/external/openssl/android.testssl/ |
D | testssl | 38 echo test sslv2 with server authentication 42 echo test sslv2 with client authentication 45 echo test sslv2 with both client and server authentication 52 echo test sslv3 with server authentication 55 echo test sslv3 with client authentication 58 echo test sslv3 with both client and server authentication 64 echo test sslv2/sslv3 with server authentication 67 echo test sslv2/sslv3 with client authentication 70 echo test sslv2/sslv3 with both client and server authentication 73 echo test sslv2/sslv3 with both client and server authentication and small client buffers [all …]
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
D | README | 2 remote access using hybrid authentication. In this setup, the VPN 18 using authentication against the system password database, and using 22 authentication, IP allocation and accounting. The address and secret 27 is set up to use hybrid authentication (aka mutual group authentication, 60 Note that for now there is no feedback in racoonctl if the authentication 67 hybrid authentication, though this has not been tested.
|
/external/wpa_supplicant/ |
D | ChangeLog | 91 * added support for EAP-FAST authentication with inner methods that 126 * added support for matching the subjectAltName of the authentication 129 * fixed EAP-SIM/AKA key derivation for re-authentication case (only 233 at the end of RSN pre-authentication and added unregistration of 295 * fixed EAPOL re-authentication for sessions that used PMKSA caching 300 * fixed a memory leak in EAP-TTLS re-authentication 318 * fixed TLS library deinitialization after RSN pre-authentication not 319 to disable TLS library for normal authentication 336 * fixed EAP-SIM and EAP-AKA pseudonym and fast re-authentication to 364 EAP-AKA authentication using SIM/USIM card under Windows [all …]
|
D | README | 70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 71 Following authentication methods are supported with an integrate IEEE 802.1X 95 authentication) 104 * pre-authentication 242 machines. However, there can be used as inner authentication 276 protection, and non-keyed authentication does not protect against bit 284 keyed packet authentication mechanism (Michael MIC). 287 an external authentication server (e.g., RADIUS) and EAP just like 312 messages in initial key handshake, pre-authentication, and PMKSA caching). 321 negotiation with a WPA Authenticator and EAP authentication with [all …]
|
D | eap_testing.txt | 2 IEEE 802.1X/EAPOL authentication 9 IEEE 802.1X authentication automatically without need for wireless 16 I'm more than willing to add new RADIUS authentication servers to make 21 In order for me to be able to use a new authentication server, the 197 (Server rejects authentication without any reason in debug log. It 345 - sends tunneled EAP-Success with MPPE keys and expects the authentication to
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | ChangeLog | 22 fix wired IEEE 802.1X authentication 87 * fixed FT (IEEE 802.11r) authentication after a failed association to 89 * added support for configuring Phase 2 (inner/tunneled) authentication 177 only shared key/password authentication is supported in this version 221 * added support for EAP-FAST authentication with inner methods that 273 * added support for matching the subjectAltName of the authentication 276 * fixed EAP-SIM/AKA key derivation for re-authentication case (only 380 at the end of RSN pre-authentication and added unregistration of 442 * fixed EAPOL re-authentication for sessions that used PMKSA caching 447 * fixed a memory leak in EAP-TTLS re-authentication [all …]
|
D | README | 70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 71 Following authentication methods are supported with an integrate IEEE 802.1X 96 authentication) 105 * pre-authentication 246 machines. However, there can be used as inner authentication 280 protection, and non-keyed authentication does not protect against bit 288 keyed packet authentication mechanism (Michael MIC). 291 an external authentication server (e.g., RADIUS) and EAP just like 316 messages in initial key handshake, pre-authentication, and PMKSA caching). 325 negotiation with a WPA Authenticator and EAP authentication with [all …]
|
D | eap_testing.txt | 2 IEEE 802.1X/EAPOL authentication 9 IEEE 802.1X authentication automatically without need for wireless 16 I'm more than willing to add new RADIUS authentication servers to make 21 In order for me to be able to use a new authentication server, the 134 client authentication followed by TNC inside the tunnel 158 - EAP-TTLS / EAP-TNC (partial support; no authentication sequence) 234 (Server rejects authentication without any reason in debug log. It 378 - sends tunneled EAP-Success with MPPE keys and expects the authentication to
|
D | todo.txt | 8 authentication has been completed (cache scard data based on serial#(?) 26 authentication ("canned" Success); this should be ignored based on 56 this should likely happen before EAP is initialized for authentication;
|
/external/ipsec-tools/src/racoon/doc/ |
D | README.plainrsa | 3 Before you begin, you should understand that the RSA authentication 19 RSA authentication. For the purpose of this document, we assume that 20 we are setting up RSA authentication between two networked hosts 64 each host to (a) turn on RSA authentication, and (b) designate each 70 directory you have just specified it will fail the authentication 87 5) You have finished configuring the host for RSA authentication. 102 3) You have specified the "rsasig" method for authentication in the
|
D | FAQ | 54 Enable hybrid authentication, and ISAKMP mode config and 58 Enable the use of RADIUS with hybrid authentication on the 59 server side. RADIUS is used for authentication, configuration 62 Enable the use of PAM with hybrid authentication on the 63 server side. PAM can be used for authentication and accounting.
|
D | README.gssapi | 1 The gss-api authentication mechanism implementation for racoon was 11 by login authentication daemons) in these situations is to add 12 a set of special credentials to be used. For example, authentication 42 * The racoon.conf file accepts "gssapi_krb" as authentication 93 With the Heimdal gss-api implementation, the gssapi_krb authentication 96 gss_accept_sec_context when mutual authentication is requested.
|
/external/bluetooth/bluez/doc/ |
D | agent-api.txt | 26 needs to get the passkey for an authentication. 37 needs to get the passkey for an authentication. 48 needs to display a passkey for an authentication. 63 needs to confirm a passkey for an authentication.
|
/external/webkit/WebKit/mac/Panels/ |
D | WebAuthenticationPanel.m | 142 "prompt string in authentication panel"), 147 … "prompt string in authentication panel"), realm, host]; 150 … "prompt string in authentication panel"), host]; 155 "prompt string in authentication panel"), 160 … "prompt string in authentication panel"), realm, host]; 163 … "prompt string in authentication panel"), host]; 199 "message in authentication panel")]; 205 "message in authentication panel")];
|
/external/ppp/pppd/plugins/radius/etc/ |
D | radiusclient.conf.in | 3 # specify which authentication comes first respectively which 4 # authentication is used. possible values are: "radius" and "local". 29 # RADIUS server to use for authentication requests. this config 63 # default authentication realm to append to all usernames if no
|
D | port-id-map | 5 # is reported as part of a RADIUS authentication or accouting request.
|
/external/webkit/WebCore/platform/network/cf/ |
D | SocketStreamHandleCFNet.cpp | 385 …RetainPtr<CFHTTPAuthenticationRef> authentication(AdoptCF, CFHTTPAuthenticationCreateFromResponse(… in addCONNECTCredentials() local 387 if (!CFHTTPAuthenticationRequiresUserNameAndPassword(authentication.get())) { in addCONNECTCredentials() 395 RetainPtr<CFStringRef> methodCF(AdoptCF, CFHTTPAuthenticationCopyMethod(authentication.get())); in addCONNECTCredentials() 396 RetainPtr<CFStringRef> realmCF(AdoptCF, CFHTTPAuthenticationCopyRealm(authentication.get())); in addCONNECTCredentials() 407 …pliedCredentials = CFHTTPMessageApplyCredentials(dummyRequest.get(), authentication.get(), loginCF… in addCONNECTCredentials()
|
/external/webkit/WebKit/win/Interfaces/ |
D | IWebDownload.idl | 48 authentication-related delegate methods, it will automatically 49 prompt for authentication using the standard WebKit authentication
|
D | IWebResourceLoadDelegate.idl | 99 @abstract Start authentication for the resource, providing a challenge 102 @param challenge The NSURLAuthenticationChallenge to start authentication for 103 @discussion If you do not implement this delegate method, WebKit will handle authentication 111 @abstract Cancel authentication for a given request 112 @param challenge The NSURLAuthenticationChallenge for which to cancel authentication
|
/external/dropbear/ |
D | SMALL | 19 - You can disable either password or public-key authentication, though note 20 that the IETF draft states that pubkey authentication is required.
|
/external/webkit/LayoutTests/http/tests/appcache/ |
D | auth-expected.txt | 1 Test that appcache works with authentication. Should say SUCCESS:
|
/external/dbus/test/data/auth/ |
D | invalid-hex-encoding.auth-script | 1 ## this tests an invalid hex encoding followed by successful authentication
|
/external/openssl/patches/ |
D | small_records.patch | 322 echo test sslv2/sslv3 with both client and server authentication 325 +echo test sslv2/sslv3 with both client and server authentication and small client buffers 328 +echo test sslv2/sslv3 with both client and server authentication and small server buffers 331 +echo test sslv2/sslv3 with both client and server authentication and small client and server buffe…
|
/external/webkit/WebKit/English.lproj/ |
D | Localizable.strings | 382 /* prompt string in authentication panel */ 385 /* prompt string in authentication panel */ 388 /* prompt string in authentication panel */ 397 /* prompt string in authentication panel */ 400 /* prompt string in authentication panel */ 403 /* prompt string in authentication panel */ 451 /* message in authentication panel */ 454 /* message in authentication panel */ 686 "proxy authentication required" = "proxy authentication required";
|
/external/ipsec-tools/ |
D | NEWS | 46 o Plain RSA authentication 72 o Support for server-side hybrid authentication, with full 74 o Support for client-side hybrid authentication (Tested only with
|