Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 444) sorted by relevance

12345678910>>...18

/external/jetty/src/java/org/eclipse/jetty/security/authentication/
DDeferredAuthentication.java20 package org.eclipse.jetty.security.authentication;
68 … Authentication authentication = _authenticator.validateRequest(request,__deferredResponse,true); in authenticate() local
70 …if (authentication!=null && (authentication instanceof Authentication.User) && !(authentication in… in authenticate()
76 …previousAssociation=identity_service.associate(((Authentication.User)authentication).getUserIdenti… in authenticate()
78 return authentication; in authenticate()
100 Authentication authentication = _authenticator.validateRequest(request,response,true); in authenticate() local
101 if (authentication instanceof Authentication.User && identity_service!=null) in authenticate()
102 …previousAssociation=identity_service.associate(((Authentication.User)authentication).getUserIdenti… in authenticate()
103 return authentication; in authenticate()
122 UserAuthentication authentication = new UserAuthentication("API",identity); in login() local
[all …]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/
DRecordingAuthenticator.java28 public final PasswordAuthentication authentication; field in RecordingAuthenticator
30 public RecordingAuthenticator(PasswordAuthentication authentication) { in RecordingAuthenticator() argument
31 this.authentication = authentication; in RecordingAuthenticator()
47 return authentication; in getPasswordAuthentication()
/external/jetty/src/java/org/eclipse/jetty/security/
DSecurityHandler.java35 import org.eclipse.jetty.security.authentication.DeferredAuthentication;
490 Authentication authentication = baseRequest.getAuthentication(); in handle() local
491 if (authentication==null || authentication==Authentication.NOT_CHECKED) in handle()
492authentication=authenticator==null?Authentication.UNAUTHENTICATED:authenticator.validateRequest(re… in handle()
494 if (authentication instanceof Authentication.Wrapped) in handle()
496 request=((Authentication.Wrapped)authentication).getHttpServletRequest(); in handle()
497 response=((Authentication.Wrapped)authentication).getHttpServletResponse(); in handle()
500 if (authentication instanceof Authentication.ResponseSent) in handle()
504 else if (authentication instanceof Authentication.User) in handle()
506 Authentication.User userAuth = (Authentication.User)authentication; in handle()
[all …]
DDefaultAuthenticatorFactory.java24 import org.eclipse.jetty.security.authentication.BasicAuthenticator;
25 import org.eclipse.jetty.security.authentication.ClientCertAuthenticator;
26 import org.eclipse.jetty.security.authentication.DigestAuthenticator;
27 import org.eclipse.jetty.security.authentication.FormAuthenticator;
28 import org.eclipse.jetty.security.authentication.SpnegoAuthenticator;
/external/autotest/server/site_tests/buffet_PrivetInfo/
Dbuffet_PrivetInfo.py59 authentication = info['authentication']
60 _assert_not_empty(authentication, 'anonymousMaxScope')
61 _assert_equal(['p224_spake2'], authentication['crypto'])
62 _assert_equal(['anonymous', 'pairing'], authentication['mode'])
63 _assert_equal(['pinCode'], authentication['pairing'])
/external/openssh/
Dssh-add.04 ssh-add M-bM-^@M-^S adds private key identities to the authentication agent
12 ssh-add adds private key identities to the authentication agent,
24 The authentication agent must be running and the SSH_AUTH_SOCK
31 before being used for authentication. Confirmation is performed
93 Contains the protocol version 1 RSA authentication identity of
97 Contains the protocol version 2 DSA authentication identity of
101 Contains the protocol version 2 ECDSA authentication identity of
105 Contains the protocol version 2 Ed25519 authentication identity
109 Contains the protocol version 2 RSA authentication identity of
117 ssh-add is unable to contact the authentication agent.
Dssh-keysign.04 ssh-keysign M-bM-^@M-^S ssh helper program for host-based authentication
11 the digital signature required during host-based authentication with SSH
20 authentication.
34 host-based authentication is used.
Dsshd_config.091 Specifies the authentication methods that must be successfully
93 followed by one or more comma-separated lists of authentication
94 method names. Successful authentication requires completion of
99 complete public key authentication, followed by either password
100 or keyboard interactive authentication. Only methods that are
103 keyboard-interactive authentication before public key.
105 For keyboard interactive authentication it is also possible to
106 restrict authentication to a specific device by appending a colon
110 interactive authentication to the M-bM-^@M-^\bsdauthM-bM-^@M-^] device.
116 successful authentication using two different public keys.
[all …]
Dsshd.019 The forked daemons handle key exchange, encryption, authentication,
120 beginning, authentication, and termination of each connection is
139 making DNS requests unless the authentication mechanism or
173 cryptographic message authentication code (hmac-md5, hmac-sha1, umac-64,
176 Finally, the server and the client enter an authentication dialog. The
177 client tries to authenticate itself using host-based authentication,
178 public key authentication, challenge-response authentication, or password
179 authentication.
181 Regardless of the authentication type, the account is checked to ensure
188 Linuxes). If there is a requirement to disable password authentication
[all …]
/external/ipsec-tools/src/racoon/samples/roadwarrior/
DREADME2 remote access using hybrid authentication. In this setup, the VPN
18 using authentication against the system password database, and using
22 authentication, IP allocation and accounting. The address and secret
27 is set up to use hybrid authentication (aka mutual group authentication,
60 Note that for now there is no feedback in racoonctl if the authentication
67 hybrid authentication, though this has not been tested.
/external/wpa_supplicant_8/hostapd/
Dhlr_auc_gw.txt4 database/authentication gateway interface to HLR/AuC. It could be
6 authentication center (HLR/AuC). hostapd will send SIM/AKA
7 authentication queries over a UNIX domain socket to and external
10 hlr_auc_gw can be configured with GSM and UMTS authentication data with
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
34 -g<triplet file> = path for GSM authentication triplets
79 authentication server for EAP-SIM/AKA/AKA':
DREADME2 Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
81 Any wired Ethernet driver for wired IEEE 802.1X authentication
105 minimal authentication mechanism for stations, whereas IEEE 802.1X
111 a station and it performs the authentication with the Authentication
150 will first perform IEEE 802.11 authentication. This is normally done
151 with open systems authentication, so there is no security. After
[all …]
/external/autotest/server/cros/ap_configurators/
Dasus_qis_ap_configurator.py15 def _set_authentication(self, authentication, wait_for_xpath=None): argument
22 self.select_item_from_popup_by_xpath(authentication, auth,
135 def set_security_wep(self, key_value, authentication): argument
137 (key_value, authentication), 1, 1000)
140 def _set_security_wep(self, key_value, authentication): argument
Dasus_ap_configurator.py19 def _set_authentication(self, authentication, wait_for_xpath=None): argument
29 self.select_item_from_popup_by_xpath(authentication, auth,
211 def set_security_wep(self, key_value, authentication): argument
213 (key_value, authentication), 1, 1000)
216 def _set_security_wep(self, key_value, authentication): argument
Dnetgear3700_ap_configurator.py94 def set_security_wep(self, key_value, authentication): argument
97 (key_value, authentication), 1, 1000)
100 def _set_security_wep(self, value, authentication): argument
Dtrendnet432brp_ap_configurator.py123 def set_security_wep(self, key_value, authentication): argument
125 (key_value, authentication), 2, 900)
128 def _set_security_wep(self, key_value, authentication): argument
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Deapol_test.sgml45 authentication client code from hostapd. In addition, it has
62 test suite for a RADIUS authentication server.</para>
71 <para>tries to complete EAP authentication based on the network
73 on the local host. A re-authentication is triggered to test fast
74 re-authentication. The configuration file uses the same format for
92 <listitem><para>IP address of the authentication server. The
106 <listitem><para>UDP port of the authentication server. The
113 <listitem><para>Shared secret with the authentication server.
180 <listitem><para>Save configuration after authentication.
/external/curl/docs/
DFEATURES48 - authentication: Basic, Digest, NTLM (*9) and Negotiate (SPNEGO) (*3)
60 - proxy authentication
79 - authentication
134 - authentication with NTLMv1
137 - authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9), Kerberos 5
152 - authentication: Clear Text, APOP and SASL
153 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9),
167 - authentication: Clear Text and SASL
168 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9),
/external/curl/tests/data/
Dtest15117 though it's a response code that triggers authentication, we're not using
18 authentication so we should still fail.
28 HTTP GET with an error code that might trick authentication
Dtest15218 though it's a response code that triggers authentication, we're not using
19 authentication so we should still fail.
29 HTTP GET with an error code that might trick authentication and --fail
/external/autotest/client/site_tests/network_VPNConnect/
Dcontrol.openvpn_user_pass13 Tests that we can complete OpenVPN authentication with a server that
14 performs username/password authentication. This is a client-only test
22 This server performs username / password authentication.
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/
Dcontrol.wifi_check1x_PEAP16 PEAP authentication with tunneled MSCHAPv2, MD5, and GTC.
26 # We do these tests for only one inner authentication protocol because
27 # we presume that supplicant reuses this code between inner authentication
Dcontrol.wifi_check1x_TTLS16 TTLS authentication with several tunneled protocols.
26 # We do these tests for only one inner authentication protocol because
27 # we presume that supplicant reuses this code between inner authentication
/external/apache-harmony/support/src/test/resources/tests/resources/manifest/
Dhyts_MANIFEST.MF19 Export-Package: com.ibm.ive.eccomm.client.services.authentication; specification-version=1.0.0,
20 com.ibm.ive.eccomm.service.authentication; specification-version=1.0.0,
23 Export-Service: com.ibm.ive.eccomm.service.authentication.AuthenticationService,
/external/srtp/doc/
Drfc3711.txt35 can provide confidentiality, message authentication, and replay
128 can provide confidentiality, message authentication, and replay
132 SRTP provides a framework for encryption and message authentication
143 encryption, a keyed-hash based function for message authentication,
179 authentication" and "authentication tag" as is common practice, even
182 authentication.
268 SRTP does to RTP. SRTCP message authentication is MANDATORY and
311 | : authentication tag (RECOMMENDED) : |
344 message authentication is not used [V02]. Each specification for a
347 authentication codes define their own padding, so this default does
[all …]

12345678910>>...18