/external/grpc-grpc/doc/ |
D | server_side_auth.md | 4 …ibes how server-side authentication works in C-core based gRPC implementations only. In gRPC Java … 8 …authentication, gRPC exposes the *authentication context* for each call. The context exposes impor… 10 The authentication context is structured as a multi-map of key-value pairs - the *auth properties*.… 12 …perty key will act as the peer identity (e.g. for client certificate authentication this property … 14 … to authenticating RPCs. Using any other call/context properties for authentication purposes is wr… 18 For secure channel using mutual TLS authentication with both client and server certificates (test c… 49 - TLS/SSL certificate authentication (built into gRPC's security layer, automatically used whenever… 50 - (coming soon) JWT auth token authentication
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/ |
D | RecordingAuthenticator.java | 28 public final PasswordAuthentication authentication; field in RecordingAuthenticator 30 public RecordingAuthenticator(PasswordAuthentication authentication) { in RecordingAuthenticator() argument 31 this.authentication = authentication; in RecordingAuthenticator() 47 return authentication; in getPasswordAuthentication()
|
/external/openscreen/osp/msgs/ |
D | osp_messages.cddl | 46 authentication-request = { 48 1: authentication-mechanism ; mechanism 54 authentication-response = { 56 1: authentication-response-result ; result 61 authentication-result = { 62 1: authentication-result-result ; result 65 authentication-mechanism = &( 69 authentication-response-result = &( 80 authentication-result-result = &(
|
/external/curl/docs/cmdline-opts/ |
D | ntlm.d | 4 Help: Use HTTP NTLM authentication 14 Enables NTLM authentication. The NTLM authentication method was designed by 18 everyone who uses NTLM to switch to a public and documented authentication 21 If you want to enable NTLM for your proxy authentication, then use
|
D | socks5-basic.d | 11 Tells curl to use username/password authentication when connecting to a SOCKS5 12 proxy. The username/password authentication is enabled by default. Use 13 --socks5-gssapi to force GSS-API authentication to SOCKS5 proxies.
|
D | proxy-basic.d | 4 Help: Use Basic authentication on the proxy 11 Tells curl to use HTTP Basic authentication when communicating with the given 13 default authentication method curl uses with proxies.
|
D | socks5-gssapi.d | 11 Tells curl to use GSS-API authentication when connecting to a SOCKS5 proxy. 12 The GSS-API authentication is enabled by default (if curl is compiled with 13 GSS-API support). Use --socks5-basic to force username/password authentication
|
D | sasl-authzid.d | 5 Help: Identity for SASL PLAIN authentication 12 Use this authorization identity (authzid), during SASL PLAIN authentication, 13 in addition to the authentication identity (authcid) as specified by --user.
|
D | version.d | 36 The built-in SASL authentication includes extensions to support SCRAM because 53 Kerberos V5 authentication is supported. 62 NTLM authentication is supported. 69 SPNEGO authentication is supported. 76 SRP (Secure Remote Password) authentication is supported for TLS.
|
D | negotiate.d | 4 Help: Use HTTP Negotiate (SPNEGO) authentication 12 Enables Negotiate (SPNEGO) authentication. 18 the authentication code properly. Sending a '-u :' is enough as the user name
|
D | aws-sigv4.d | 5 Help: Use AWS V4 signature authentication 12 Use AWS V4 signature authentication in the transfer. 15 outgoing authentication headers.
|
D | anyauth.d | 4 Help: Pick any authentication method 12 Tells curl to figure out authentication method by itself, and use the most 15 network round-trip. This is used instead of setting a specific authentication
|
/external/arm-trusted-firmware/docs/design/ |
D | auth-framework.rst | 4 The aim of this document is to describe the authentication framework 62 This document describes the inner details of the authentication framework and 74 A CoT is basically a sequence of authentication images which usually starts with 125 Images in a CoT are categorised as authentication and data images. An 126 authentication image contains information to authenticate a data image or 127 another authentication image. A data image is usually a boot loader binary, but 128 it could be any other data that requires authentication. 144 #. If the image is an authentication image, extract the information that will 153 These components are responsible for initiating the authentication process for a 154 particular image in BL1 or BL2. For each BL image that requires authentication, [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | hlr_auc_gw.txt | 4 database/authentication gateway interface to HLR/AuC. It could be 6 authentication center (HLR/AuC). hostapd will send SIM/AKA 7 authentication queries over a UNIX domain socket to and external 10 hlr_auc_gw can be configured with GSM and UMTS authentication data with 13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the 34 -g<triplet file> = path for GSM authentication triplets 79 authentication server for EAP-SIM/AKA/AKA':
|
D | README | 2 Authenticator and RADIUS authentication server 56 included in the kernel driver: using external RADIUS authentication 62 EAP server (i.e., allow full authentication without requiring 63 an external RADIUS authentication server), and RADIUS authentication 64 server for EAP authentication. 81 Any wired Ethernet driver for wired IEEE 802.1X authentication 104 minimal authentication mechanism for stations, whereas IEEE 802.1X 110 a station and it performs the authentication with the Authentication 149 will first perform IEEE 802.11 authentication. This is normally done 150 with open systems authentication, so there is no security. After [all …]
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
D | README | 2 remote access using hybrid authentication. In this setup, the VPN 18 using authentication against the system password database, and using 22 authentication, IP allocation and accounting. The address and secret 27 is set up to use hybrid authentication (aka mutual group authentication, 60 Note that for now there is no feedback in racoonctl if the authentication 67 hybrid authentication, though this has not been tested.
|
/external/autotest/server/cros/ap_configurators/ |
D | asus_qis_ap_configurator.py | 15 def _set_authentication(self, authentication, wait_for_xpath=None): argument 22 self.select_item_from_popup_by_xpath(authentication, auth, 135 def set_security_wep(self, key_value, authentication): argument 137 (key_value, authentication), 1, 1000) 140 def _set_security_wep(self, key_value, authentication): argument
|
D | asus_ap_configurator.py | 21 def _set_authentication(self, authentication, wait_for_xpath=None): argument 31 self.select_item_from_popup_by_xpath(authentication, auth, 213 def set_security_wep(self, key_value, authentication): argument 215 (key_value, authentication), 1, 1000) 218 def _set_security_wep(self, key_value, authentication): argument
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | eapol_test.sgml | 49 authentication client code from hostapd. In addition, it has 66 test suite for a RADIUS authentication server.</para> 75 <para>tries to complete EAP authentication based on the network 77 on the local host. A re-authentication is triggered to test fast 78 re-authentication. The configuration file uses the same format for 96 <listitem><para>IP address of the authentication server. The 110 <listitem><para>UDP port of the authentication server. The 117 <listitem><para>Shared secret with the authentication server. 184 <listitem><para>Save configuration after authentication.
|
/external/curl/docs/ |
D | FEATURES.md | 47 - authentication: Basic, Digest, NTLM (9) and Negotiate (SPNEGO) (3) 59 - proxy authentication 80 - authentication 144 - authentication with NTLMv1 148 - authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (9), Kerberos 5 165 - authentication: Clear Text, APOP and SASL 166 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (9), 182 - authentication: Clear Text and SASL 183 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (9),
|
/external/curl/tests/data/ |
D | test151 | 17 though it's a response code that triggers authentication, we're not using 18 authentication so we should still fail. 28 HTTP GET with an error code that might trick authentication
|
D | test152 | 18 though it's a response code that triggers authentication, we're not using 19 authentication so we should still fail. 29 HTTP GET with an error code that might trick authentication and --fail
|
/external/python/cryptography/docs/hazmat/primitives/mac/ |
D | cmac.rst | 3 Cipher-based message authentication code (CMAC) 13 `Cipher-based message authentication codes`_ (or CMACs) are a tool for 14 calculating message authentication codes using a block cipher coupled with a 97 Finalize the current context and return the message authentication code 105 :return bytes: The message authentication code as bytes. 109 .. _`Cipher-based message authentication codes`: https://en.wikipedia.org/wiki/CMAC
|
/external/robolectric-shadows/robolectric/src/main/java/org/robolectric/internal/dependency/ |
D | MavenDependencyResolver.java | 53 Authentication authentication = new Authentication(); in getLocalArtifactUrls() local 54 authentication.setUserName(repositoryUserName); in getLocalArtifactUrls() 55 authentication.setPassword(repositoryPassword); in getLocalArtifactUrls() 56 remoteRepository.addAuthentication(authentication); in getLocalArtifactUrls()
|
/external/python/google-api-python-client/scripts/readme-gen/templates/ |
D | auth.tmpl.rst | 4 This sample requires you to have authentication setup. Refer to the 9 https://cloud.google.com/docs/authentication/getting-started
|