Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 571) sorted by relevance

12345678910>>...23

/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/
DRecordingAuthenticator.java28 public final PasswordAuthentication authentication; field in RecordingAuthenticator
30 public RecordingAuthenticator(PasswordAuthentication authentication) { in RecordingAuthenticator() argument
31 this.authentication = authentication; in RecordingAuthenticator()
47 return authentication; in getPasswordAuthentication()
/external/grpc-grpc/doc/
Dserver_side_auth.md4 …ibes how server-side authentication works in C-core based gRPC implementations only. In gRPC Java …
8authentication, gRPC exposes the *authentication context* for each call. The context exposes impor…
10 The authentication context is structured as a multi-map of key-value pairs - the *auth properties*.…
12 …perty key will act as the peer identity (e.g. for client certificate authentication this property …
14 … to authenticating RPCs. Using any other call/context properties for authentication purposes is wr…
18 For secure channel using mutual TLS authentication with both client and server certificates (test c…
49 - TLS/SSL certificate authentication (built into gRPC's security layer, automatically used whenever…
50 - (coming soon) JWT auth token authentication
/external/openscreen/osp/msgs/
Dosp_messages.cddl46 authentication-request = {
48 1: authentication-mechanism ; mechanism
54 authentication-response = {
56 1: authentication-response-result ; result
61 authentication-result = {
62 1: authentication-result-result ; result
65 authentication-mechanism = &(
69 authentication-response-result = &(
80 authentication-result-result = &(
/external/curl/docs/cmdline-opts/
Dntlm.d2 Help: Use HTTP NTLM authentication
9 Enables NTLM authentication. The NTLM authentication method was designed by
13 everyone who uses NTLM to switch to a public and documented authentication
16 If you want to enable NTLM for your proxy authentication, then use
Dsocks5-basic.d6 Tells curl to use username/password authentication when connecting to a SOCKS5
7 proxy. The username/password authentication is enabled by default. Use
8 --socks5-gssapi to force GSS-API authentication to SOCKS5 proxies.
Dproxy-basic.d2 Help: Use Basic authentication on the proxy
6 Tells curl to use HTTP Basic authentication when communicating with the given
8 default authentication method curl uses with proxies.
Dsocks5-gssapi.d6 Tells curl to use GSS-API authentication when connecting to a SOCKS5 proxy.
7 The GSS-API authentication is enabled by default (if curl is compiled with
8 GSS-API support). Use --socks5-basic to force username/password authentication
Dsasl-authzid.d3 Help: Identity for SASL PLAIN authentication
7 Use this authorisation identity (authzid), during SASL PLAIN authentication,
8 in addition to the authentication identity (authcid) as specified by --user.
Dnegotiate.d2 Help: Use HTTP Negotiate (SPNEGO) authentication
7 Enables Negotiate (SPNEGO) authentication.
13 the authentication code properly. Sending a '-u :' is enough as the user name
Danyauth.d2 Help: Pick any authentication method
7 Tells curl to figure out authentication method by itself, and use the most
10 network round-trip. This is used instead of setting a specific authentication
Dsasl-ir.d2 Help: Enable initial response in SASL authentication
6 Enable initial response in SASL authentication.
Dversion.d52 NTLM authentication is supported.
54 NTLM authentication is supported.
59 SPNEGO authentication is supported.
66 SRP (Secure Remote Password) authentication is supported for TLS.
/external/arm-trusted-firmware/docs/design/
Dauth-framework.rst4 The aim of this document is to describe the authentication framework
62 This document describes the inner details of the authentication framework and
74 A CoT is basically a sequence of authentication images which usually starts with
125 Images in a CoT are categorised as authentication and data images. An
126 authentication image contains information to authenticate a data image or
127 another authentication image. A data image is usually a boot loader binary, but
128 it could be any other data that requires authentication.
144 #. If the image is an authentication image, extract the information that will
153 These components are responsible for initiating the authentication process for a
154 particular image in BL1 or BL2. For each BL image that requires authentication,
[all …]
/external/ipsec-tools/src/racoon/samples/roadwarrior/
DREADME2 remote access using hybrid authentication. In this setup, the VPN
18 using authentication against the system password database, and using
22 authentication, IP allocation and accounting. The address and secret
27 is set up to use hybrid authentication (aka mutual group authentication,
60 Note that for now there is no feedback in racoonctl if the authentication
67 hybrid authentication, though this has not been tested.
/external/wpa_supplicant_8/hostapd/
Dhlr_auc_gw.txt4 database/authentication gateway interface to HLR/AuC. It could be
6 authentication center (HLR/AuC). hostapd will send SIM/AKA
7 authentication queries over a UNIX domain socket to and external
10 hlr_auc_gw can be configured with GSM and UMTS authentication data with
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
34 -g<triplet file> = path for GSM authentication triplets
79 authentication server for EAP-SIM/AKA/AKA':
DREADME2 Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
81 Any wired Ethernet driver for wired IEEE 802.1X authentication
104 minimal authentication mechanism for stations, whereas IEEE 802.1X
110 a station and it performs the authentication with the Authentication
149 will first perform IEEE 802.11 authentication. This is normally done
150 with open systems authentication, so there is no security. After
[all …]
/external/autotest/server/cros/ap_configurators/
Dasus_qis_ap_configurator.py15 def _set_authentication(self, authentication, wait_for_xpath=None): argument
22 self.select_item_from_popup_by_xpath(authentication, auth,
135 def set_security_wep(self, key_value, authentication): argument
137 (key_value, authentication), 1, 1000)
140 def _set_security_wep(self, key_value, authentication): argument
Dasus_ap_configurator.py21 def _set_authentication(self, authentication, wait_for_xpath=None): argument
31 self.select_item_from_popup_by_xpath(authentication, auth,
213 def set_security_wep(self, key_value, authentication): argument
215 (key_value, authentication), 1, 1000)
218 def _set_security_wep(self, key_value, authentication): argument
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Deapol_test.sgml49 authentication client code from hostapd. In addition, it has
66 test suite for a RADIUS authentication server.</para>
75 <para>tries to complete EAP authentication based on the network
77 on the local host. A re-authentication is triggered to test fast
78 re-authentication. The configuration file uses the same format for
96 <listitem><para>IP address of the authentication server. The
110 <listitem><para>UDP port of the authentication server. The
117 <listitem><para>Shared secret with the authentication server.
184 <listitem><para>Save configuration after authentication.
/external/curl/tests/data/
Dtest15117 though it's a response code that triggers authentication, we're not using
18 authentication so we should still fail.
28 HTTP GET with an error code that might trick authentication
Dtest15218 though it's a response code that triggers authentication, we're not using
19 authentication so we should still fail.
29 HTTP GET with an error code that might trick authentication and --fail
/external/curl/docs/
DFEATURES48 - authentication: Basic, Digest, NTLM (*9) and Negotiate (SPNEGO) (*3)
60 - proxy authentication
79 - authentication
134 - authentication with NTLMv1
137 - authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9), Kerberos 5
152 - authentication: Clear Text, APOP and SASL
153 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9),
167 - authentication: Clear Text and SASL
168 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9),
/external/python/cryptography/docs/hazmat/primitives/mac/
Dcmac.rst3 Cipher-based message authentication code (CMAC)
13 `Cipher-based message authentication codes`_ (or CMACs) are a tool for
14 calculating message authentication codes using a block cipher coupled with a
98 Finalize the current context and return the message authentication code
106 :return bytes: The message authentication code as bytes.
110 .. _`Cipher-based message authentication codes`: https://en.wikipedia.org/wiki/CMAC
/external/autotest/client/site_tests/network_VPNConnect/
Dcontrol.openvpn_user_pass12 Tests that we can complete OpenVPN authentication with a server that
13 performs username/password authentication. This is a client-only test
21 This server performs username / password authentication.
/external/robolectric-shadows/robolectric/src/main/java/org/robolectric/internal/dependency/
DMavenDependencyResolver.java53 Authentication authentication = new Authentication(); in getLocalArtifactUrls() local
54 authentication.setUserName(repositoryUserName); in getLocalArtifactUrls()
55 authentication.setPassword(repositoryPassword); in getLocalArtifactUrls()
56 remoteRepository.addAuthentication(authentication); in getLocalArtifactUrls()

12345678910>>...23