399 authentication.setResource(parser.nextText()); 408 return authentication; [all...] |
/prebuilts/eclipse/maven/apache-maven-3.2.1/lib/ |
maven-artifact-3.2.1.jar | |
aether-util-0.9.0.M2.jar | |
aether-api-0.9.0.M2.jar | |
/external/chromium_org/remoting/host/linux/ |
linux_me2me_host.py | 170 class Authentication: 171 """Manage authentication tokens for Chromoting/xmpp""" [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
sql.h | 503 SQLRETURN SQL_API SQLConnect(SQLHDBC ConnectionHandle,SQLCHAR *ServerName,SQLSMALLINT NameLength1,SQLCHAR *UserName,SQLSMALLINT NameLength2,SQLCHAR *Authentication,SQLSMALLINT NameLength3);
|
/prebuilts/tools/common/m2/repository/org/eclipse/aether/aether-util/0.9.0.M3/ |
aether-util-0.9.0.M3.jar | |
/external/chromium_org/chrome/browser/resources/google_now/ |
utility.js | 962 * @return {Object} The Authentication Manager interface. 969 * @return {Promise} A promise to get the authentication token. If there is [all...] |
background.js | 300 * Checks the result of the HTTP Request and updates the authentication 302 * @param {string} token Authentication token to validate against an [all...] |
/external/chromium_org/remoting/webapp/ |
host_list.js | 372 console.error('Could not rename host. Authentication failure.');
|
/external/mdnsresponder/mDNSCore/ |
mDNSEmbeddedAPI.h | [all...] |
/external/chromium_org/net/quic/crypto/ |
common_cert_set_1_50.inc | 333 TLS Web Server Authentication, TLS Web Client Authentication, Netscape Server Gated Crypto, 2.16.840.1.113733.1.8.1 [all...] |
common_cert_set_51_100.inc | 61 Netscape Server Gated Crypto, 2.16.840.1.113733.1.8.1, TLS Web Server Authentication, TLS Web Client Authentication 258 TLS Web Server Authentication, TLS Web Client Authentication, Netscape Server Gated Crypto, 2.16.840.1.113733.1.8.1 476 TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, Netscape Server Gated Crypto, 2.16.840.1.113733.1.8.1 [all...] |