/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/wsgiref/ |
util.py | 158 'connection':1, 'keep-alive':1, 'proxy-authenticate':1,
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/wsgiref/ |
util.py | 158 'connection':1, 'keep-alive':1, 'proxy-authenticate':1,
|
/prebuilts/sdk/tools/ |
jack | 158 echo "Failed to authenticate Jack server certificate. Try 'jack-diagnose'" >&2
|
/system/connectivity/shill/net/ |
ieee80211.h | 142 // Status/reason code returned by nl80211 messages: Authenticate,
|
/frameworks/base/docs/html/about/versions/marshmallow/ |
android-6.0.jd | 87 <p>This release offers new APIs to let you authenticate users by using their fingerprint scans on 91 <p>To authenticate users via fingerprint scan, get an instance of the new 93 {@link android.hardware.fingerprint.FingerprintManager#authenticate(android.hardware.fingerprint.FingerprintManager.CryptoObject, android.os.CancellationSignal, int, android.hardware.fingerprint.FingerprintManager.AuthenticationCallback, android.os.Handler) authenticate()} 99 developing multiple apps that use fingerprint authentication, note that each app must authenticate 139 <p>Your app can authenticate users based on how recently they last unlocked their device. This 153 method to re-authenticate the user within your app. [all...] |
/external/curl/lib/ |
imap.c | 364 a space and optionally some text as per RFC-3501 for the AUTHENTICATE and 434 "AUTHENTICATE", 530 * Sends a clear text LOGIN command to authenticate with. 538 /* Check we have a username and password to authenticate with and end the 567 * Sends an AUTHENTICATE command allowing the client to login with the given 577 /* Send the AUTHENTICATE command with the initial response */ 578 result = imap_sendf(conn, "AUTHENTICATE %s %s", mech, initresp); 581 /* Send the AUTHENTICATE command */ 582 result = imap_sendf(conn, "AUTHENTICATE %s", mech); 616 /* Check we have enough data to authenticate with and end th [all...] |
curl_sasl.c | 236 * Check if we have enough auth data and capabilities to authenticate. 244 /* EXTERNAL can authenticate without a user name and/or password */
|
/frameworks/base/keystore/java/android/security/keystore/ |
KeyProtection.java | 532 * <p>For RSA private keys used by TLS/SSL servers to authenticate themselves to clients it 662 * disabled (reconfigured to None, Swipe or other mode which does not authenticate the user) [all...] |
/external/webrtc/talk/media/base/ |
mediachannel.h | [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
imaplib.py | 43 'AUTHENTICATE': ('NONAUTH',), 112 AUTHENTICATE, and the last argument to APPEND which is passed as 327 def authenticate(self, mechanism, authobject): member in class:IMAP4 328 """Authenticate command - requires response processing. 349 typ, dat = self._simple_command('AUTHENTICATE', mech) 518 return self.authenticate('CRAM-MD5', self._CRAM_MD5_AUTH) [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/ |
imaplib.py | 43 'AUTHENTICATE': ('NONAUTH',), 112 AUTHENTICATE, and the last argument to APPEND which is passed as 327 def authenticate(self, mechanism, authobject): member in class:IMAP4 328 """Authenticate command - requires response processing. 349 typ, dat = self._simple_command('AUTHENTICATE', mech) 518 return self.authenticate('CRAM-MD5', self._CRAM_MD5_AUTH) [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
imaplib.py | 43 'AUTHENTICATE': ('NONAUTH',), 112 AUTHENTICATE, and the last argument to APPEND which is passed as 327 def authenticate(self, mechanism, authobject): member in class:IMAP4 328 """Authenticate command - requires response processing. 349 typ, dat = self._simple_command('AUTHENTICATE', mech) 518 return self.authenticate('CRAM-MD5', self._CRAM_MD5_AUTH) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
imaplib.py | 43 'AUTHENTICATE': ('NONAUTH',), 112 AUTHENTICATE, and the last argument to APPEND which is passed as 327 def authenticate(self, mechanism, authobject): member in class:IMAP4 328 """Authenticate command - requires response processing. 349 typ, dat = self._simple_command('AUTHENTICATE', mech) 518 return self.authenticate('CRAM-MD5', self._CRAM_MD5_AUTH) [all...] |
/docs/source.android.com/src/source/ |
submit-patches.jd | 62 <h2 id="authenticate-with-the-server">Authenticate with the server</h2>
|
/external/ImageMagick/ImageMagick/script/ |
compare.html | 132 <td><a href="command-line-options.php#authenticate">-authenticate <var>value</var></a></td>
|
stream.html | 93 <td><a href="command-line-options.php#authenticate">-authenticate <var>value</var></a></td>
|
/external/ImageMagick/www/ |
stream.html | 97 <td><a href="command-line-options.html#authenticate">-authenticate <var>value</var></a></td>
|
/external/apache-http/android/src/android/net/http/ |
Headers.java | 61 public final static String WWW_AUTHENTICATE = "www-authenticate"; 62 public final static String PROXY_AUTHENTICATE = "proxy-authenticate";
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/socksipy-branch/ |
socks.py | 153 username - Username to authenticate with to the server. 155 password - Password to authenticate with to the server.
|
/external/libbrillo/brillo/http/ |
http_request.cc | 92 const char response_header::kProxyAuthenticate[] = "Proxy-Authenticate"; 102 const char response_header::kWwwAuthenticate[] = "WWW-Authenticate";
|
/external/libvncserver/webclients/java-applet/ssl/ |
README | 190 authenticate itself by SSL To the VNC Server. 213 This provides a Server-Side cert that the client will authenticate
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
SIPHeaderList.java | 491 * headerValue. This will not give a reasonable result for WWW-Authenticate, 492 * Authorization, Proxy-Authenticate and Proxy-Authorization and hence this
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/framed/ |
Hpack.java | 94 new Header("proxy-authenticate", ""), 107 new Header("www-authenticate", "")
|
/external/ppp/pppd/ |
chap-new.c | 224 * chap_auth_with_peer - Prepare to authenticate ourselves to the peer. 379 * authenticate against ActiveDirectory, and use AD for
|
session.c | 240 SET_MSG(msg, "User unknown - cannot authenticate via PAM"); 336 * then clearly we should not authenticate against it (if we're being
|