/external/dbus/test/data/auth/ |
client-out-of-mechanisms.auth-script | 5 EXPECT_COMMAND AUTH
|
mechanisms.auth-script | 2 ## in response to blank AUTH 5 SEND AUTH
|
anonymous-client-successful.auth-script | 6 EXPECT_COMMAND AUTH 11 EXPECT_COMMAND AUTH
|
fallback.auth-script | 1 ## this tests that a client can fallback to a secondary auth mech 5 ## Will try EXTERNAL by default first without first calling AUTH alone. 7 EXPECT_COMMAND AUTH 12 EXPECT_COMMAND AUTH
|
invalid-command-client.auth-script | 5 EXPECT_COMMAND AUTH
|
/external/apache-http/src/org/apache/http/auth/ |
AUTH.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AUTH.java $ 32 package org.apache.http.auth; 46 public final class AUTH { 68 private AUTH() {
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpc/ |
auth.h | 2 * auth.h, Authentication interface. 34 * is required to pass a AUTH * to routines that create rpc 83 enum_t oa_flavor; /* flavor of auth */ 84 caddr_t oa_base; /* address of more auth stuff */ 89 * Auth handle, interface to client side authenticators. 91 typedef struct AUTH AUTH; 92 struct AUTH { 97 void (*ah_nextverf) (AUTH *); 98 int (*ah_marshal) (AUTH *, XDR *); /* nextverf & serialize * [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpc/ |
auth.h | 2 * auth.h, Authentication interface. 34 * is required to pass a AUTH * to routines that create rpc 83 enum_t oa_flavor; /* flavor of auth */ 84 caddr_t oa_base; /* address of more auth stuff */ 89 * Auth handle, interface to client side authenticators. 91 typedef struct AUTH AUTH; 92 struct AUTH { 97 void (*ah_nextverf) (AUTH *); 98 int (*ah_marshal) (AUTH *, XDR *); /* nextverf & serialize * [all...] |
/external/robolectric/v1/src/test/java/com/xtremelabs/robolectric/shadows/ |
UriMatcherTest.java | 19 static final String AUTH = "com.foo"; 27 URI = Uri.parse("content://" + AUTH); 43 matcher.addURI(AUTH, path, 1); 44 assertThat(node.map.keySet(), hasItem(AUTH)); 46 node = node.map.get(AUTH); 57 matcher.addURI(AUTH, "#", 1); 58 matcher.addURI(AUTH, "*", 2); 59 MatchNode node = root.map.get(AUTH); 66 matcher.addURI(AUTH, "bar", 1); 69 matcher.addURI(AUTH, "bar/#", 2) [all...] |
/external/apache-http/src/org/apache/http/impl/client/ |
DefaultProxyAuthenticationHandler.java | 39 import org.apache.http.auth.AUTH; 40 import org.apache.http.auth.MalformedChallengeException; 73 Header[] headers = response.getHeaders(AUTH.PROXY_AUTH);
|
DefaultTargetAuthenticationHandler.java | 39 import org.apache.http.auth.AUTH; 40 import org.apache.http.auth.MalformedChallengeException; 73 Header[] headers = response.getHeaders(AUTH.WWW_AUTH);
|
/external/apache-http/src/org/apache/http/impl/auth/ |
AuthSchemeBase.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/AuthSchemeBase.java $ 31 package org.apache.http.impl.auth; 35 import org.apache.http.auth.AUTH; 36 import org.apache.http.auth.AuthScheme; 37 import org.apache.http.auth.MalformedChallengeException; 81 if (authheader.equalsIgnoreCase(AUTH.WWW_AUTH)) { 83 } else if (authheader.equalsIgnoreCase(AUTH.PROXY_AUTH)) {
|
BasicScheme.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/BasicScheme.java $ 31 package org.apache.http.impl.auth; 36 import org.apache.http.auth.AuthenticationException; 37 import org.apache.http.auth.Credentials; 38 import org.apache.http.auth.AUTH; 39 import org.apache.http.auth.MalformedChallengeException; 40 import org.apache.http.auth.params.AuthParams; 128 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials 180 buffer.append(AUTH.PROXY_AUTH_RESP) [all...] |
NTLMScheme.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/NTLMScheme.java $ 31 package org.apache.http.impl.auth; 35 import org.apache.http.auth.AUTH; 36 import org.apache.http.auth.AuthenticationException; 37 import org.apache.http.auth.Credentials; 38 import org.apache.http.auth.InvalidCredentialsException; 39 import org.apache.http.auth.MalformedChallengeException; 40 import org.apache.http.auth.NTCredentials; 41 import org.apache.http.impl.auth.AuthSchemeBase [all...] |
DigestScheme.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/DigestScheme.java $ 31 package org.apache.http.impl.auth; 40 import org.apache.http.auth.AuthenticationException; 41 import org.apache.http.auth.Credentials; 42 import org.apache.http.auth.AUTH; 43 import org.apache.http.auth.MalformedChallengeException; 44 import org.apache.http.auth.params.AuthParams; 55 * Currently only qop=auth or no qop is supported. qop=auth-in [all...] |
/system/core/adb/ |
adb_trace.h | 38 AUTH,
|
adb_trace.cpp | 132 {"auth", AUTH},
|
/external/apache-http/src/org/apache/http/client/protocol/ |
RequestProxyAuthentication.java | 41 import org.apache.http.auth.AUTH; 42 import org.apache.http.auth.AuthScheme; 43 import org.apache.http.auth.AuthState; 44 import org.apache.http.auth.AuthenticationException; 45 import org.apache.http.auth.Credentials; 77 if (request.containsHeader(AUTH.PROXY_AUTH_RESP)) {
|
RequestTargetAuthentication.java | 41 import org.apache.http.auth.AUTH; 42 import org.apache.http.auth.AuthScheme; 43 import org.apache.http.auth.AuthState; 44 import org.apache.http.auth.AuthenticationException; 45 import org.apache.http.auth.Credentials; 77 if (request.containsHeader(AUTH.WWW_AUTH_RESP)) {
|
/external/jetty/src/java/org/eclipse/jetty/http/ |
HttpURI.java | 55 AUTH=4, 87 * @param parsePartialAuth If True, parse auth without prior scheme, else treat all URIs starting with / as paths 140 int state=AUTH; 159 case AUTH: 187 state = AUTH; 271 state=AUTH; 363 case AUTH: 406 state = AUTH;
|
/prebuilts/go/darwin-x86/src/net/smtp/ |
smtp_test.go | 21 auth Auth 36 name, resp, err := test.auth.Start(&ServerInfo{"testserver", true, nil}) 49 resp, err := test.auth.Next(challenge, true) 63 auth := PlainAuth("foo", "bar", "baz", "servername") 74 server: &ServerInfo{Name: "servername", Auth: []string{"PLAIN"}}, 77 server: &ServerInfo{Name: "servername", Auth: []string{"CRAM-MD5"}}, 86 _, _, err := auth.Start(tt.server) 129 if ok, args := c.Extension("aUtH"); !ok || args != "LOGIN PLAIN" { 130 t.Fatalf("Expected AUTH supported" [all...] |
smtp.go | 8 // AUTH RFC 2554 36 // supported auth mechanisms 37 auth []string 137 if mechs, ok := ext["AUTH"]; ok { 138 c.auth = strings.Split(mechs, " ") 183 // Auth authenticates a client using the provided authentication mechanism. 185 // Only servers that advertise the AUTH extension support this function. 186 func (c *Client) Auth(a Auth) error { 191 mech, resp, err := a.Start(&ServerInfo{c.serverName, c.tls, c.auth}) [all...] |
/prebuilts/go/linux-x86/src/net/smtp/ |
smtp_test.go | 21 auth Auth 36 name, resp, err := test.auth.Start(&ServerInfo{"testserver", true, nil}) 49 resp, err := test.auth.Next(challenge, true) 63 auth := PlainAuth("foo", "bar", "baz", "servername") 74 server: &ServerInfo{Name: "servername", Auth: []string{"PLAIN"}}, 77 server: &ServerInfo{Name: "servername", Auth: []string{"CRAM-MD5"}}, 86 _, _, err := auth.Start(tt.server) 129 if ok, args := c.Extension("aUtH"); !ok || args != "LOGIN PLAIN" { 130 t.Fatalf("Expected AUTH supported" [all...] |
smtp.go | 8 // AUTH RFC 2554 36 // supported auth mechanisms 37 auth []string 137 if mechs, ok := ext["AUTH"]; ok { 138 c.auth = strings.Split(mechs, " ") 183 // Auth authenticates a client using the provided authentication mechanism. 185 // Only servers that advertise the AUTH extension support this function. 186 func (c *Client) Auth(a Auth) error { 191 mech, resp, err := a.Start(&ServerInfo{c.serverName, c.tls, c.auth}) [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_common.c | 42 E2S(AUTH);
|