/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
MessageDigestAlgorithm.java | 43 stackLogger.logDebug("trying to authenticate using : " + algorithm + ", "+ 119 stackLogger.logDebug("trying to authenticate using : " + algorithm + ", "
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
ProxyAuthenticateParser.java | 73 "Proxy-Authenticate: Digest realm=\"MCI WorldCom SIP\","+ 77 "Proxy-Authenticate: Digest realm=\"MCI WorldCom SIP\","+
|
/external/selinux/policycoreutils/newrole/ |
newrole.c | 19 * Set the USE_PAM constant if you want to authenticate users via PAM. 26 * entry so that even root must re-authenticate to change roles. 181 * This function uses PAM to authenticate the user running this 205 /* Ask PAM to authenticate the user running this program */ 412 * Determine the Linux user identity to re-authenticate. 1083 * Step 2: Authenticate the user. 1085 * Re-authenticate the user running this program. 1140 * Once we authenticate the user, we know that we want to proceed with [all...] |
/frameworks/base/docs/html/training/id-auth/ |
identify.jd | 7 next.link=authenticate.html 135 The next lesson explains how to authenticate to existing online services. The lesson after that
|
custom_auth.jd | 7 previous.link=authenticate.html 171 accounts of your custom type will be able to enumerate and authenticate just as
|
/hardware/intel/common/libva/va/wayland/protocol/ |
wayland-drm.xml | 107 <request name="authenticate"> 151 <!-- Raised if the authenticate request succeeded -->
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
URLConnectionTest.java | [all...] |
HttpOverSpdyTest.java | 221 @Test public void authenticate() throws Exception { method in class:HttpOverSpdyTest 223 .addHeader("www-authenticate: Basic realm=\"protected area\"") 224 .setBody("Please authenticate."));
|
/packages/apps/Email/provider_src/com/android/email/mail/store/ |
ImapConnection.java | 116 mLoginPhrase = ImapConstants.AUTHENTICATE + " " + ImapConstants.XOAUTH2 + " " + 534 // Failed to authenticate. This may be just due to an expired token. 535 LogUtils.d(Logging.LOG_TAG, "failed to authenticate, retrying"); 546 LogUtils.d(Logging.LOG_TAG, "failed to authenticate, giving up"); 564 // it will send a continuation request is when we fail to authenticate. We need to
|
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/ |
Trie.java | 146 // Magic number to authenticate the data. 405 * Constant number to authenticate the byte block 442 // Magic number to authenticate the data.
|
UBiDiProps.java | 91 // implement ICUBinary.Authenticate 92 private final static class IsAcceptable implements ICUBinary.Authenticate {
|
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
Constraint.java | 160 * @param authenticate True if users must be authenticated 162 public void setAuthenticate(boolean authenticate) 164 _authenticate = authenticate;
|
/external/ppp/pppd/plugins/ |
winbind.c | 462 * Tells pppd that we will try to authenticate the peer, and not to 480 * 1 if we can authenticate, -1 if we cannot. 505 * AUTHENTICATED (1) if we can authenticate, NOT_AUTHENTICATED (0) if we cannot.
|
/external/srtp/crypto/ae_xfm/ |
xfm.c | 78 /* authenticate clear and opaque data */ 154 /* authenticate clear and opaque data */ 258 * authenticate clear and opaque data, then write the
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
SSLSocketFactory.java | 63 * server against a list of trusted certificates and to authenticate to 72 * authenticate itself with a non-trusted certificate. 85 * pair. The client secure socket will use the private key to authenticate
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLSocketFactory.java | 69 * server against a list of trusted certificates and to authenticate to 78 * authenticate itself with a non-trusted certificate. 91 * pair. The client secure socket will use the private key to authenticate
|
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/internal/net/www/protocol/http/ |
HttpURLConnectionTest.java | 246 + "Proxy-authenticate: Basic realm=\"remotehost\"\n\n") 301 response.getWriter().print("<h1>No WWW-Authenticate</h1>"); 307 response.addHeader("WWW-Authenticate", 333 // Test response code which need authenticate 358 .getHeaderField("WWW-Authenticate")); 379 assertNull(conn.getHeaderField("WWW-Authenticate")); [all...] |
/external/jetty/src/java/org/eclipse/jetty/http/ |
HttpHeaders.java | 96 PROXY_AUTHENTICATE= "Proxy-Authenticate", 101 WWW_AUTHENTICATE= "WWW-Authenticate";
|
/external/oauth/core/src/main/java/net/oauth/ |
OAuthMessage.java | 308 * Construct a WWW-Authenticate or Authentication header value, containing 356 * Parse the parameters from an OAuth Authorization or WWW-Authenticate
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
OkHeaders.java | 222 && !"Proxy-Authenticate".equalsIgnoreCase(fieldName) 285 : authenticator.authenticate(proxy, response);
|
/frameworks/base/core/java/android/net/ |
PskKeyManager.java | 30 * secure the TLS/SSL connection and mutually authenticate its peers. These cipher suites may be 33 * step) and requires both peers to authenticate each other. In such scenarios a symmetric key (PSK)
|
/hardware/libhardware/include/hardware/ |
fingerprint.h | 189 * Cancel pending enroll or authenticate, sending FINGERPRINT_ERROR_CANCELED 250 int (*authenticate)(struct fingerprint_device *dev, uint64_t operation_id, uint32_t gid); member in struct:fingerprint_device
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/ |
libnsl-2.11.1.so | |
libnsl.so | |
libnsl.so.1 | |