Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 123) sorted by relevance

12345

/external/openssl/android.testssl/
Dtestssl38 echo test sslv2 with server authentication
42 echo test sslv2 with client authentication
45 echo test sslv2 with both client and server authentication
52 echo test sslv3 with server authentication
55 echo test sslv3 with client authentication
58 echo test sslv3 with both client and server authentication
64 echo test sslv2/sslv3 with server authentication
67 echo test sslv2/sslv3 with client authentication
70 echo test sslv2/sslv3 with both client and server authentication
73 echo test sslv2/sslv3 with both client and server authentication and handshake cutthrough
[all …]
/external/okhttp/src/test/java/com/squareup/okhttp/internal/
DRecordingAuthenticator.java28 public final PasswordAuthentication authentication; field in RecordingAuthenticator
30 public RecordingAuthenticator(PasswordAuthentication authentication) { in RecordingAuthenticator() argument
31 this.authentication = authentication; in RecordingAuthenticator()
56 return authentication; in getPasswordAuthentication()
/external/smack/src/org/jivesoftware/smack/
DSASLAuthentication.java.orig77 * Boolean indication if SASL authentication has failed. When failed the server may end
194 * Returns true if the server offered SASL authentication besides ANONYMOUS SASL.
196 * @return true if the server offered SASL authentication besides ANONYMOUS SASL.
203 * Performs SASL authentication of the specified user. If SASL authentication was successful
234 // Trigger SASL authentication with the selected mechanism. We use
252 // SASL authentication failed and the server may have closed the connection
255 throw new XMPPException("SASL authentication " +
259 throw new XMPPException("SASL authentication failed using mechanism " +
268 // SASL authentication failed
279 … throw new XMPPException("SASL Authentication failed. No known authentication mechanisims.");
[all …]
/external/openssh/
Dssh-add.04 ssh-add - adds private key identities to the authentication agent
12 ssh-add adds private key identities to the authentication agent,
24 The authentication agent must be running and the SSH_AUTH_SOCK
31 before being used for authentication. Confirmation is performed
83 Contains the protocol version 1 RSA authentication identity of
87 Contains the protocol version 2 DSA authentication identity of
91 Contains the protocol version 2 ECDSA authentication identity of
95 Contains the protocol version 2 RSA authentication identity of
103 ssh-add is unable to contact the authentication agent.
Dssh-agent.04 ssh-agent - authentication agent
12 authentication (RSA, DSA, ECDSA). The idea is that ssh-agent is started
16 automatically used for authentication when logging in to other machines
52 If neither of these is the case then the authentication will fail. It
59 and authentication passphrases never go over the network. However, the
92 Contains the protocol version 1 RSA authentication identity of
96 Contains the protocol version 2 DSA authentication identity of
100 Contains the protocol version 2 ECDSA authentication identity of
104 Contains the protocol version 2 RSA authentication identity of
109 authentication agent. These sockets should only be readable by
Dssh-keysign.04 ssh-keysign - ssh helper program for host-based authentication
11 the digital signature required during host-based authentication with SSH
20 authentication.
33 host-based authentication is used.
Dsshd_config.076 for user authentication. The format is described in the
90 certificate authentication. When using certificates signed by a
93 authentication. Names are listed one per line preceded by key
108 is only used when authentication proceeds using a CA listed in
115 before authentication is allowed. If the argument is ``none''
120 Specifies whether challenge-response authentication is allowed
121 (e.g. via PAM or though authentication styles supported in
126 authentication. All components of the pathname must be root-
242 Specifies whether user authentication based on GSSAPI is allowed.
252 Specifies whether rhosts or /etc/hosts.equiv authentication
[all …]
Dsshd.018 The forked daemons handle key exchange, encryption, authentication,
117 beginning, authentication, and termination of each connection is
136 making DNS requests unless the authentication mechanism or
170 cryptographic message authentication code (hmac-md5, hmac-sha1, umac-64,
173 Finally, the server and the client enter an authentication dialog. The
174 client tries to authenticate itself using host-based authentication,
175 public key authentication, challenge-response authentication, or password
176 authentication.
178 Regardless of the authentication type, the account is checked to ensure
185 Linuxes). If there is a requirement to disable password authentication
[all …]
Dsshd_config79 # Set this to 'yes' to enable PAM authentication, account processing,
80 # and session processing. If this is enabled, PAM authentication will
83 # PAM authentication via ChallengeResponseAuthentication may bypass
86 # PAM authentication, then enable this but set PasswordAuthentication
Dsshd_config.android78 # Set this to 'yes' to enable PAM authentication, account processing,
79 # and session processing. If this is enabled, PAM authentication will
82 # PAM authentication via ChallengeResponseAuthentication may bypass
85 # PAM authentication, then enable this but set PasswordAuthentication
DOVERVIEW76 implement X11 forwarding, TCP/IP forwarding, and authentication
82 - Code to communicate with the authentication agent is in authfd.c.
86 - Code for various authentication methods resides in auth-*.c
93 - In the client end, authentication code is in sshconnect.c. It
96 authentication agent using authfd.c.
103 proxy), and performs authentication (ssh_login in sshconnect.c).
145 negotiate encryption, then perform authentication, preparatory
155 - authentication
DPROTOCOL.certkeys1 This document describes a simple public-key certificate authentication
7 The SSH protocol currently supports a simple public key authentication
12 managed, passwordless authentication and centrally certified host keys.
14 These protocol extensions build on the simple public key authentication
15 system already in SSH to allow certificate-based authentication. The
21 A sshd server may be configured to allow authentication via certified
45 algorithm names to add support for certificate authentication without
50 using the existing SSH "publickey" authentication method described
207 used for authentication.
211 for authentication. Addresses are
Dssh.039 -A Enables forwarding of the authentication agent connection. This
51 -a Disables forwarding of the authentication agent connection.
139 key authentication is read. The default is ~/.ssh/identity for
148 -K Enables GSSAPI-based authentication and forwarding (delegation)
184 MAC (message authentication code) algorithms can be specified in
340 authentication, and configuration problems. Multiple -v options
391 support similar authentication methods, but protocol 2 is the default
398 The methods available for authentication are: GSSAPI-based
399 authentication, host-based authentication, public key authentication,
400 challenge-response authentication, and password authentication.
[all …]
/external/wpa_supplicant_8/hostapd/
Dhlr_auc_gw.txt4 database/authentication gateway interface to HLR/AuC. It could be
6 authentication center (HLR/AuC). hostapd will send SIM/AKA
7 authentication queries over a UNIX domain socket to and external
10 hlr_auc_gw can be configured with GSM and UMTS authentication data with
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
34 -g<triplet file> = path for GSM authentication triplets
79 authentication server for EAP-SIM/AKA/AKA':
DREADME2 Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
87 Any wired Ethernet driver for wired IEEE 802.1X authentication
111 minimal authentication mechanism for stations, whereas IEEE 802.1X
117 a station and it performs the authentication with the Authentication
156 will first perform IEEE 802.11 authentication. This is normally done
157 with open systems authentication, so there is no security. After
[all …]
/external/ipsec-tools/src/racoon/samples/roadwarrior/
DREADME2 remote access using hybrid authentication. In this setup, the VPN
18 using authentication against the system password database, and using
22 authentication, IP allocation and accounting. The address and secret
27 is set up to use hybrid authentication (aka mutual group authentication,
60 Note that for now there is no feedback in racoonctl if the authentication
67 hybrid authentication, though this has not been tested.
/external/apache-harmony/support/src/test/resources/tests/resources/manifest/
Dhyts_MANIFEST.MF19 Export-Package: com.ibm.ive.eccomm.client.services.authentication; specification-version=1.0.0,
20 com.ibm.ive.eccomm.service.authentication; specification-version=1.0.0,
23 Export-Service: com.ibm.ive.eccomm.service.authentication.AuthenticationService,
/external/srtp/doc/
Drfc3711.txt35 can provide confidentiality, message authentication, and replay
128 can provide confidentiality, message authentication, and replay
132 SRTP provides a framework for encryption and message authentication
143 encryption, a keyed-hash based function for message authentication,
179 authentication" and "authentication tag" as is common practice, even
182 authentication.
268 SRTP does to RTP. SRTCP message authentication is MANDATORY and
311 | : authentication tag (RECOMMENDED) : |
344 message authentication is not used [V02]. Each specification for a
347 authentication codes define their own padding, so this default does
[all …]
/external/ipsec-tools/src/racoon/doc/
DREADME.plainrsa3 Before you begin, you should understand that the RSA authentication
19 RSA authentication. For the purpose of this document, we assume that
20 we are setting up RSA authentication between two networked hosts
64 each host to (a) turn on RSA authentication, and (b) designate each
70 directory you have just specified it will fail the authentication
87 5) You have finished configuring the host for RSA authentication.
102 3) You have specified the "rsasig" method for authentication in the
DFAQ54 Enable hybrid authentication, and ISAKMP mode config and
58 Enable the use of RADIUS with hybrid authentication on the
59 server side. RADIUS is used for authentication, configuration
62 Enable the use of PAM with hybrid authentication on the
63 server side. PAM can be used for authentication and accounting.
DREADME.gssapi1 The gss-api authentication mechanism implementation for racoon was
11 by login authentication daemons) in these situations is to add
12 a set of special credentials to be used. For example, authentication
42 * The racoon.conf file accepts "gssapi_krb" as authentication
93 With the Heimdal gss-api implementation, the gssapi_krb authentication
96 gss_accept_sec_context when mutual authentication is requested.
/external/ppp/pppd/plugins/radius/etc/
Dradiusclient.conf.in3 # specify which authentication comes first respectively which
4 # authentication is used. possible values are: "radius" and "local".
29 # RADIUS server to use for authentication requests. this config
63 # default authentication realm to append to all usernames if no
/external/wpa_supplicant_8/wpa_supplicant/
DREADME55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
56 Following authentication methods are supported with an integrate IEEE 802.1X
81 authentication)
90 * pre-authentication
182 machines. However, there can be used as inner authentication
216 protection, and non-keyed authentication does not protect against bit
224 keyed packet authentication mechanism (Michael MIC).
227 an external authentication server (e.g., RADIUS) and EAP just like
252 messages in initial key handshake, pre-authentication, and PMKSA caching).
261 negotiation with a WPA Authenticator and EAP authentication with
[all …]
/external/webkit/Source/WebKit/mac/Panels/
DWebAuthenticationPanel.m144 "prompt string in authentication panel"),
149 … "prompt string in authentication panel"), realm, host];
152 … "prompt string in authentication panel"), host];
157 "prompt string in authentication panel"),
162 … "prompt string in authentication panel"), realm, host];
165 … "prompt string in authentication panel"), host];
201 "message in authentication panel")];
207 "message in authentication panel")];
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_cli.sgml34 <para>wpa_cli can show the current authentication status, selected
39 authentication information, like username and password, if these
42 authentication where the authentication is based on a
62 <title>Interactive authentication parameters request</title>
64 <para>When wpa_supplicant need authentication parameters, like
73 authentication server.</para>
86 card -based authentication.</para>

12345