/external/smack/src/org/apache/harmony/javax/security/sasl/ |
SaslException.java | 18 package org.apache.harmony.javax.security.sasl;
|
Sasl.java | 18 package org.apache.harmony.javax.security.sasl; 33 public class Sasl { 40 public static final String POLICY_NOPLAINTEXT = "javax.security.sasl.policy.noplaintext"; //$NON-NLS-1$ 42 public static final String POLICY_NOACTIVE = "javax.security.sasl.policy.noactive"; //$NON-NLS-1$ 44 public static final String POLICY_NODICTIONARY = "javax.security.sasl.policy.nodictionary"; //$NON-NLS-1$ 46 public static final String POLICY_NOANONYMOUS = "javax.security.sasl.policy.noanonymous"; //$NON-NLS-1$ 48 public static final String POLICY_FORWARD_SECRECY = "javax.security.sasl.policy.forward"; //$NON-NLS-1$ 50 public static final String POLICY_PASS_CREDENTIALS = "javax.security.sasl.policy.credentials"; //$NON-NLS-1$ 52 public static final String MAX_BUFFER = "javax.security.sasl.maxbuffer"; //$NON-NLS-1$ 54 public static final String RAW_SEND_SIZE = "javax.security.sasl.rawsendsize"; //$NON-NLS-1 [all...] |
/external/smack/src/org/jivesoftware/smack/sasl/ |
SASLAnonymous.java | 20 package org.jivesoftware.smack.sasl;
28 * Implementation of the SASL ANONYMOUS mechanism
|
SASLMechanism.java | 21 package org.jivesoftware.smack.sasl;
36 import org.apache.harmony.javax.security.sasl.RealmCallback;
37 import org.apache.harmony.javax.security.sasl.RealmChoiceCallback;
38 import de.measite.smack.Sasl;
39 import org.apache.harmony.javax.security.sasl.SaslClient;
40 import org.apache.harmony.javax.security.sasl.SaslException;
43 * Base class for SASL mechanisms. Subclasses must implement these methods:
45 * <li>{@link #getName()} -- returns the common name of the SASL mechanism.</li>
92 sc = Sasl.createSaslClient(mechanisms, username, "xmpp", host, props, this);
109 sc = Sasl.createSaslClient(mechanisms, username, "xmpp", host, props, cbh); [all...] |
SASLGSSAPIMechanism.java | 20 package org.jivesoftware.smack.sasl;
28 import de.measite.smack.Sasl;
32 * Implementation of the SASL GSSAPI mechanism
64 props.put(Sasl.SERVER_AUTH,"TRUE");
65 sc = Sasl.createSaslClient(mechanisms, username, "xmpp", host, props, cbh);
83 props.put(Sasl.SERVER_AUTH,"TRUE");
84 sc = Sasl.createSaslClient(mechanisms, username, "xmpp", host, props, this);
|
SASLFacebookConnect.java | 1 package org.jivesoftware.smack.sasl; 13 import de.measite.smack.Sasl; 18 import org.jivesoftware.smack.sasl.SASLMechanism; 44 // sc = Sasl.createSaslClient(mechanisms, null, "xmpp", hostname, props, 53 stanza.append("\" xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">"); 88 sc = Sasl.createSaslClient(mechanisms, null, "xmpp", host, props, this); 96 sc = Sasl.createSaslClient(mechanisms, null, "xmpp", host, props, cbh); 150 stanza.append("<response xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
|
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/ |
TokenParser.java | 2 * $OpenLDAP: /com/novell/sasl/client/TokenParser.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 17 import org.apache.harmony.javax.security.sasl.*;
|
DirectiveList.java | 2 * $OpenLDAP: /com/novell/sasl/client/DirectiveList.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 18 import org.apache.harmony.javax.security.sasl.*;
|
DigestChallenge.java | 2 * $OpenLDAP: /com/novell/sasl/client/DigestChallenge.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 18 import org.apache.harmony.javax.security.sasl.*;
|
DigestMD5SaslClient.java | 2 * $OpenLDAP: /com/novell/sasl/client/DigestMD5SaslClient.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 17 import org.apache.harmony.javax.security.sasl.*; 27 * Implements the Client portion of DigestMD5 Sasl mechanism. 65 * When the SASL authentication completes 76 * the SASL mechanism and to configure the 78 * See the Sasl class for a list of standard properties. 84 * SASL mechanisms to get further information from the 86 * For example, a SASL mechanism might require the 109 String desiredQOP = (String)props.get(Sasl.QOP) [all...] |
/external/smack/src/com/novell/sasl/client/ |
TokenParser.java | 2 * $OpenLDAP: /com/novell/sasl/client/TokenParser.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 17 import org.apache.harmony.javax.security.sasl.*;
|
DirectiveList.java | 2 * $OpenLDAP: /com/novell/sasl/client/DirectiveList.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 18 import org.apache.harmony.javax.security.sasl.*;
|
DigestChallenge.java | 2 * $OpenLDAP: /com/novell/sasl/client/DigestChallenge.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 18 import org.apache.harmony.javax.security.sasl.*;
|
DigestMD5SaslClient.java | 2 * $OpenLDAP: /com/novell/sasl/client/DigestMD5SaslClient.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $ 15 package com.novell.sasl.client; 17 import org.apache.harmony.javax.security.sasl.*; 27 * Implements the Client portion of DigestMD5 Sasl mechanism. 65 * When the SASL authentication completes 76 * the SASL mechanism and to configure the 78 * See the Sasl class for a list of standard properties. 84 * SASL mechanisms to get further information from the 86 * For example, a SASL mechanism might require the 109 String desiredQOP = (String)props.get(Sasl.QOP) [all...] |
/external/smack/src/org/apache/qpid/management/common/sasl/ |
PlainSaslClient.java | 21 package org.apache.qpid.management.common.sasl; 28 import de.measite.smack.Sasl; 29 import org.apache.harmony.javax.security.sasl.SaslClient; 30 import org.apache.harmony.javax.security.sasl.SaslException; 140 if (propName.equals(Sasl.QOP))
|
UserPasswordCallbackHandler.java | 20 package org.apache.qpid.management.common.sasl;
|
UsernameHashedPasswordCallbackHandler.java | 21 package org.apache.qpid.management.common.sasl;
|
/external/smack/src/org/jivesoftware/smack/ |
BOSHPacketReader.java | 26 import org.jivesoftware.smack.sasl.SASLMechanism.Challenge; 27 import org.jivesoftware.smack.sasl.SASLMechanism.Failure; 28 import org.jivesoftware.smack.sasl.SASLMechanism.Success; 90 // The server is challenging the SASL authentication 112 if ("urn:ietf:params:xml:ns:xmpp-sasl".equals(parser.getNamespace(null))) { 144 // The server is reporting available SASL mechanisms. Store
|
PacketReader.java | 25 import org.jivesoftware.smack.sasl.SASLMechanism.Challenge; 26 import org.jivesoftware.smack.sasl.SASLMechanism.Failure; 27 import org.jivesoftware.smack.sasl.SASLMechanism.Success; 239 // SASL authentication has failed. The server may close the connection 247 // The server is challenging the SASL authentication made by the client 260 // The SASL authentication with the server was successful. The next step 339 // The server is reporting available SASL mechanisms. Store this information
|
SASLAuthentication.java | 28 import org.jivesoftware.smack.sasl.*;
36 * <p>This class is responsible authenticating the user using SASL, binding the resource
40 * register with the server, authenticate using Non-SASL or authenticate using SASL. If the
41 * server supports SASL then Smack will first try to authenticate using SASL. But if that
42 * fails then Non-SASL will be tried.</p>
44 * <p>The server may support many SASL mechanisms to use for authenticating. Out of the box
45 * Smack provides several SASL mechanisms, but it is possible to register new SASL Mechanisms. Use [all...] |
SASLAuthentication.java.orig | 28 import org.jivesoftware.smack.sasl.*;
36 * <p>This class is responsible authenticating the user using SASL, binding the resource
40 * register with the server, authenticate using Non-SASL or authenticate using SASL. If the
41 * server supports SASL then Smack will first try to authenticate using SASL. But if that
42 * fails then Non-SASL will be tried.</p>
44 * <p>The server may support many SASL mechanisms to use for authenticating. Out of the box
45 * Smack provides several SASL mechanisms, but it is possible to register new SASL Mechanisms. Use [all...] |
/external/chromium_org/remoting/webapp/unittests/ |
xmpp_login_handler_unittest.js | 53 '<mechanisms xmlns="urn:ietf:params:xml:ns:xmpp-sasl">' + 70 '<auth xmlns="urn:ietf:params:xml:ns:xmpp-sasl" mechanism="X-OAUTH2" ' + 83 '<mechanisms xmlns="urn:ietf:params:xml:ns:xmpp-sasl">' + 95 base.encodeUtf8('<success xmlns="urn:ietf:params:xml:ns:xmpp-sasl"/>')); 133 base.encodeUtf8('<failure xmlns="urn:ietf:params:xml:ns:xmpp-sasl">' +
|
/external/qemu/ui/ |
vnc.h | 84 #include "vnc-auth-sasl.h" 103 VncDisplaySASL sasl; member in struct:VncDisplay 142 VncStateSASL sasl; member in struct:VncState
|
vnc-android.c | 144 return "vencrypt+tls+sasl"; 146 return "vencrypt+x509+sasl"; 154 return "sasl"; 179 if (client->sasl.conn && 180 client->sasl.username) 181 monitor_printf(mon, " username: %s\n", client->sasl.username); 967 * be the raw data, or may have already been encoded by SASL. 972 * both SASL, and this TLS layer. It is highly unlikely in practice 973 * though, since SASL encryption will typically be a no-op if TLS 1003 * using any SASL SSF encryption layers. Will write as much dat 2197 int sasl = 0; local [all...] |
vnc.c | 136 return "vencrypt+tls+sasl"; 138 return "vencrypt+x509+sasl"; 146 return "sasl"; 171 if (client->sasl.conn && 172 client->sasl.username) 173 monitor_printf(mon, " username: %s\n", client->sasl.username); 959 * be the raw data, or may have already been encoded by SASL. 964 * both SASL, and this TLS layer. It is highly unlikely in practice 965 * though, since SASL encryption will typically be a no-op if TLS 995 * using any SASL SSF encryption layers. Will write as much dat 2193 int sasl = 0; local [all...] |