Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 72) sorted by relevance

123

/external/openssl/android.testssl/
Dtestssl38 echo test sslv2 with server authentication
42 echo test sslv2 with client authentication
45 echo test sslv2 with both client and server authentication
52 echo test sslv3 with server authentication
55 echo test sslv3 with client authentication
58 echo test sslv3 with both client and server authentication
64 echo test sslv2/sslv3 with server authentication
67 echo test sslv2/sslv3 with client authentication
70 echo test sslv2/sslv3 with both client and server authentication
73 echo test sslv2/sslv3 with both client and server authentication and small client buffers
[all …]
/external/ipsec-tools/src/racoon/samples/roadwarrior/
DREADME2 remote access using hybrid authentication. In this setup, the VPN
18 using authentication against the system password database, and using
22 authentication, IP allocation and accounting. The address and secret
27 is set up to use hybrid authentication (aka mutual group authentication,
60 Note that for now there is no feedback in racoonctl if the authentication
67 hybrid authentication, though this has not been tested.
/external/wpa_supplicant/
DChangeLog91 * added support for EAP-FAST authentication with inner methods that
126 * added support for matching the subjectAltName of the authentication
129 * fixed EAP-SIM/AKA key derivation for re-authentication case (only
233 at the end of RSN pre-authentication and added unregistration of
295 * fixed EAPOL re-authentication for sessions that used PMKSA caching
300 * fixed a memory leak in EAP-TTLS re-authentication
318 * fixed TLS library deinitialization after RSN pre-authentication not
319 to disable TLS library for normal authentication
336 * fixed EAP-SIM and EAP-AKA pseudonym and fast re-authentication to
364 EAP-AKA authentication using SIM/USIM card under Windows
[all …]
DREADME70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
71 Following authentication methods are supported with an integrate IEEE 802.1X
95 authentication)
104 * pre-authentication
242 machines. However, there can be used as inner authentication
276 protection, and non-keyed authentication does not protect against bit
284 keyed packet authentication mechanism (Michael MIC).
287 an external authentication server (e.g., RADIUS) and EAP just like
312 messages in initial key handshake, pre-authentication, and PMKSA caching).
321 negotiation with a WPA Authenticator and EAP authentication with
[all …]
Deap_testing.txt2 IEEE 802.1X/EAPOL authentication
9 IEEE 802.1X authentication automatically without need for wireless
16 I'm more than willing to add new RADIUS authentication servers to make
21 In order for me to be able to use a new authentication server, the
197 (Server rejects authentication without any reason in debug log. It
345 - sends tunneled EAP-Success with MPPE keys and expects the authentication to
/external/wpa_supplicant_6/wpa_supplicant/
DChangeLog22 fix wired IEEE 802.1X authentication
87 * fixed FT (IEEE 802.11r) authentication after a failed association to
89 * added support for configuring Phase 2 (inner/tunneled) authentication
177 only shared key/password authentication is supported in this version
221 * added support for EAP-FAST authentication with inner methods that
273 * added support for matching the subjectAltName of the authentication
276 * fixed EAP-SIM/AKA key derivation for re-authentication case (only
380 at the end of RSN pre-authentication and added unregistration of
442 * fixed EAPOL re-authentication for sessions that used PMKSA caching
447 * fixed a memory leak in EAP-TTLS re-authentication
[all …]
DREADME70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
71 Following authentication methods are supported with an integrate IEEE 802.1X
96 authentication)
105 * pre-authentication
246 machines. However, there can be used as inner authentication
280 protection, and non-keyed authentication does not protect against bit
288 keyed packet authentication mechanism (Michael MIC).
291 an external authentication server (e.g., RADIUS) and EAP just like
316 messages in initial key handshake, pre-authentication, and PMKSA caching).
325 negotiation with a WPA Authenticator and EAP authentication with
[all …]
Deap_testing.txt2 IEEE 802.1X/EAPOL authentication
9 IEEE 802.1X authentication automatically without need for wireless
16 I'm more than willing to add new RADIUS authentication servers to make
21 In order for me to be able to use a new authentication server, the
134 client authentication followed by TNC inside the tunnel
158 - EAP-TTLS / EAP-TNC (partial support; no authentication sequence)
234 (Server rejects authentication without any reason in debug log. It
378 - sends tunneled EAP-Success with MPPE keys and expects the authentication to
Dtodo.txt8 authentication has been completed (cache scard data based on serial#(?)
26 authentication ("canned" Success); this should be ignored based on
56 this should likely happen before EAP is initialized for authentication;
/external/ipsec-tools/src/racoon/doc/
DREADME.plainrsa3 Before you begin, you should understand that the RSA authentication
19 RSA authentication. For the purpose of this document, we assume that
20 we are setting up RSA authentication between two networked hosts
64 each host to (a) turn on RSA authentication, and (b) designate each
70 directory you have just specified it will fail the authentication
87 5) You have finished configuring the host for RSA authentication.
102 3) You have specified the "rsasig" method for authentication in the
DFAQ54 Enable hybrid authentication, and ISAKMP mode config and
58 Enable the use of RADIUS with hybrid authentication on the
59 server side. RADIUS is used for authentication, configuration
62 Enable the use of PAM with hybrid authentication on the
63 server side. PAM can be used for authentication and accounting.
DREADME.gssapi1 The gss-api authentication mechanism implementation for racoon was
11 by login authentication daemons) in these situations is to add
12 a set of special credentials to be used. For example, authentication
42 * The racoon.conf file accepts "gssapi_krb" as authentication
93 With the Heimdal gss-api implementation, the gssapi_krb authentication
96 gss_accept_sec_context when mutual authentication is requested.
/external/bluetooth/bluez/doc/
Dagent-api.txt26 needs to get the passkey for an authentication.
37 needs to get the passkey for an authentication.
48 needs to display a passkey for an authentication.
63 needs to confirm a passkey for an authentication.
/external/webkit/WebKit/mac/Panels/
DWebAuthenticationPanel.m142 "prompt string in authentication panel"),
147 … "prompt string in authentication panel"), realm, host];
150 … "prompt string in authentication panel"), host];
155 "prompt string in authentication panel"),
160 … "prompt string in authentication panel"), realm, host];
163 … "prompt string in authentication panel"), host];
199 "message in authentication panel")];
205 "message in authentication panel")];
/external/ppp/pppd/plugins/radius/etc/
Dradiusclient.conf.in3 # specify which authentication comes first respectively which
4 # authentication is used. possible values are: "radius" and "local".
29 # RADIUS server to use for authentication requests. this config
63 # default authentication realm to append to all usernames if no
Dport-id-map5 # is reported as part of a RADIUS authentication or accouting request.
/external/webkit/WebCore/platform/network/cf/
DSocketStreamHandleCFNet.cpp385 …RetainPtr<CFHTTPAuthenticationRef> authentication(AdoptCF, CFHTTPAuthenticationCreateFromResponse(… in addCONNECTCredentials() local
387 if (!CFHTTPAuthenticationRequiresUserNameAndPassword(authentication.get())) { in addCONNECTCredentials()
395 RetainPtr<CFStringRef> methodCF(AdoptCF, CFHTTPAuthenticationCopyMethod(authentication.get())); in addCONNECTCredentials()
396 RetainPtr<CFStringRef> realmCF(AdoptCF, CFHTTPAuthenticationCopyRealm(authentication.get())); in addCONNECTCredentials()
407 …pliedCredentials = CFHTTPMessageApplyCredentials(dummyRequest.get(), authentication.get(), loginCF… in addCONNECTCredentials()
/external/webkit/WebKit/win/Interfaces/
DIWebDownload.idl48 authentication-related delegate methods, it will automatically
49 prompt for authentication using the standard WebKit authentication
DIWebResourceLoadDelegate.idl99 @abstract Start authentication for the resource, providing a challenge
102 @param challenge The NSURLAuthenticationChallenge to start authentication for
103 @discussion If you do not implement this delegate method, WebKit will handle authentication
111 @abstract Cancel authentication for a given request
112 @param challenge The NSURLAuthenticationChallenge for which to cancel authentication
/external/dropbear/
DSMALL19 - You can disable either password or public-key authentication, though note
20 that the IETF draft states that pubkey authentication is required.
/external/webkit/LayoutTests/http/tests/appcache/
Dauth-expected.txt1 Test that appcache works with authentication. Should say SUCCESS:
/external/dbus/test/data/auth/
Dinvalid-hex-encoding.auth-script1 ## this tests an invalid hex encoding followed by successful authentication
/external/openssl/patches/
Dsmall_records.patch322 echo test sslv2/sslv3 with both client and server authentication
325 +echo test sslv2/sslv3 with both client and server authentication and small client buffers
328 +echo test sslv2/sslv3 with both client and server authentication and small server buffers
331 +echo test sslv2/sslv3 with both client and server authentication and small client and server buffe…
/external/webkit/WebKit/English.lproj/
DLocalizable.strings382 /* prompt string in authentication panel */
385 /* prompt string in authentication panel */
388 /* prompt string in authentication panel */
397 /* prompt string in authentication panel */
400 /* prompt string in authentication panel */
403 /* prompt string in authentication panel */
451 /* message in authentication panel */
454 /* message in authentication panel */
686 "proxy authentication required" = "proxy authentication required";
/external/ipsec-tools/
DNEWS46 o Plain RSA authentication
72 o Support for server-side hybrid authentication, with full
74 o Support for client-side hybrid authentication (Tested only with

123