Home
last modified time | relevance | path

Searched +full:server +full:- +full:password (Results 1 – 25 of 1032) sorted by relevance

12345678910>>...42

/external/curl/tests/data/
Dtest20239 # Server-side
12 <!-- First request has Basic auth, wrong password -->
14 HTTP/1.1 401 Sorry wrong password
15 Server: Microsoft-IIS/5.0
16 Content-Type: text/html; charset=iso-8859-1
17 Content-Length: 29
18 WWW-Authenticate: Basic realm="testrealm"
20 This is a bad password page!
23 <!-- Second request has Basic auth, right password -->
25 HTTP/1.1 200 Things are fine in server land
[all …]
Dtest202410 # Server-side
13 <!-- Alternate the order that Basic and Digest headers appear in responses to
14 ensure that the order doesn't matter. -->
16 <!-- First request has Basic auth, wrong password -->
18 HTTP/1.1 401 Sorry wrong password
19 Server: Microsoft-IIS/5.0
20 Content-Type: text/html; charset=iso-8859-1
21 Content-Length: 29
22 WWW-Authenticate: Digest realm="testrealm", nonce="1"
23 WWW-Authenticate: Basic realm="testrealm"
[all …]
Dtest20279 # Server-side
12 <!--
16 libcurl doesn't detect that a given Digest password is wrong already on the
21 -->
23 <!-- First request has Digest auth, wrong password -->
26 Server: Microsoft-IIS/5.0
27 Content-Type: text/html; charset=iso-8859-1
28 Content-Length: 27
29 WWW-Authenticate: Digest realm="testrealm", nonce="1"
35 HTTP/1.1 401 Sorry wrong password
[all …]
Dtest202610 # Server-side
13 <!-- Alternate the order that Basic and Digest headers appear in responses to
14 ensure that the order doesn't matter. -->
16 <!-- First request has Digest auth, wrong password -->
19 Server: Microsoft-IIS/5.0
20 Content-Type: text/html; charset=iso-8859-1
21 Content-Length: 27
22 WWW-Authenticate: Digest realm="testrealm", nonce="1"
23 WWW-Authenticate: Basic realm="testrealm"
29 HTTP/1.1 401 Sorry wrong password
[all …]
Dtest202911 # Server-side
14 <!-- Alternate the order that Basic and NTLM headers appear in responses to
15 ensure that the order doesn't matter. -->
17 <!-- First request has NTLM auth, wrong password -->
20 Server: Microsoft-IIS/5.0
21 Content-Type: text/html; charset=iso-8859-1
22 Content-Length: 27
23 WWW-Authenticate: NTLM
24 WWW-Authenticate: Basic realm="testrealm"
31 Server: Microsoft-IIS/5.0
[all …]
Dtest202511 # Server-side
14 <!-- Alternate the order that Basic and NTLM headers appear in responses to
15 ensure that the order doesn't matter. -->
17 <!-- First request has Basic auth, wrong password -->
19 HTTP/1.1 401 Sorry wrong password
20 Server: Microsoft-IIS/5.0
21 Content-Type: text/html; charset=iso-8859-1
22 Content-Length: 29
23 WWW-Authenticate: NTLM
24 WWW-Authenticate: Basic realm="testrealm"
[all …]
Dtest203011 # Server-side
14 <!-- Alternate the order that Digest and NTLM headers appear in responses to
15 ensure that the order doesn't matter. -->
17 <!--
21 libcurl doesn't detect that a given Digest password is wrong already on the
26 -->
29 <!-- First request has NTLM auth, wrong password -->
32 Server: Microsoft-IIS/5.0
33 Content-Type: text/html; charset=iso-8859-1
34 Content-Length: 27
[all …]
Dtest203110 # Server-side
13 <!-- First request has NTLM auth, wrong password -->
16 Server: Microsoft-IIS/5.0
17 Content-Type: text/html; charset=iso-8859-1
18 Content-Length: 27
19 WWW-Authenticate: NTLM
26 Server: Microsoft-IIS/5.0
27 Content-Type: text/html; charset=iso-8859-1
28 Content-Length: 33
29 WWW-Authenticate: NTLM TlRMTVNTUAACAAAACAAIADAAAACGgAEAq6U1NAWaJCIAAAAAAAAAAAAAAAA4AAAATlRMTUF1dGg=
[all …]
Dtest202811 # Server-side
14 <!-- Alternate the order that Digest and NTLM headers appear in responses to
15 ensure that the order doesn't matter. -->
17 <!-- First request has Digest auth, wrong password -->
20 Server: Microsoft-IIS/5.0
21 Content-Type: text/html; charset=iso-8859-1
22 Content-Length: 27
23 WWW-Authenticate: NTLM
24 WWW-Authenticate: Digest realm="testrealm", nonce="1"
30 HTTP/1.1 401 Sorry wrong password
[all …]
Dtest6810 # Server-side
13 # This is supposed to be returned when the server gets a first
14 # Authorization: NTLM line passed-in from the client
17 Server: Microsoft-IIS/5.0
18 Content-Length: 34
19 Content-Type: text/html; charset=iso-8859-1
20 WWW-Authenticate: NTLM TlRMTVNTUAACAAAAAgACADAAAACGggEAc51AYVDgyNcAAAAAAAAAAG4AbgAyAAAAQ0MCAAQAQwBD…
25 # This is supposed to be returned when the server gets the second
26 # Authorization: NTLM line passed-in from the client
28 HTTP/1.1 401 You give me wrong password
[all …]
/external/autotest/site_utils/
Dmysql_bootstrap.py3 # Use of this source code is governed by a BSD-style license that can be
8 The purpose of this module is to grant access to a new-user/host/password
9 combination on a remote db server. For example, if we were bootstrapping
10 a new autotest main A1 with a remote database server A2, the scheduler
14 A1_pass, A1_host). If OTOH the db server is running locally we only need
19 Execute mysql -u <default_user> -p<default_pass> -e
25 In the case of a vagrant cluster, a remote vm cannot ssh into the db server
28 database server without knowing their ips by using the ip of the gateway.
29 This works because the db server vm redirects its database port (3306) to
35 Provision the vagrant db server
[all …]
Dcleanup_tko_db.py3 # Use of this source code is governed by a BSD-style license that can be
39 parser.add_argument('--recreate_test_attributes',
45 parser.add_argument('-l', '--logfile', type=str,
51 def _recreate_test_attributes(server, user, password, database): argument
54 server, user, password,
60 utils.run_sql_cmd(server, user, password,
62 utils.run_sql_cmd(server, user, password, create_table_cmd, database)
75 server = CONFIG.get_config_value(
81 password = CONFIG.get_config_value(
83 default=CONFIG.get_config_value('AUTOTEST_WEB', 'password'))
[all …]
/external/conscrypt/repackaged/platform/src/test/java/com/android/org/conscrypt/
DSpakeTest.java9 * http://www.apache.org/licenses/LICENSE-2.0
73 Executors.newCachedThreadPool(t -> new Thread(threadGroup, t));
163 SSLSocket server = (SSLSocket) serverSocket.accept(); in createSockets() local
166 return Pair.of(client, server); in createSockets()
172 SSLSocket server = sockets.getSecond(); in connectSockets() local
175 () -> { in connectSockets()
176 server.startHandshake(); in connectSockets()
185 SSLSocket server = sockets.getSecond(); in sendData() local
187 server.getOutputStream().write(new byte[] {1, 2, 3}); in sendData()
189 server.getInputStream().read(readBytes, 0, 3); in sendData()
[all …]
/external/conscrypt/platform/src/test/java/org/conscrypt/
DSpakeTest.java8 * http://www.apache.org/licenses/LICENSE-2.0
67 Executors.newCachedThreadPool(t -> new Thread(threadGroup, t));
157 SSLSocket server = (SSLSocket) serverSocket.accept(); in createSockets() local
160 return Pair.of(client, server); in createSockets()
166 SSLSocket server = sockets.getSecond(); in connectSockets() local
169 () -> { in connectSockets()
170 server.startHandshake(); in connectSockets()
179 SSLSocket server = sockets.getSecond(); in sendData() local
181 server.getOutputStream().write(new byte[] {1, 2, 3}); in sendData()
183 server.getInputStream().read(readBytes, 0, 3); in sendData()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_config.h3 * Copyright (c) 2003-2019, Jouni Malinen <j@w1.fi>
13 * struct eap_peer_cert_config - EAP peer certificate configuration/credential
17 * ca_cert - File path to CA certificate file (PEM/DER)
20 * and ca_path are not included, server certificate will not be
22 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the
30 * server certificate (SHA-256 hash of the DER encoded X.509
32 * server certificate chain are ignored and only the server certificate
34 * hash:://server/sha256/cert_hash_in_hex
35 * For example: "hash://server/sha256/
48 * ca_path - Directory path for CA certificate files (PEM)
[all …]
/external/webrtc/sdk/objc/unittests/
DRTCIceServerTest.mm4 * Use of this source code is governed by a BSD-style license
27 - (void)testOneURLServer {
28 RTC_OBJC_TYPE(RTCIceServer) *server =
31 webrtc::PeerConnectionInterface::IceServer iceStruct = server.nativeServer;
35 EXPECT_EQ("", iceStruct.password);
38 - (void)testTwoURLServer {
39 RTC_OBJC_TYPE(RTCIceServer) *server = [[RTC_OBJC_TYPE(RTCIceServer) alloc]
42 webrtc::PeerConnectionInterface::IceServer iceStruct = server.nativeServer;
47 EXPECT_EQ("", iceStruct.password);
50 - (void)testPasswordCredential {
[all …]
/external/webrtc/pc/
Dice_server_parsing_unittest.cc4 * Use of this source code is governed by a BSD-style license
32 return ParseUrl(url, "username", "password"); in ParseTurnUrl()
37 const std::string& password) { in ParseUrl() argument
39 url, username, password, in ParseUrl()
45 const std::string& password, in ParseUrl() argument
47 return ParseUrl(url, username, password, tls_certificate_policy, ""); in ParseUrl()
52 const std::string& password, in ParseUrl() argument
58 PeerConnectionInterface::IceServer server; in ParseUrl() local
59 server.urls.push_back(url); in ParseUrl()
60 server.username = username; in ParseUrl()
[all …]
/external/iperf3/src/
Diperf3.13 iperf3 \- perform network throughput tests
5 .B iperf3 -s [
9 .B iperf3 -c
10 .I server
18 To perform an iperf3 test the user must establish both a server and a
21 The iperf3 executable contains both client and server functionality.
22 An iperf3 server can be started using either of the -s or
23 --server command-line parameters, for example:
25 \fCiperf3 -s\fR
27 \fCiperf3 --server \fR
[all …]
/external/google-cloud-java/.kokoro/release/
Dcommon.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 set -eo pipefail
20 export GPG_PASSPHRASE=$(cat ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-passphrase)
24 mv ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-pubkeyring $GPG_HOMEDIR/pubring.gpg
25 mv ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-keyring $GPG_HOMEDIR/secring.gpg
26 export SONATYPE_USERNAME=$(cat ${KOKORO_KEYSTORE_DIR}/70247_sonatype-credentials | cut -f1 -d'|')
27 export SONATYPE_PASSWORD=$(cat ${KOKORO_KEYSTORE_DIR}/70247_sonatype-credentials | cut -f2 -d'|')
33 <server>
36 <password>${SONATYPE_PASSWORD}</password>
37 </server>
[all …]
/external/google-auth-library-java/.kokoro/release/
Dcommon.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 set -eo pipefail
20 export GPG_PASSPHRASE=$(cat ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-passphrase)
24 mv ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-pubkeyring $GPG_HOMEDIR/pubring.gpg
25 mv ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-keyring $GPG_HOMEDIR/secring.gpg
26 export SONATYPE_USERNAME=$(cat ${KOKORO_KEYSTORE_DIR}/70247_sonatype-credentials | cut -f1 -d'|')
27 export SONATYPE_PASSWORD=$(cat ${KOKORO_KEYSTORE_DIR}/70247_sonatype-credentials | cut -f2 -d'|')
33 <server>
36 <password>${SONATYPE_PASSWORD}</password>
37 </server>
[all …]
/external/google-cloud-java/owl-bot-postprocessor/synthtool/gcp/templates/java_library/.kokoro/release/
Dcommon.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 set -eo pipefail
20 export GPG_PASSPHRASE=$(cat ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-passphrase)
24 mv ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-pubkeyring $GPG_HOMEDIR/pubring.gpg
25 mv ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-keyring $GPG_HOMEDIR/secring.gpg
26 export SONATYPE_USERNAME=$(cat ${KOKORO_KEYSTORE_DIR}/70247_sonatype-credentials | cut -f1 -d'|')
27 export SONATYPE_PASSWORD=$(cat ${KOKORO_KEYSTORE_DIR}/70247_sonatype-credentials | cut -f2 -d'|')
33 <server>
36 <password>${SONATYPE_PASSWORD}</password>
37 </server>
[all …]
/external/sdk-platform-java/.kokoro/release/
Dcommon.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 set -eo pipefail
20 export GPG_PASSPHRASE=$(cat ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-passphrase)
24 mv ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-pubkeyring $GPG_HOMEDIR/pubring.gpg
25 mv ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-keyring $GPG_HOMEDIR/secring.gpg
26 …export GPG_KEY_ID=$(echo -n $(gpg --with-colons ${GPG_HOMEDIR}/pubring.gpg | awk -F':' '/pub/{ pri…
27 export SONATYPE_USERNAME=$(cat ${KOKORO_KEYSTORE_DIR}/70247_sonatype-credentials | cut -f1 -d'|')
28 export SONATYPE_PASSWORD=$(cat ${KOKORO_KEYSTORE_DIR}/70247_sonatype-credentials | cut -f2 -d'|')
35 <server>
38 <password>${SONATYPE_PASSWORD}</password>
[all …]
/external/libcups/cups/
Dusersys.c2 * User, system, and password routines for CUPS.
4 * Copyright 2007-2019 by Apple Inc.
5 * Copyright 1997-2006 by Easy Software Products.
15 #include "cups-private.h"
16 #include "debug-internal.h"
59 #define _CUPS_PASSCHAR '*' /* Character that is echoed for password */
76 any_root, /* Allow any (e.g., self-signed) root */
82 /* Server hostname */
117 * 'cupsEncryption()' - Get the current encryption settings.
125 * in a program. Multi-threaded programs that override the setting via the
[all …]
/external/obex/src/com/android/obex/
DAuthenticator.java2 * Copyright (c) 2008-2009, Motorola, Inc.
9 * - Redistributions of source code must retain the above copyright notice,
12 * - Redistributions in binary form must reproduce the above copyright notice,
16 * - Neither the name of the Motorola, Inc. nor the names of its contributors
37 * headers. When a client or server receives an authentication challenge or authentication response
46 * <p>When a client or server receives an authentication challenge header, the <code>
48 * application will then return the user name (if needed) and password via a <code>
49 * PasswordAuthentication</code> object. The password in this object is not sent in the
50 * authentication response. Instead, the 16-byte challenge received in the authentication challenge
51 * is combined with the password returned from the <code>onAuthenticationChallenge()</code> method
[all …]
/external/cldr/tools/scripts/ansible/
DREADME.md16 - Install Ansible <https://ansible.com>
17 - Install some prereqs:
20 ansible-galaxy install -r requirements.yml
23 - Make sure you can `ssh` into all of the needed systems. For example,
24 `ssh cldr-ref.unicode.org` should succeed without needing a password.
26 - You should be able to run `ansible all -m ping` and get something back
30 cldr-ref.unicode.org | SUCCESS => {
41 - Install python3. Make sure `python --version`
42 or `python3 --version` returns "Python 3…"
44 - TODO: these shouldn't be needed, but they are. Here's the entire
[all …]

12345678910>>...42