HomeSort by relevance Sort by last modified time
    Searched refs:sasl (Results 26 - 50 of 55) sorted by null

12 3

  /external/smack/src/org/apache/harmony/javax/security/sasl/
SaslException.java 18 package org.apache.harmony.javax.security.sasl;
Sasl.java 18 package org.apache.harmony.javax.security.sasl;
33 public class Sasl {
40 public static final String POLICY_NOPLAINTEXT = "javax.security.sasl.policy.noplaintext"; //$NON-NLS-1$
42 public static final String POLICY_NOACTIVE = "javax.security.sasl.policy.noactive"; //$NON-NLS-1$
44 public static final String POLICY_NODICTIONARY = "javax.security.sasl.policy.nodictionary"; //$NON-NLS-1$
46 public static final String POLICY_NOANONYMOUS = "javax.security.sasl.policy.noanonymous"; //$NON-NLS-1$
48 public static final String POLICY_FORWARD_SECRECY = "javax.security.sasl.policy.forward"; //$NON-NLS-1$
50 public static final String POLICY_PASS_CREDENTIALS = "javax.security.sasl.policy.credentials"; //$NON-NLS-1$
52 public static final String MAX_BUFFER = "javax.security.sasl.maxbuffer"; //$NON-NLS-1$
54 public static final String RAW_SEND_SIZE = "javax.security.sasl.rawsendsize"; //$NON-NLS-1
    [all...]
  /external/smack/src/org/jivesoftware/smack/sasl/
SASLAnonymous.java 20 package org.jivesoftware.smack.sasl;
28 * Implementation of the SASL ANONYMOUS mechanism
SASLMechanism.java 21 package org.jivesoftware.smack.sasl;
36 import org.apache.harmony.javax.security.sasl.RealmCallback;
37 import org.apache.harmony.javax.security.sasl.RealmChoiceCallback;
38 import de.measite.smack.Sasl;
39 import org.apache.harmony.javax.security.sasl.SaslClient;
40 import org.apache.harmony.javax.security.sasl.SaslException;
43 * Base class for SASL mechanisms. Subclasses must implement these methods:
45 * <li>{@link #getName()} -- returns the common name of the SASL mechanism.</li>
92 sc = Sasl.createSaslClient(mechanisms, username, "xmpp", host, props, this);
109 sc = Sasl.createSaslClient(mechanisms, username, "xmpp", host, props, cbh);
    [all...]
SASLGSSAPIMechanism.java 20 package org.jivesoftware.smack.sasl;
28 import de.measite.smack.Sasl;
32 * Implementation of the SASL GSSAPI mechanism
64 props.put(Sasl.SERVER_AUTH,"TRUE");
65 sc = Sasl.createSaslClient(mechanisms, username, "xmpp", host, props, cbh);
83 props.put(Sasl.SERVER_AUTH,"TRUE");
84 sc = Sasl.createSaslClient(mechanisms, username, "xmpp", host, props, this);
SASLFacebookConnect.java 1 package org.jivesoftware.smack.sasl;
13 import de.measite.smack.Sasl;
18 import org.jivesoftware.smack.sasl.SASLMechanism;
44 // sc = Sasl.createSaslClient(mechanisms, null, "xmpp", hostname, props,
53 stanza.append("\" xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
88 sc = Sasl.createSaslClient(mechanisms, null, "xmpp", host, props, this);
96 sc = Sasl.createSaslClient(mechanisms, null, "xmpp", host, props, cbh);
150 stanza.append("<response xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
  /external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/
TokenParser.java 2 * $OpenLDAP: /com/novell/sasl/client/TokenParser.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
17 import org.apache.harmony.javax.security.sasl.*;
DirectiveList.java 2 * $OpenLDAP: /com/novell/sasl/client/DirectiveList.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
18 import org.apache.harmony.javax.security.sasl.*;
DigestChallenge.java 2 * $OpenLDAP: /com/novell/sasl/client/DigestChallenge.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
18 import org.apache.harmony.javax.security.sasl.*;
DigestMD5SaslClient.java 2 * $OpenLDAP: /com/novell/sasl/client/DigestMD5SaslClient.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
17 import org.apache.harmony.javax.security.sasl.*;
27 * Implements the Client portion of DigestMD5 Sasl mechanism.
65 * When the SASL authentication completes
76 * the SASL mechanism and to configure the
78 * See the Sasl class for a list of standard properties.
84 * SASL mechanisms to get further information from the
86 * For example, a SASL mechanism might require the
109 String desiredQOP = (String)props.get(Sasl.QOP)
    [all...]
  /external/smack/src/com/novell/sasl/client/
TokenParser.java 2 * $OpenLDAP: /com/novell/sasl/client/TokenParser.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
17 import org.apache.harmony.javax.security.sasl.*;
DirectiveList.java 2 * $OpenLDAP: /com/novell/sasl/client/DirectiveList.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
18 import org.apache.harmony.javax.security.sasl.*;
DigestChallenge.java 2 * $OpenLDAP: /com/novell/sasl/client/DigestChallenge.java,v 1.3 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
18 import org.apache.harmony.javax.security.sasl.*;
DigestMD5SaslClient.java 2 * $OpenLDAP: /com/novell/sasl/client/DigestMD5SaslClient.java,v 1.4 2005/01/17 15:00:54 sunilk Exp $
15 package com.novell.sasl.client;
17 import org.apache.harmony.javax.security.sasl.*;
27 * Implements the Client portion of DigestMD5 Sasl mechanism.
65 * When the SASL authentication completes
76 * the SASL mechanism and to configure the
78 * See the Sasl class for a list of standard properties.
84 * SASL mechanisms to get further information from the
86 * For example, a SASL mechanism might require the
109 String desiredQOP = (String)props.get(Sasl.QOP)
    [all...]
  /external/smack/src/org/apache/qpid/management/common/sasl/
PlainSaslClient.java 21 package org.apache.qpid.management.common.sasl;
28 import de.measite.smack.Sasl;
29 import org.apache.harmony.javax.security.sasl.SaslClient;
30 import org.apache.harmony.javax.security.sasl.SaslException;
140 if (propName.equals(Sasl.QOP))
UserPasswordCallbackHandler.java 20 package org.apache.qpid.management.common.sasl;
UsernameHashedPasswordCallbackHandler.java 21 package org.apache.qpid.management.common.sasl;
  /external/smack/src/org/jivesoftware/smack/
BOSHPacketReader.java 26 import org.jivesoftware.smack.sasl.SASLMechanism.Challenge;
27 import org.jivesoftware.smack.sasl.SASLMechanism.Failure;
28 import org.jivesoftware.smack.sasl.SASLMechanism.Success;
90 // The server is challenging the SASL authentication
112 if ("urn:ietf:params:xml:ns:xmpp-sasl".equals(parser.getNamespace(null))) {
144 // The server is reporting available SASL mechanisms. Store
PacketReader.java 25 import org.jivesoftware.smack.sasl.SASLMechanism.Challenge;
26 import org.jivesoftware.smack.sasl.SASLMechanism.Failure;
27 import org.jivesoftware.smack.sasl.SASLMechanism.Success;
239 // SASL authentication has failed. The server may close the connection
247 // The server is challenging the SASL authentication made by the client
260 // The SASL authentication with the server was successful. The next step
339 // The server is reporting available SASL mechanisms. Store this information
SASLAuthentication.java 28 import org.jivesoftware.smack.sasl.*;
36 * <p>This class is responsible authenticating the user using SASL, binding the resource
40 * register with the server, authenticate using Non-SASL or authenticate using SASL. If the
41 * server supports SASL then Smack will first try to authenticate using SASL. But if that
42 * fails then Non-SASL will be tried.</p>
44 * <p>The server may support many SASL mechanisms to use for authenticating. Out of the box
45 * Smack provides several SASL mechanisms, but it is possible to register new SASL Mechanisms. Use
    [all...]
SASLAuthentication.java.orig 28 import org.jivesoftware.smack.sasl.*;
36 * <p>This class is responsible authenticating the user using SASL, binding the resource
40 * register with the server, authenticate using Non-SASL or authenticate using SASL. If the
41 * server supports SASL then Smack will first try to authenticate using SASL. But if that
42 * fails then Non-SASL will be tried.</p>
44 * <p>The server may support many SASL mechanisms to use for authenticating. Out of the box
45 * Smack provides several SASL mechanisms, but it is possible to register new SASL Mechanisms. Use
    [all...]
  /external/chromium_org/remoting/webapp/unittests/
xmpp_login_handler_unittest.js 53 '<mechanisms xmlns="urn:ietf:params:xml:ns:xmpp-sasl">' +
70 '<auth xmlns="urn:ietf:params:xml:ns:xmpp-sasl" mechanism="X-OAUTH2" ' +
83 '<mechanisms xmlns="urn:ietf:params:xml:ns:xmpp-sasl">' +
95 base.encodeUtf8('<success xmlns="urn:ietf:params:xml:ns:xmpp-sasl"/>'));
133 base.encodeUtf8('<failure xmlns="urn:ietf:params:xml:ns:xmpp-sasl">' +
  /external/qemu/ui/
vnc.h 84 #include "vnc-auth-sasl.h"
103 VncDisplaySASL sasl; member in struct:VncDisplay
142 VncStateSASL sasl; member in struct:VncState
vnc-android.c 144 return "vencrypt+tls+sasl";
146 return "vencrypt+x509+sasl";
154 return "sasl";
179 if (client->sasl.conn &&
180 client->sasl.username)
181 monitor_printf(mon, " username: %s\n", client->sasl.username);
967 * be the raw data, or may have already been encoded by SASL.
972 * both SASL, and this TLS layer. It is highly unlikely in practice
973 * though, since SASL encryption will typically be a no-op if TLS
1003 * using any SASL SSF encryption layers. Will write as much dat
2197 int sasl = 0; local
    [all...]
vnc.c 136 return "vencrypt+tls+sasl";
138 return "vencrypt+x509+sasl";
146 return "sasl";
171 if (client->sasl.conn &&
172 client->sasl.username)
173 monitor_printf(mon, " username: %s\n", client->sasl.username);
959 * be the raw data, or may have already been encoded by SASL.
964 * both SASL, and this TLS layer. It is highly unlikely in practice
965 * though, since SASL encryption will typically be a no-op if TLS
995 * using any SASL SSF encryption layers. Will write as much dat
2193 int sasl = 0; local
    [all...]

Completed in 313 milliseconds

12 3