Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 413) sorted by relevance

12345678910>>...17

/external/jetty/src/java/org/eclipse/jetty/security/authentication/
DDeferredAuthentication.java20 package org.eclipse.jetty.security.authentication;
68 … Authentication authentication = _authenticator.validateRequest(request,__deferredResponse,true); in authenticate() local
70 …if (authentication!=null && (authentication instanceof Authentication.User) && !(authentication in… in authenticate()
76 …previousAssociation=identity_service.associate(((Authentication.User)authentication).getUserIdenti… in authenticate()
78 return authentication; in authenticate()
100 Authentication authentication = _authenticator.validateRequest(request,response,true); in authenticate() local
101 if (authentication instanceof Authentication.User && identity_service!=null) in authenticate()
102 …previousAssociation=identity_service.associate(((Authentication.User)authentication).getUserIdenti… in authenticate()
103 return authentication; in authenticate()
122 UserAuthentication authentication = new UserAuthentication("API",identity); in login() local
[all …]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/
DRecordingAuthenticator.java28 public final PasswordAuthentication authentication; field in RecordingAuthenticator
30 public RecordingAuthenticator(PasswordAuthentication authentication) { in RecordingAuthenticator() argument
31 this.authentication = authentication; in RecordingAuthenticator()
47 return authentication; in getPasswordAuthentication()
/external/jetty/src/java/org/eclipse/jetty/security/
DSecurityHandler.java35 import org.eclipse.jetty.security.authentication.DeferredAuthentication;
490 Authentication authentication = baseRequest.getAuthentication(); in handle() local
491 if (authentication==null || authentication==Authentication.NOT_CHECKED) in handle()
492authentication=authenticator==null?Authentication.UNAUTHENTICATED:authenticator.validateRequest(re… in handle()
494 if (authentication instanceof Authentication.Wrapped) in handle()
496 request=((Authentication.Wrapped)authentication).getHttpServletRequest(); in handle()
497 response=((Authentication.Wrapped)authentication).getHttpServletResponse(); in handle()
500 if (authentication instanceof Authentication.ResponseSent) in handle()
504 else if (authentication instanceof Authentication.User) in handle()
506 Authentication.User userAuth = (Authentication.User)authentication; in handle()
[all …]
DDefaultAuthenticatorFactory.java24 import org.eclipse.jetty.security.authentication.BasicAuthenticator;
25 import org.eclipse.jetty.security.authentication.ClientCertAuthenticator;
26 import org.eclipse.jetty.security.authentication.DigestAuthenticator;
27 import org.eclipse.jetty.security.authentication.FormAuthenticator;
28 import org.eclipse.jetty.security.authentication.SpnegoAuthenticator;
/external/autotest/server/site_tests/buffet_PrivetInfo/
Dbuffet_PrivetInfo.py59 authentication = info['authentication']
60 _assert_not_empty(authentication, 'anonymousMaxScope')
61 _assert_equal(['p224_spake2'], authentication['crypto'])
62 _assert_equal(['anonymous', 'pairing'], authentication['mode'])
63 _assert_equal(['pinCode'], authentication['pairing'])
/external/ipsec-tools/src/racoon/samples/roadwarrior/
DREADME2 remote access using hybrid authentication. In this setup, the VPN
18 using authentication against the system password database, and using
22 authentication, IP allocation and accounting. The address and secret
27 is set up to use hybrid authentication (aka mutual group authentication,
60 Note that for now there is no feedback in racoonctl if the authentication
67 hybrid authentication, though this has not been tested.
/external/wpa_supplicant_8/hostapd/
Dhlr_auc_gw.txt4 database/authentication gateway interface to HLR/AuC. It could be
6 authentication center (HLR/AuC). hostapd will send SIM/AKA
7 authentication queries over a UNIX domain socket to and external
10 hlr_auc_gw can be configured with GSM and UMTS authentication data with
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
34 -g<triplet file> = path for GSM authentication triplets
79 authentication server for EAP-SIM/AKA/AKA':
DREADME2 Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
81 Any wired Ethernet driver for wired IEEE 802.1X authentication
105 minimal authentication mechanism for stations, whereas IEEE 802.1X
111 a station and it performs the authentication with the Authentication
150 will first perform IEEE 802.11 authentication. This is normally done
151 with open systems authentication, so there is no security. After
[all …]
/external/autotest/server/cros/ap_configurators/
Dasus_qis_ap_configurator.py15 def _set_authentication(self, authentication, wait_for_xpath=None): argument
22 self.select_item_from_popup_by_xpath(authentication, auth,
135 def set_security_wep(self, key_value, authentication): argument
137 (key_value, authentication), 1, 1000)
140 def _set_security_wep(self, key_value, authentication): argument
Dasus_ap_configurator.py19 def _set_authentication(self, authentication, wait_for_xpath=None): argument
29 self.select_item_from_popup_by_xpath(authentication, auth,
211 def set_security_wep(self, key_value, authentication): argument
213 (key_value, authentication), 1, 1000)
216 def _set_security_wep(self, key_value, authentication): argument
Dnetgear3700_ap_configurator.py94 def set_security_wep(self, key_value, authentication): argument
97 (key_value, authentication), 1, 1000)
100 def _set_security_wep(self, value, authentication): argument
Dlinksys_ap_configurator.py149 def set_security_wep(self, key_value, authentication): argument
151 (key_value, authentication), 2, 1000)
154 def _set_security_wep(self, key_value, authentication): argument
156 '%s', self.name, authentication)
DbelkinF9K1001_ap_configurator.py118 def set_security_wep(self, key_value, authentication): argument
120 (key_value, authentication), 2, 1000)
123 def _set_security_wep(self, key_value, authentication): argument
DbelkinWRTR_ap_configurator.py113 def set_security_wep(self, key_value, authentication): argument
115 (key_value, authentication), 2, 1000)
118 def _set_security_wep(self, key_value, authentication): argument
Dtrendnet432brp_ap_configurator.py123 def set_security_wep(self, key_value, authentication): argument
125 (key_value, authentication), 2, 900)
128 def _set_security_wep(self, key_value, authentication): argument
Dtrendnet654tr_ap_configurator.py132 def set_security_wep(self, key_value, authentication): argument
134 (key_value, authentication), 1, 100)
137 def _set_security_wep(self, key_value, authentication): argument
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Deapol_test.sgml45 authentication client code from hostapd. In addition, it has
62 test suite for a RADIUS authentication server.</para>
71 <para>tries to complete EAP authentication based on the network
73 on the local host. A re-authentication is triggered to test fast
74 re-authentication. The configuration file uses the same format for
92 <listitem><para>IP address of the authentication server. The
106 <listitem><para>UDP port of the authentication server. The
113 <listitem><para>Shared secret with the authentication server.
180 <listitem><para>Save configuration after authentication.
/external/curl/docs/
DFEATURES48 - authentication: Basic, Digest, NTLM (*9) and Negotiate (SPNEGO) (*3)
60 - proxy authentication
79 - authentication
134 - authentication with NTLMv1
137 - authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9), Kerberos 5
152 - authentication: Clear Text, APOP and SASL
153 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9),
167 - authentication: Clear Text and SASL
168 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9),
/external/curl/tests/data/
Dtest15117 though it's a response code that triggers authentication, we're not using
18 authentication so we should still fail.
28 HTTP GET with an error code that might trick authentication
Dtest15218 though it's a response code that triggers authentication, we're not using
19 authentication so we should still fail.
29 HTTP GET with an error code that might trick authentication and --fail
/external/autotest/client/site_tests/network_VPNConnect/
Dcontrol.openvpn_user_pass13 Tests that we can complete OpenVPN authentication with a server that
14 performs username/password authentication. This is a client-only test
22 This server performs username / password authentication.
/external/srtp/doc/
Drfc3711.txt35 can provide confidentiality, message authentication, and replay
128 can provide confidentiality, message authentication, and replay
132 SRTP provides a framework for encryption and message authentication
143 encryption, a keyed-hash based function for message authentication,
179 authentication" and "authentication tag" as is common practice, even
182 authentication.
268 SRTP does to RTP. SRTCP message authentication is MANDATORY and
311 | : authentication tag (RECOMMENDED) : |
344 message authentication is not used [V02]. Each specification for a
347 authentication codes define their own padding, so this default does
[all …]
/external/apache-harmony/support/src/test/resources/tests/resources/manifest/
Dhyts_MANIFEST.MF19 Export-Package: com.ibm.ive.eccomm.client.services.authentication; specification-version=1.0.0,
20 com.ibm.ive.eccomm.service.authentication; specification-version=1.0.0,
23 Export-Service: com.ibm.ive.eccomm.service.authentication.AuthenticationService,
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/
Dcontrol.wifi_check1x_PEAP16 PEAP authentication with tunneled MSCHAPv2, MD5, and GTC.
26 # We do these tests for only one inner authentication protocol because
27 # we presume that supplicant reuses this code between inner authentication
Dcontrol.wifi_check1x_TTLS16 TTLS authentication with several tunneled protocols.
26 # We do these tests for only one inner authentication protocol because
27 # we presume that supplicant reuses this code between inner authentication

12345678910>>...17