HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 226 - 250 of 2231) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/curl/tests/data/
test1008 8 HTTP proxy NTLM auth
18 # this is returned first since we get no proxy-auth
53 # then this is returned when we get proxy-auth
58 Nice proxy auth sir!
92 HTTP proxy CONNECT auth NTLM with chunked-encoded 407 response
test209 8 HTTP proxy NTLM auth
15 # this is returned first since we get no proxy-auth
44 # then this is returned when we get proxy-auth
49 Nice proxy auth sir!
82 HTTP proxy CONNECT auth NTLM
test213 8 HTTP proxy NTLM auth
15 # this is returned first since we get no proxy-auth
44 # then this is returned when we get proxy-auth
49 Nice proxy auth sir!
82 HTTP 1.0 proxy CONNECT auth NTLM and then POST
test265 8 HTTP proxy NTLM auth
15 # this is returned first since we get no proxy-auth
46 # then this is returned when we get proxy-auth
51 Nice proxy auth sir!
85 HTTP proxy CONNECT auth NTLM and then POST, response-body in the 407
test2025 6 HTTP Basic auth
7 HTTP NTLM auth
16 <!-- First request has Basic auth, wrong password -->
28 <!-- Second request has NTLM auth, right password -->
30 HTTP/1.1 401 Need Basic or NTLM auth
59 <!-- Third request has Basic auth, wrong password -->
71 <!-- Fourth request has NTLM auth, wrong password -->
73 HTTP/1.1 401 Need Basic or NTLM auth (2)
104 <!-- Fifth request has NTLM auth, right password -->
106 HTTP/1.1 401 Need Basic or NTLM auth (3)
    [all...]
test2030 6 HTTP Digest auth
7 HTTP NTLM auth
22 new response just as a duplicate and it sends another and detects the auth
28 <!-- First request has NTLM auth, wrong password -->
30 HTTP/1.1 401 Need Digest or NTLM auth
61 <!-- Second request has Digest auth, right password -->
63 HTTP/1.1 401 Need Digest or NTLM auth (2)
82 <!-- Third request has NTLM auth, wrong password -->
84 HTTP/1.1 401 Need Digest or NTLM auth (3)
115 <!-- Fourth request has Digest auth, wrong password --
    [all...]
test2024 6 HTTP Basic auth
7 HTTP Digest auth
16 <!-- First request has Basic auth, wrong password -->
28 <!-- Second request has Digest auth, right password -->
38 <!-- Third request has Basic auth, wrong password -->
50 <!-- Fourth request has Digest auth, wrong password -->
62 <!-- Fifth request has Digest auth, right password -->
test2029 6 HTTP Basic auth
7 HTTP NTLM auth
16 <!-- First request has NTLM auth, wrong password -->
18 HTTP/1.1 401 Need Basic or NTLM auth
49 <!-- Second request has Basic auth, right password -->
59 <!-- Third request has NTLM auth, wrong password -->
61 HTTP/1.1 401 Need Basic or NTLM auth (2)
92 <!-- Fourth request has Basic auth, wrong password -->
104 <!-- Fifth request has Basic auth, right password -->
  /external/openssh/
auth-bsdauth.c 1 /* $OpenBSD: auth-bsdauth.c,v 1.13 2014/06/24 01:13:21 djm Exp $ */
38 #include "auth.h"
74 debug2("bsdauth_query: new bsd auth session");
78 authctxt->style, "auth-ssh", &challenge);
107 error("bsdauth_respond: no bsd auth session");
  /external/webrtc/webrtc/libjingle/xmpp/
xmpplogintask_unittest.cc 160 EXPECT_EQ("<auth xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\" "
162 "auth:allow-non-google-login=\"true\" "
163 "auth:client-uses-full-bind-result=\"true\" "
164 "xmlns:auth=\"http://www.google.com/talk/protocol/auth\""
165 ">AGRhdmlkAGRhdmlk</auth>",
333 EXPECT_EQ("<auth xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\" "
334 "mechanism=\"PLAIN\" auth:allow-non-google-login=\"true\" "
335 "auth:client-uses-full-bind-result=\"true\" "
336 "xmlns:auth=\"http://www.google.com/talk/protocol/auth\"
    [all...]
  /prebuilts/go/darwin-x86/src/net/smtp/
smtp_test.go 21 auth Auth
36 name, resp, err := test.auth.Start(&ServerInfo{"testserver", true, nil})
49 resp, err := test.auth.Next(challenge, true)
63 auth := PlainAuth("foo", "bar", "baz", "servername")
74 server: &ServerInfo{Name: "servername", Auth: []string{"PLAIN"}},
77 server: &ServerInfo{Name: "servername", Auth: []string{"CRAM-MD5"}},
86 _, _, err := auth.Start(tt.server)
97 // Issue 17794: don't send a trailing space on AUTH command when there's no password.
116 c.Auth(toServerEmptyAuth{}
    [all...]
  /prebuilts/go/linux-x86/src/net/smtp/
smtp_test.go 21 auth Auth
36 name, resp, err := test.auth.Start(&ServerInfo{"testserver", true, nil})
49 resp, err := test.auth.Next(challenge, true)
63 auth := PlainAuth("foo", "bar", "baz", "servername")
74 server: &ServerInfo{Name: "servername", Auth: []string{"PLAIN"}},
77 server: &ServerInfo{Name: "servername", Auth: []string{"CRAM-MD5"}},
86 _, _, err := auth.Start(tt.server)
97 // Issue 17794: don't send a trailing space on AUTH command when there's no password.
116 c.Auth(toServerEmptyAuth{}
    [all...]
  /prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-sts/1.11.18/
aws-java-sdk-sts-1.11.18.jar 
  /prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.0.1/
httpclient-4.0.1.jar 
  /packages/apps/Email/src/com/android/email/mail/transport/
SmtpSender.java 116 * server. It won't let you use AUTH without EHLO.
118 * and only attempting auth if it's available, and warning the user
141 boolean authLoginSupported = result.matches(".*AUTH.*LOGIN.*$");
142 boolean authPlainSupported = result.matches(".*AUTH.*PLAIN.*$");
143 boolean authOAuthSupported = result.matches(".*AUTH.*XOAUTH2.*$");
275 // C: AUTH LOGIN
285 // C: AUTH LOGIN
295 executeSimpleCommand("AUTH LOGIN");
316 executeSensitiveCommand("AUTH PLAIN " + new String(data), "AUTH PLAIN /redacted/")
    [all...]
  /developers/samples/android/wearable/wear/WearMessagingApp/Wearable/src/main/java/com/example/android/wearable/wear/messaging/
GoogleSignedInActivity.java 26 import com.google.android.gms.auth.api.Auth;
27 import com.google.android.gms.auth.api.signin.GoogleSignInAccount;
28 import com.google.android.gms.auth.api.signin.GoogleSignInOptions;
29 import com.google.android.gms.auth.api.signin.GoogleSignInResult;
88 .addApi(Auth.GOOGLE_SIGN_IN_API, gso)
154 Auth.GoogleSignInApi.silentSignIn(mGoogleApiClient);
  /external/apache-http/src/org/apache/http/client/protocol/
RequestProxyAuthentication.java 41 import org.apache.http.auth.AUTH;
42 import org.apache.http.auth.AuthScheme;
43 import org.apache.http.auth.AuthState;
44 import org.apache.http.auth.AuthenticationException;
45 import org.apache.http.auth.Credentials;
77 if (request.containsHeader(AUTH.PROXY_AUTH_RESP)) {
RequestTargetAuthentication.java 41 import org.apache.http.auth.AUTH;
42 import org.apache.http.auth.AuthScheme;
43 import org.apache.http.auth.AuthState;
44 import org.apache.http.auth.AuthenticationException;
45 import org.apache.http.auth.Credentials;
77 if (request.containsHeader(AUTH.WWW_AUTH_RESP)) {
  /external/tpm2/
Hierarchy.c 33 // Initialize owner, endorsement and lockout auth
113 TPM2B_AUTH *auth = NULL; local
118 auth = &gp.phProof;
122 auth = &gp.ehProof;
126 auth = &gp.shProof;
130 auth = &gr.nullProof;
136 return auth;
  /external/wpa_supplicant_8/src/ap/
preauth_auth.c 50 wpa_printf(MSG_DEBUG, "RSN: receive pre-auth packet "
53 wpa_printf(MSG_DEBUG, "RSN: too short pre-auth packet "
62 wpa_printf(MSG_DEBUG, "RSN: pre-auth for foreign address "
69 wpa_printf(MSG_DEBUG, "RSN: pre-auth for already association "
101 wpa_printf(MSG_DEBUG, "RSN pre-auth interface '%s'", ifname);
214 "added PMKSA cache entry (pre-auth)");
219 "(pre-auth)");
  /prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.5.2/
httpclient-4.5.2.jar 
  /external/autotest/client/common_lib/cros/tendo/
privet_helper.py 14 URL_AUTH = 'v3/auth'
138 http header using 'Privet' as the auth realm.
177 """Go through pairing and insecure auth.
179 @return resulting auth token.
194 auth = self.send_privet_request(URL_AUTH, request_data=data)
195 auth_token = '%s %s' % (auth['tokenType'], auth['accessToken'])
216 @param auth_token: string auth token returned from privet_auth()
231 @param auth_token: string auth token returned from prviet_auth()
  /frameworks/base/core/java/android/bluetooth/
BluetoothServerSocket.java 79 * @param auth require the remote device to be authenticated
85 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port)
88 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null);
97 * @param auth require the remote device to be authenticated
105 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port,
109 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm,
119 * @param auth require the remote device to be authenticated
125 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid)
127 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
  /device/linaro/bootloader/arm-trusted-firmware/common/auth/polarssl/
polarssl.mk 38 -Icommon/auth/polarssl
64 common/auth/polarssl/polarssl.c
67 common/auth/polarssl/polarssl.c
  /device/linaro/bootloader/edk2/NetworkPkg/Application/IpsecConfig/
IpSecConfig.h 132 // --auth-algo
141 // --auth-proto
146 // --auth-method

Completed in 1064 milliseconds

1 2 3 4 5 6 7 8 91011>>