/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/ |
D | RecordingAuthenticator.java | 28 public final PasswordAuthentication authentication; field in RecordingAuthenticator 30 public RecordingAuthenticator(PasswordAuthentication authentication) { in RecordingAuthenticator() argument 31 this.authentication = authentication; in RecordingAuthenticator() 47 return authentication; in getPasswordAuthentication()
|
/external/grpc-grpc/doc/ |
D | server_side_auth.md | 4 …ibes how server-side authentication works in C-core based gRPC implementations only. In gRPC Java … 8 …authentication, gRPC exposes the *authentication context* for each call. The context exposes impor… 10 The authentication context is structured as a multi-map of key-value pairs - the *auth properties*.… 12 …perty key will act as the peer identity (e.g. for client certificate authentication this property … 14 … to authenticating RPCs. Using any other call/context properties for authentication purposes is wr… 18 For secure channel using mutual TLS authentication with both client and server certificates (test c… 49 - TLS/SSL certificate authentication (built into gRPC's security layer, automatically used whenever… 50 - (coming soon) JWT auth token authentication
|
/external/openscreen/osp/msgs/ |
D | osp_messages.cddl | 46 authentication-request = { 48 1: authentication-mechanism ; mechanism 54 authentication-response = { 56 1: authentication-response-result ; result 61 authentication-result = { 62 1: authentication-result-result ; result 65 authentication-mechanism = &( 69 authentication-response-result = &( 80 authentication-result-result = &(
|
/external/curl/docs/cmdline-opts/ |
D | ntlm.d | 2 Help: Use HTTP NTLM authentication 9 Enables NTLM authentication. The NTLM authentication method was designed by 13 everyone who uses NTLM to switch to a public and documented authentication 16 If you want to enable NTLM for your proxy authentication, then use
|
D | socks5-basic.d | 6 Tells curl to use username/password authentication when connecting to a SOCKS5 7 proxy. The username/password authentication is enabled by default. Use 8 --socks5-gssapi to force GSS-API authentication to SOCKS5 proxies.
|
D | proxy-basic.d | 2 Help: Use Basic authentication on the proxy 6 Tells curl to use HTTP Basic authentication when communicating with the given 8 default authentication method curl uses with proxies.
|
D | socks5-gssapi.d | 6 Tells curl to use GSS-API authentication when connecting to a SOCKS5 proxy. 7 The GSS-API authentication is enabled by default (if curl is compiled with 8 GSS-API support). Use --socks5-basic to force username/password authentication
|
D | sasl-authzid.d | 3 Help: Identity for SASL PLAIN authentication 7 Use this authorisation identity (authzid), during SASL PLAIN authentication, 8 in addition to the authentication identity (authcid) as specified by --user.
|
D | negotiate.d | 2 Help: Use HTTP Negotiate (SPNEGO) authentication 7 Enables Negotiate (SPNEGO) authentication. 13 the authentication code properly. Sending a '-u :' is enough as the user name
|
D | anyauth.d | 2 Help: Pick any authentication method 7 Tells curl to figure out authentication method by itself, and use the most 10 network round-trip. This is used instead of setting a specific authentication
|
D | sasl-ir.d | 2 Help: Enable initial response in SASL authentication 6 Enable initial response in SASL authentication.
|
D | version.d | 52 NTLM authentication is supported. 54 NTLM authentication is supported. 59 SPNEGO authentication is supported. 66 SRP (Secure Remote Password) authentication is supported for TLS.
|
/external/arm-trusted-firmware/docs/design/ |
D | auth-framework.rst | 4 The aim of this document is to describe the authentication framework 62 This document describes the inner details of the authentication framework and 74 A CoT is basically a sequence of authentication images which usually starts with 125 Images in a CoT are categorised as authentication and data images. An 126 authentication image contains information to authenticate a data image or 127 another authentication image. A data image is usually a boot loader binary, but 128 it could be any other data that requires authentication. 144 #. If the image is an authentication image, extract the information that will 153 These components are responsible for initiating the authentication process for a 154 particular image in BL1 or BL2. For each BL image that requires authentication, [all …]
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
D | README | 2 remote access using hybrid authentication. In this setup, the VPN 18 using authentication against the system password database, and using 22 authentication, IP allocation and accounting. The address and secret 27 is set up to use hybrid authentication (aka mutual group authentication, 60 Note that for now there is no feedback in racoonctl if the authentication 67 hybrid authentication, though this has not been tested.
|
/external/wpa_supplicant_8/hostapd/ |
D | hlr_auc_gw.txt | 4 database/authentication gateway interface to HLR/AuC. It could be 6 authentication center (HLR/AuC). hostapd will send SIM/AKA 7 authentication queries over a UNIX domain socket to and external 10 hlr_auc_gw can be configured with GSM and UMTS authentication data with 13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the 34 -g<triplet file> = path for GSM authentication triplets 79 authentication server for EAP-SIM/AKA/AKA':
|
D | README | 2 Authenticator and RADIUS authentication server 56 included in the kernel driver: using external RADIUS authentication 62 EAP server (i.e., allow full authentication without requiring 63 an external RADIUS authentication server), and RADIUS authentication 64 server for EAP authentication. 81 Any wired Ethernet driver for wired IEEE 802.1X authentication 104 minimal authentication mechanism for stations, whereas IEEE 802.1X 110 a station and it performs the authentication with the Authentication 149 will first perform IEEE 802.11 authentication. This is normally done 150 with open systems authentication, so there is no security. After [all …]
|
/external/autotest/server/cros/ap_configurators/ |
D | asus_qis_ap_configurator.py | 15 def _set_authentication(self, authentication, wait_for_xpath=None): argument 22 self.select_item_from_popup_by_xpath(authentication, auth, 135 def set_security_wep(self, key_value, authentication): argument 137 (key_value, authentication), 1, 1000) 140 def _set_security_wep(self, key_value, authentication): argument
|
D | asus_ap_configurator.py | 21 def _set_authentication(self, authentication, wait_for_xpath=None): argument 31 self.select_item_from_popup_by_xpath(authentication, auth, 213 def set_security_wep(self, key_value, authentication): argument 215 (key_value, authentication), 1, 1000) 218 def _set_security_wep(self, key_value, authentication): argument
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | eapol_test.sgml | 49 authentication client code from hostapd. In addition, it has 66 test suite for a RADIUS authentication server.</para> 75 <para>tries to complete EAP authentication based on the network 77 on the local host. A re-authentication is triggered to test fast 78 re-authentication. The configuration file uses the same format for 96 <listitem><para>IP address of the authentication server. The 110 <listitem><para>UDP port of the authentication server. The 117 <listitem><para>Shared secret with the authentication server. 184 <listitem><para>Save configuration after authentication.
|
/external/curl/tests/data/ |
D | test151 | 17 though it's a response code that triggers authentication, we're not using 18 authentication so we should still fail. 28 HTTP GET with an error code that might trick authentication
|
D | test152 | 18 though it's a response code that triggers authentication, we're not using 19 authentication so we should still fail. 29 HTTP GET with an error code that might trick authentication and --fail
|
/external/curl/docs/ |
D | FEATURES | 48 - authentication: Basic, Digest, NTLM (*9) and Negotiate (SPNEGO) (*3) 60 - proxy authentication 79 - authentication 134 - authentication with NTLMv1 137 - authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9), Kerberos 5 152 - authentication: Clear Text, APOP and SASL 153 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9), 167 - authentication: Clear Text and SASL 168 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9),
|
/external/python/cryptography/docs/hazmat/primitives/mac/ |
D | cmac.rst | 3 Cipher-based message authentication code (CMAC) 13 `Cipher-based message authentication codes`_ (or CMACs) are a tool for 14 calculating message authentication codes using a block cipher coupled with a 98 Finalize the current context and return the message authentication code 106 :return bytes: The message authentication code as bytes. 110 .. _`Cipher-based message authentication codes`: https://en.wikipedia.org/wiki/CMAC
|
/external/autotest/client/site_tests/network_VPNConnect/ |
D | control.openvpn_user_pass | 12 Tests that we can complete OpenVPN authentication with a server that 13 performs username/password authentication. This is a client-only test 21 This server performs username / password authentication.
|
/external/robolectric-shadows/robolectric/src/main/java/org/robolectric/internal/dependency/ |
D | MavenDependencyResolver.java | 53 Authentication authentication = new Authentication(); in getLocalArtifactUrls() local 54 authentication.setUserName(repositoryUserName); in getLocalArtifactUrls() 55 authentication.setPassword(repositoryPassword); in getLocalArtifactUrls() 56 remoteRepository.addAuthentication(authentication); in getLocalArtifactUrls()
|