/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
D | DeferredAuthentication.java | 20 package org.eclipse.jetty.security.authentication; 68 … Authentication authentication = _authenticator.validateRequest(request,__deferredResponse,true); in authenticate() local 70 …if (authentication!=null && (authentication instanceof Authentication.User) && !(authentication in… in authenticate() 76 …previousAssociation=identity_service.associate(((Authentication.User)authentication).getUserIdenti… in authenticate() 78 return authentication; in authenticate() 100 Authentication authentication = _authenticator.validateRequest(request,response,true); in authenticate() local 101 if (authentication instanceof Authentication.User && identity_service!=null) in authenticate() 102 …previousAssociation=identity_service.associate(((Authentication.User)authentication).getUserIdenti… in authenticate() 103 return authentication; in authenticate() 122 UserAuthentication authentication = new UserAuthentication("API",identity); in login() local [all …]
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/ |
D | RecordingAuthenticator.java | 28 public final PasswordAuthentication authentication; field in RecordingAuthenticator 30 public RecordingAuthenticator(PasswordAuthentication authentication) { in RecordingAuthenticator() argument 31 this.authentication = authentication; in RecordingAuthenticator() 47 return authentication; in getPasswordAuthentication()
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
D | SecurityHandler.java | 35 import org.eclipse.jetty.security.authentication.DeferredAuthentication; 490 Authentication authentication = baseRequest.getAuthentication(); in handle() local 491 if (authentication==null || authentication==Authentication.NOT_CHECKED) in handle() 492 …authentication=authenticator==null?Authentication.UNAUTHENTICATED:authenticator.validateRequest(re… in handle() 494 if (authentication instanceof Authentication.Wrapped) in handle() 496 request=((Authentication.Wrapped)authentication).getHttpServletRequest(); in handle() 497 response=((Authentication.Wrapped)authentication).getHttpServletResponse(); in handle() 500 if (authentication instanceof Authentication.ResponseSent) in handle() 504 else if (authentication instanceof Authentication.User) in handle() 506 Authentication.User userAuth = (Authentication.User)authentication; in handle() [all …]
|
D | DefaultAuthenticatorFactory.java | 24 import org.eclipse.jetty.security.authentication.BasicAuthenticator; 25 import org.eclipse.jetty.security.authentication.ClientCertAuthenticator; 26 import org.eclipse.jetty.security.authentication.DigestAuthenticator; 27 import org.eclipse.jetty.security.authentication.FormAuthenticator; 28 import org.eclipse.jetty.security.authentication.SpnegoAuthenticator;
|
/external/autotest/server/site_tests/buffet_PrivetInfo/ |
D | buffet_PrivetInfo.py | 59 authentication = info['authentication'] 60 _assert_not_empty(authentication, 'anonymousMaxScope') 61 _assert_equal(['p224_spake2'], authentication['crypto']) 62 _assert_equal(['anonymous', 'pairing'], authentication['mode']) 63 _assert_equal(['pinCode'], authentication['pairing'])
|
/external/openssh/ |
D | ssh-add.0 | 4 ssh-add M-bM-^@M-^S adds private key identities to the authentication agent 12 ssh-add adds private key identities to the authentication agent, 24 The authentication agent must be running and the SSH_AUTH_SOCK 31 before being used for authentication. Confirmation is performed 93 Contains the protocol version 1 RSA authentication identity of 97 Contains the protocol version 2 DSA authentication identity of 101 Contains the protocol version 2 ECDSA authentication identity of 105 Contains the protocol version 2 Ed25519 authentication identity 109 Contains the protocol version 2 RSA authentication identity of 117 ssh-add is unable to contact the authentication agent.
|
D | ssh-keysign.0 | 4 ssh-keysign M-bM-^@M-^S ssh helper program for host-based authentication 11 the digital signature required during host-based authentication with SSH 20 authentication. 34 host-based authentication is used.
|
D | sshd_config.0 | 91 Specifies the authentication methods that must be successfully 93 followed by one or more comma-separated lists of authentication 94 method names. Successful authentication requires completion of 99 complete public key authentication, followed by either password 100 or keyboard interactive authentication. Only methods that are 103 keyboard-interactive authentication before public key. 105 For keyboard interactive authentication it is also possible to 106 restrict authentication to a specific device by appending a colon 110 interactive authentication to the M-bM-^@M-^\bsdauthM-bM-^@M-^] device. 116 successful authentication using two different public keys. [all …]
|
D | sshd.0 | 19 The forked daemons handle key exchange, encryption, authentication, 120 beginning, authentication, and termination of each connection is 139 making DNS requests unless the authentication mechanism or 173 cryptographic message authentication code (hmac-md5, hmac-sha1, umac-64, 176 Finally, the server and the client enter an authentication dialog. The 177 client tries to authenticate itself using host-based authentication, 178 public key authentication, challenge-response authentication, or password 179 authentication. 181 Regardless of the authentication type, the account is checked to ensure 188 Linuxes). If there is a requirement to disable password authentication [all …]
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
D | README | 2 remote access using hybrid authentication. In this setup, the VPN 18 using authentication against the system password database, and using 22 authentication, IP allocation and accounting. The address and secret 27 is set up to use hybrid authentication (aka mutual group authentication, 60 Note that for now there is no feedback in racoonctl if the authentication 67 hybrid authentication, though this has not been tested.
|
/external/wpa_supplicant_8/hostapd/ |
D | hlr_auc_gw.txt | 4 database/authentication gateway interface to HLR/AuC. It could be 6 authentication center (HLR/AuC). hostapd will send SIM/AKA 7 authentication queries over a UNIX domain socket to and external 10 hlr_auc_gw can be configured with GSM and UMTS authentication data with 13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the 34 -g<triplet file> = path for GSM authentication triplets 79 authentication server for EAP-SIM/AKA/AKA':
|
D | README | 2 Authenticator and RADIUS authentication server 56 included in the kernel driver: using external RADIUS authentication 62 EAP server (i.e., allow full authentication without requiring 63 an external RADIUS authentication server), and RADIUS authentication 64 server for EAP authentication. 81 Any wired Ethernet driver for wired IEEE 802.1X authentication 105 minimal authentication mechanism for stations, whereas IEEE 802.1X 111 a station and it performs the authentication with the Authentication 150 will first perform IEEE 802.11 authentication. This is normally done 151 with open systems authentication, so there is no security. After [all …]
|
/external/autotest/server/cros/ap_configurators/ |
D | asus_qis_ap_configurator.py | 15 def _set_authentication(self, authentication, wait_for_xpath=None): argument 22 self.select_item_from_popup_by_xpath(authentication, auth, 135 def set_security_wep(self, key_value, authentication): argument 137 (key_value, authentication), 1, 1000) 140 def _set_security_wep(self, key_value, authentication): argument
|
D | asus_ap_configurator.py | 19 def _set_authentication(self, authentication, wait_for_xpath=None): argument 29 self.select_item_from_popup_by_xpath(authentication, auth, 211 def set_security_wep(self, key_value, authentication): argument 213 (key_value, authentication), 1, 1000) 216 def _set_security_wep(self, key_value, authentication): argument
|
D | netgear3700_ap_configurator.py | 94 def set_security_wep(self, key_value, authentication): argument 97 (key_value, authentication), 1, 1000) 100 def _set_security_wep(self, value, authentication): argument
|
D | trendnet432brp_ap_configurator.py | 123 def set_security_wep(self, key_value, authentication): argument 125 (key_value, authentication), 2, 900) 128 def _set_security_wep(self, key_value, authentication): argument
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | eapol_test.sgml | 45 authentication client code from hostapd. In addition, it has 62 test suite for a RADIUS authentication server.</para> 71 <para>tries to complete EAP authentication based on the network 73 on the local host. A re-authentication is triggered to test fast 74 re-authentication. The configuration file uses the same format for 92 <listitem><para>IP address of the authentication server. The 106 <listitem><para>UDP port of the authentication server. The 113 <listitem><para>Shared secret with the authentication server. 180 <listitem><para>Save configuration after authentication.
|
/external/curl/docs/ |
D | FEATURES | 48 - authentication: Basic, Digest, NTLM (*9) and Negotiate (SPNEGO) (*3) 60 - proxy authentication 79 - authentication 134 - authentication with NTLMv1 137 - authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9), Kerberos 5 152 - authentication: Clear Text, APOP and SASL 153 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9), 167 - authentication: Clear Text and SASL 168 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9),
|
/external/curl/tests/data/ |
D | test151 | 17 though it's a response code that triggers authentication, we're not using 18 authentication so we should still fail. 28 HTTP GET with an error code that might trick authentication
|
D | test152 | 18 though it's a response code that triggers authentication, we're not using 19 authentication so we should still fail. 29 HTTP GET with an error code that might trick authentication and --fail
|
/external/autotest/client/site_tests/network_VPNConnect/ |
D | control.openvpn_user_pass | 13 Tests that we can complete OpenVPN authentication with a server that 14 performs username/password authentication. This is a client-only test 22 This server performs username / password authentication.
|
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/ |
D | control.wifi_check1x_PEAP | 16 PEAP authentication with tunneled MSCHAPv2, MD5, and GTC. 26 # We do these tests for only one inner authentication protocol because 27 # we presume that supplicant reuses this code between inner authentication
|
D | control.wifi_check1x_TTLS | 16 TTLS authentication with several tunneled protocols. 26 # We do these tests for only one inner authentication protocol because 27 # we presume that supplicant reuses this code between inner authentication
|
/external/apache-harmony/support/src/test/resources/tests/resources/manifest/ |
D | hyts_MANIFEST.MF | 19 Export-Package: com.ibm.ive.eccomm.client.services.authentication; specification-version=1.0.0, 20 com.ibm.ive.eccomm.service.authentication; specification-version=1.0.0, 23 Export-Service: com.ibm.ive.eccomm.service.authentication.AuthenticationService,
|
/external/srtp/doc/ |
D | rfc3711.txt | 35 can provide confidentiality, message authentication, and replay 128 can provide confidentiality, message authentication, and replay 132 SRTP provides a framework for encryption and message authentication 143 encryption, a keyed-hash based function for message authentication, 179 authentication" and "authentication tag" as is common practice, even 182 authentication. 268 SRTP does to RTP. SRTCP message authentication is MANDATORY and 311 | : authentication tag (RECOMMENDED) : | 344 message authentication is not used [V02]. Each specification for a 347 authentication codes define their own padding, so this default does [all …]
|