Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 707) sorted by relevance

12345678910>>...29

/external/grpc-grpc/doc/
Dserver_side_auth.md4 …ibes how server-side authentication works in C-core based gRPC implementations only. In gRPC Java …
8authentication, gRPC exposes the *authentication context* for each call. The context exposes impor…
10 The authentication context is structured as a multi-map of key-value pairs - the *auth properties*.…
12 …perty key will act as the peer identity (e.g. for client certificate authentication this property …
14 … to authenticating RPCs. Using any other call/context properties for authentication purposes is wr…
18 For secure channel using mutual TLS authentication with both client and server certificates (test c…
49 - TLS/SSL certificate authentication (built into gRPC's security layer, automatically used whenever…
50 - (coming soon) JWT auth token authentication
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/
DRecordingAuthenticator.java28 public final PasswordAuthentication authentication; field in RecordingAuthenticator
30 public RecordingAuthenticator(PasswordAuthentication authentication) { in RecordingAuthenticator() argument
31 this.authentication = authentication; in RecordingAuthenticator()
47 return authentication; in getPasswordAuthentication()
/external/openscreen/osp/msgs/
Dosp_messages.cddl46 authentication-request = {
48 1: authentication-mechanism ; mechanism
54 authentication-response = {
56 1: authentication-response-result ; result
61 authentication-result = {
62 1: authentication-result-result ; result
65 authentication-mechanism = &(
69 authentication-response-result = &(
80 authentication-result-result = &(
/external/curl/docs/cmdline-opts/
Dntlm.d4 Help: Use HTTP NTLM authentication
14 Enables NTLM authentication. The NTLM authentication method was designed by
18 everyone who uses NTLM to switch to a public and documented authentication
21 If you want to enable NTLM for your proxy authentication, then use
Dsocks5-basic.d11 Tells curl to use username/password authentication when connecting to a SOCKS5
12 proxy. The username/password authentication is enabled by default. Use
13 --socks5-gssapi to force GSS-API authentication to SOCKS5 proxies.
Dproxy-basic.d4 Help: Use Basic authentication on the proxy
11 Tells curl to use HTTP Basic authentication when communicating with the given
13 default authentication method curl uses with proxies.
Dsocks5-gssapi.d11 Tells curl to use GSS-API authentication when connecting to a SOCKS5 proxy.
12 The GSS-API authentication is enabled by default (if curl is compiled with
13 GSS-API support). Use --socks5-basic to force username/password authentication
Dsasl-authzid.d5 Help: Identity for SASL PLAIN authentication
12 Use this authorization identity (authzid), during SASL PLAIN authentication,
13 in addition to the authentication identity (authcid) as specified by --user.
Dversion.d36 The built-in SASL authentication includes extensions to support SCRAM because
53 Kerberos V5 authentication is supported.
62 NTLM authentication is supported.
69 SPNEGO authentication is supported.
76 SRP (Secure Remote Password) authentication is supported for TLS.
Dnegotiate.d4 Help: Use HTTP Negotiate (SPNEGO) authentication
12 Enables Negotiate (SPNEGO) authentication.
18 the authentication code properly. Sending a '-u :' is enough as the user name
Daws-sigv4.d5 Help: Use AWS V4 signature authentication
12 Use AWS V4 signature authentication in the transfer.
15 outgoing authentication headers.
Danyauth.d4 Help: Pick any authentication method
12 Tells curl to figure out authentication method by itself, and use the most
15 network round-trip. This is used instead of setting a specific authentication
/external/arm-trusted-firmware/docs/design/
Dauth-framework.rst4 The aim of this document is to describe the authentication framework
62 This document describes the inner details of the authentication framework and
74 A CoT is basically a sequence of authentication images which usually starts with
125 Images in a CoT are categorised as authentication and data images. An
126 authentication image contains information to authenticate a data image or
127 another authentication image. A data image is usually a boot loader binary, but
128 it could be any other data that requires authentication.
144 #. If the image is an authentication image, extract the information that will
153 These components are responsible for initiating the authentication process for a
154 particular image in BL1 or BL2. For each BL image that requires authentication,
[all …]
/external/wpa_supplicant_8/hostapd/
Dhlr_auc_gw.txt4 database/authentication gateway interface to HLR/AuC. It could be
6 authentication center (HLR/AuC). hostapd will send SIM/AKA
7 authentication queries over a UNIX domain socket to and external
10 hlr_auc_gw can be configured with GSM and UMTS authentication data with
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
34 -g<triplet file> = path for GSM authentication triplets
79 authentication server for EAP-SIM/AKA/AKA':
DREADME2 Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
81 Any wired Ethernet driver for wired IEEE 802.1X authentication
104 minimal authentication mechanism for stations, whereas IEEE 802.1X
110 a station and it performs the authentication with the Authentication
149 will first perform IEEE 802.11 authentication. This is normally done
150 with open systems authentication, so there is no security. After
[all …]
/external/ipsec-tools/src/racoon/samples/roadwarrior/
DREADME2 remote access using hybrid authentication. In this setup, the VPN
18 using authentication against the system password database, and using
22 authentication, IP allocation and accounting. The address and secret
27 is set up to use hybrid authentication (aka mutual group authentication,
60 Note that for now there is no feedback in racoonctl if the authentication
67 hybrid authentication, though this has not been tested.
/external/autotest/server/cros/ap_configurators/
Dasus_qis_ap_configurator.py15 def _set_authentication(self, authentication, wait_for_xpath=None): argument
22 self.select_item_from_popup_by_xpath(authentication, auth,
135 def set_security_wep(self, key_value, authentication): argument
137 (key_value, authentication), 1, 1000)
140 def _set_security_wep(self, key_value, authentication): argument
Dasus_ap_configurator.py21 def _set_authentication(self, authentication, wait_for_xpath=None): argument
31 self.select_item_from_popup_by_xpath(authentication, auth,
213 def set_security_wep(self, key_value, authentication): argument
215 (key_value, authentication), 1, 1000)
218 def _set_security_wep(self, key_value, authentication): argument
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Deapol_test.sgml49 authentication client code from hostapd. In addition, it has
66 test suite for a RADIUS authentication server.</para>
75 <para>tries to complete EAP authentication based on the network
77 on the local host. A re-authentication is triggered to test fast
78 re-authentication. The configuration file uses the same format for
96 <listitem><para>IP address of the authentication server. The
110 <listitem><para>UDP port of the authentication server. The
117 <listitem><para>Shared secret with the authentication server.
184 <listitem><para>Save configuration after authentication.
/external/curl/docs/
DFEATURES.md47 - authentication: Basic, Digest, NTLM (9) and Negotiate (SPNEGO) (3)
59 - proxy authentication
80 - authentication
144 - authentication with NTLMv1
148 - authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (9), Kerberos 5
165 - authentication: Clear Text, APOP and SASL
166 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (9),
182 - authentication: Clear Text and SASL
183 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (9),
/external/curl/tests/data/
Dtest15117 though it's a response code that triggers authentication, we're not using
18 authentication so we should still fail.
28 HTTP GET with an error code that might trick authentication
Dtest15218 though it's a response code that triggers authentication, we're not using
19 authentication so we should still fail.
29 HTTP GET with an error code that might trick authentication and --fail
/external/python/cryptography/docs/hazmat/primitives/mac/
Dcmac.rst3 Cipher-based message authentication code (CMAC)
13 `Cipher-based message authentication codes`_ (or CMACs) are a tool for
14 calculating message authentication codes using a block cipher coupled with a
97 Finalize the current context and return the message authentication code
105 :return bytes: The message authentication code as bytes.
109 .. _`Cipher-based message authentication codes`: https://en.wikipedia.org/wiki/CMAC
/external/robolectric-shadows/robolectric/src/main/java/org/robolectric/internal/dependency/
DMavenDependencyResolver.java53 Authentication authentication = new Authentication(); in getLocalArtifactUrls() local
54 authentication.setUserName(repositoryUserName); in getLocalArtifactUrls()
55 authentication.setPassword(repositoryPassword); in getLocalArtifactUrls()
56 remoteRepository.addAuthentication(authentication); in getLocalArtifactUrls()
/external/python/google-api-python-client/scripts/readme-gen/templates/
Dauth.tmpl.rst4 This sample requires you to have authentication setup. Refer to the
9 https://cloud.google.com/docs/authentication/getting-started

12345678910>>...29