/external/curl/tests/data/ |
test1008 | 8 HTTP proxy NTLM auth 18 # this is returned first since we get no proxy-auth 53 # then this is returned when we get proxy-auth 58 Nice proxy auth sir! 92 HTTP proxy CONNECT auth NTLM with chunked-encoded 407 response
|
test209 | 8 HTTP proxy NTLM auth 15 # this is returned first since we get no proxy-auth 44 # then this is returned when we get proxy-auth 49 Nice proxy auth sir! 82 HTTP proxy CONNECT auth NTLM
|
test213 | 8 HTTP proxy NTLM auth 15 # this is returned first since we get no proxy-auth 44 # then this is returned when we get proxy-auth 49 Nice proxy auth sir! 82 HTTP 1.0 proxy CONNECT auth NTLM and then POST
|
test265 | 8 HTTP proxy NTLM auth 15 # this is returned first since we get no proxy-auth 46 # then this is returned when we get proxy-auth 51 Nice proxy auth sir! 85 HTTP proxy CONNECT auth NTLM and then POST, response-body in the 407
|
test2025 | 6 HTTP Basic auth 7 HTTP NTLM auth 16 <!-- First request has Basic auth, wrong password --> 28 <!-- Second request has NTLM auth, right password --> 30 HTTP/1.1 401 Need Basic or NTLM auth
59 <!-- Third request has Basic auth, wrong password --> 71 <!-- Fourth request has NTLM auth, wrong password --> 73 HTTP/1.1 401 Need Basic or NTLM auth (2)
104 <!-- Fifth request has NTLM auth, right password --> 106 HTTP/1.1 401 Need Basic or NTLM auth (3) [all...] |
test2030 | 6 HTTP Digest auth 7 HTTP NTLM auth 22 new response just as a duplicate and it sends another and detects the auth 28 <!-- First request has NTLM auth, wrong password --> 30 HTTP/1.1 401 Need Digest or NTLM auth
61 <!-- Second request has Digest auth, right password --> 63 HTTP/1.1 401 Need Digest or NTLM auth (2)
82 <!-- Third request has NTLM auth, wrong password --> 84 HTTP/1.1 401 Need Digest or NTLM auth (3)
115 <!-- Fourth request has Digest auth, wrong password -- [all...] |
test2024 | 6 HTTP Basic auth 7 HTTP Digest auth 16 <!-- First request has Basic auth, wrong password --> 28 <!-- Second request has Digest auth, right password --> 38 <!-- Third request has Basic auth, wrong password --> 50 <!-- Fourth request has Digest auth, wrong password --> 62 <!-- Fifth request has Digest auth, right password -->
|
test2029 | 6 HTTP Basic auth 7 HTTP NTLM auth 16 <!-- First request has NTLM auth, wrong password --> 18 HTTP/1.1 401 Need Basic or NTLM auth
49 <!-- Second request has Basic auth, right password --> 59 <!-- Third request has NTLM auth, wrong password --> 61 HTTP/1.1 401 Need Basic or NTLM auth (2)
92 <!-- Fourth request has Basic auth, wrong password --> 104 <!-- Fifth request has Basic auth, right password -->
|
/external/openssh/ |
auth-bsdauth.c | 1 /* $OpenBSD: auth-bsdauth.c,v 1.13 2014/06/24 01:13:21 djm Exp $ */ 38 #include "auth.h" 74 debug2("bsdauth_query: new bsd auth session"); 78 authctxt->style, "auth-ssh", &challenge); 107 error("bsdauth_respond: no bsd auth session");
|
/external/webrtc/webrtc/libjingle/xmpp/ |
xmpplogintask_unittest.cc | 160 EXPECT_EQ("<auth xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\" " 162 "auth:allow-non-google-login=\"true\" " 163 "auth:client-uses-full-bind-result=\"true\" " 164 "xmlns:auth=\"http://www.google.com/talk/protocol/auth\"" 165 ">AGRhdmlkAGRhdmlk</auth>", 333 EXPECT_EQ("<auth xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\" " 334 "mechanism=\"PLAIN\" auth:allow-non-google-login=\"true\" " 335 "auth:client-uses-full-bind-result=\"true\" " 336 "xmlns:auth=\"http://www.google.com/talk/protocol/auth\" [all...] |
/prebuilts/go/darwin-x86/src/net/smtp/ |
smtp_test.go | 21 auth Auth 36 name, resp, err := test.auth.Start(&ServerInfo{"testserver", true, nil}) 49 resp, err := test.auth.Next(challenge, true) 63 auth := PlainAuth("foo", "bar", "baz", "servername") 74 server: &ServerInfo{Name: "servername", Auth: []string{"PLAIN"}}, 77 server: &ServerInfo{Name: "servername", Auth: []string{"CRAM-MD5"}}, 86 _, _, err := auth.Start(tt.server) 97 // Issue 17794: don't send a trailing space on AUTH command when there's no password. 116 c.Auth(toServerEmptyAuth{} [all...] |
/prebuilts/go/linux-x86/src/net/smtp/ |
smtp_test.go | 21 auth Auth 36 name, resp, err := test.auth.Start(&ServerInfo{"testserver", true, nil}) 49 resp, err := test.auth.Next(challenge, true) 63 auth := PlainAuth("foo", "bar", "baz", "servername") 74 server: &ServerInfo{Name: "servername", Auth: []string{"PLAIN"}}, 77 server: &ServerInfo{Name: "servername", Auth: []string{"CRAM-MD5"}}, 86 _, _, err := auth.Start(tt.server) 97 // Issue 17794: don't send a trailing space on AUTH command when there's no password. 116 c.Auth(toServerEmptyAuth{} [all...] |
/prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-sts/1.11.18/ |
aws-java-sdk-sts-1.11.18.jar | |
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.0.1/ |
httpclient-4.0.1.jar | |
/packages/apps/Email/src/com/android/email/mail/transport/ |
SmtpSender.java | 116 * server. It won't let you use AUTH without EHLO. 118 * and only attempting auth if it's available, and warning the user 141 boolean authLoginSupported = result.matches(".*AUTH.*LOGIN.*$"); 142 boolean authPlainSupported = result.matches(".*AUTH.*PLAIN.*$"); 143 boolean authOAuthSupported = result.matches(".*AUTH.*XOAUTH2.*$"); 275 // C: AUTH LOGIN 285 // C: AUTH LOGIN 295 executeSimpleCommand("AUTH LOGIN"); 316 executeSensitiveCommand("AUTH PLAIN " + new String(data), "AUTH PLAIN /redacted/") [all...] |
/developers/samples/android/wearable/wear/WearMessagingApp/Wearable/src/main/java/com/example/android/wearable/wear/messaging/ |
GoogleSignedInActivity.java | 26 import com.google.android.gms.auth.api.Auth; 27 import com.google.android.gms.auth.api.signin.GoogleSignInAccount; 28 import com.google.android.gms.auth.api.signin.GoogleSignInOptions; 29 import com.google.android.gms.auth.api.signin.GoogleSignInResult; 88 .addApi(Auth.GOOGLE_SIGN_IN_API, gso) 154 Auth.GoogleSignInApi.silentSignIn(mGoogleApiClient);
|
/external/apache-http/src/org/apache/http/client/protocol/ |
RequestProxyAuthentication.java | 41 import org.apache.http.auth.AUTH; 42 import org.apache.http.auth.AuthScheme; 43 import org.apache.http.auth.AuthState; 44 import org.apache.http.auth.AuthenticationException; 45 import org.apache.http.auth.Credentials; 77 if (request.containsHeader(AUTH.PROXY_AUTH_RESP)) {
|
RequestTargetAuthentication.java | 41 import org.apache.http.auth.AUTH; 42 import org.apache.http.auth.AuthScheme; 43 import org.apache.http.auth.AuthState; 44 import org.apache.http.auth.AuthenticationException; 45 import org.apache.http.auth.Credentials; 77 if (request.containsHeader(AUTH.WWW_AUTH_RESP)) {
|
/external/tpm2/ |
Hierarchy.c | 33 // Initialize owner, endorsement and lockout auth 113 TPM2B_AUTH *auth = NULL; local 118 auth = &gp.phProof; 122 auth = &gp.ehProof; 126 auth = &gp.shProof; 130 auth = &gr.nullProof; 136 return auth;
|
/external/wpa_supplicant_8/src/ap/ |
preauth_auth.c | 50 wpa_printf(MSG_DEBUG, "RSN: receive pre-auth packet " 53 wpa_printf(MSG_DEBUG, "RSN: too short pre-auth packet " 62 wpa_printf(MSG_DEBUG, "RSN: pre-auth for foreign address " 69 wpa_printf(MSG_DEBUG, "RSN: pre-auth for already association " 101 wpa_printf(MSG_DEBUG, "RSN pre-auth interface '%s'", ifname); 214 "added PMKSA cache entry (pre-auth)"); 219 "(pre-auth)");
|
/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/httpclient/4.5.2/ |
httpclient-4.5.2.jar | |
/external/autotest/client/common_lib/cros/tendo/ |
privet_helper.py | 14 URL_AUTH = 'v3/auth' 138 http header using 'Privet' as the auth realm. 177 """Go through pairing and insecure auth. 179 @return resulting auth token. 194 auth = self.send_privet_request(URL_AUTH, request_data=data) 195 auth_token = '%s %s' % (auth['tokenType'], auth['accessToken']) 216 @param auth_token: string auth token returned from privet_auth() 231 @param auth_token: string auth token returned from prviet_auth()
|
/frameworks/base/core/java/android/bluetooth/ |
BluetoothServerSocket.java | 79 * @param auth require the remote device to be authenticated 85 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port) 88 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null); 97 * @param auth require the remote device to be authenticated 105 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port, 109 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm, 119 * @param auth require the remote device to be authenticated 125 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid) 127 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
|
/device/linaro/bootloader/arm-trusted-firmware/common/auth/polarssl/ |
polarssl.mk | 38 -Icommon/auth/polarssl 64 common/auth/polarssl/polarssl.c 67 common/auth/polarssl/polarssl.c
|
/device/linaro/bootloader/edk2/NetworkPkg/Application/IpsecConfig/ |
IpSecConfig.h | 132 // --auth-algo
141 // --auth-proto
146 // --auth-method
|