/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
D | DeferredAuthentication.java | 20 package org.eclipse.jetty.security.authentication; 68 … Authentication authentication = _authenticator.validateRequest(request,__deferredResponse,true); in authenticate() local 70 …if (authentication!=null && (authentication instanceof Authentication.User) && !(authentication in… in authenticate() 76 …previousAssociation=identity_service.associate(((Authentication.User)authentication).getUserIdenti… in authenticate() 78 return authentication; in authenticate() 100 Authentication authentication = _authenticator.validateRequest(request,response,true); in authenticate() local 101 if (authentication instanceof Authentication.User && identity_service!=null) in authenticate() 102 …previousAssociation=identity_service.associate(((Authentication.User)authentication).getUserIdenti… in authenticate() 103 return authentication; in authenticate() 122 UserAuthentication authentication = new UserAuthentication("API",identity); in login() local [all …]
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/ |
D | RecordingAuthenticator.java | 28 public final PasswordAuthentication authentication; field in RecordingAuthenticator 30 public RecordingAuthenticator(PasswordAuthentication authentication) { in RecordingAuthenticator() argument 31 this.authentication = authentication; in RecordingAuthenticator() 47 return authentication; in getPasswordAuthentication()
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
D | SecurityHandler.java | 35 import org.eclipse.jetty.security.authentication.DeferredAuthentication; 490 Authentication authentication = baseRequest.getAuthentication(); in handle() local 491 if (authentication==null || authentication==Authentication.NOT_CHECKED) in handle() 492 …authentication=authenticator==null?Authentication.UNAUTHENTICATED:authenticator.validateRequest(re… in handle() 494 if (authentication instanceof Authentication.Wrapped) in handle() 496 request=((Authentication.Wrapped)authentication).getHttpServletRequest(); in handle() 497 response=((Authentication.Wrapped)authentication).getHttpServletResponse(); in handle() 500 if (authentication instanceof Authentication.ResponseSent) in handle() 504 else if (authentication instanceof Authentication.User) in handle() 506 Authentication.User userAuth = (Authentication.User)authentication; in handle() [all …]
|
D | DefaultAuthenticatorFactory.java | 24 import org.eclipse.jetty.security.authentication.BasicAuthenticator; 25 import org.eclipse.jetty.security.authentication.ClientCertAuthenticator; 26 import org.eclipse.jetty.security.authentication.DigestAuthenticator; 27 import org.eclipse.jetty.security.authentication.FormAuthenticator; 28 import org.eclipse.jetty.security.authentication.SpnegoAuthenticator;
|
/external/autotest/server/site_tests/buffet_PrivetInfo/ |
D | buffet_PrivetInfo.py | 59 authentication = info['authentication'] 60 _assert_not_empty(authentication, 'anonymousMaxScope') 61 _assert_equal(['p224_spake2'], authentication['crypto']) 62 _assert_equal(['anonymous', 'pairing'], authentication['mode']) 63 _assert_equal(['pinCode'], authentication['pairing'])
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
D | README | 2 remote access using hybrid authentication. In this setup, the VPN 18 using authentication against the system password database, and using 22 authentication, IP allocation and accounting. The address and secret 27 is set up to use hybrid authentication (aka mutual group authentication, 60 Note that for now there is no feedback in racoonctl if the authentication 67 hybrid authentication, though this has not been tested.
|
/external/wpa_supplicant_8/hostapd/ |
D | hlr_auc_gw.txt | 4 database/authentication gateway interface to HLR/AuC. It could be 6 authentication center (HLR/AuC). hostapd will send SIM/AKA 7 authentication queries over a UNIX domain socket to and external 10 hlr_auc_gw can be configured with GSM and UMTS authentication data with 13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the 34 -g<triplet file> = path for GSM authentication triplets 79 authentication server for EAP-SIM/AKA/AKA':
|
D | README | 2 Authenticator and RADIUS authentication server 56 included in the kernel driver: using external RADIUS authentication 62 EAP server (i.e., allow full authentication without requiring 63 an external RADIUS authentication server), and RADIUS authentication 64 server for EAP authentication. 81 Any wired Ethernet driver for wired IEEE 802.1X authentication 105 minimal authentication mechanism for stations, whereas IEEE 802.1X 111 a station and it performs the authentication with the Authentication 150 will first perform IEEE 802.11 authentication. This is normally done 151 with open systems authentication, so there is no security. After [all …]
|
/external/autotest/server/cros/ap_configurators/ |
D | asus_qis_ap_configurator.py | 15 def _set_authentication(self, authentication, wait_for_xpath=None): argument 22 self.select_item_from_popup_by_xpath(authentication, auth, 135 def set_security_wep(self, key_value, authentication): argument 137 (key_value, authentication), 1, 1000) 140 def _set_security_wep(self, key_value, authentication): argument
|
D | asus_ap_configurator.py | 19 def _set_authentication(self, authentication, wait_for_xpath=None): argument 29 self.select_item_from_popup_by_xpath(authentication, auth, 211 def set_security_wep(self, key_value, authentication): argument 213 (key_value, authentication), 1, 1000) 216 def _set_security_wep(self, key_value, authentication): argument
|
D | netgear3700_ap_configurator.py | 94 def set_security_wep(self, key_value, authentication): argument 97 (key_value, authentication), 1, 1000) 100 def _set_security_wep(self, value, authentication): argument
|
D | linksys_ap_configurator.py | 149 def set_security_wep(self, key_value, authentication): argument 151 (key_value, authentication), 2, 1000) 154 def _set_security_wep(self, key_value, authentication): argument 156 '%s', self.name, authentication)
|
D | belkinF9K1001_ap_configurator.py | 118 def set_security_wep(self, key_value, authentication): argument 120 (key_value, authentication), 2, 1000) 123 def _set_security_wep(self, key_value, authentication): argument
|
D | belkinWRTR_ap_configurator.py | 113 def set_security_wep(self, key_value, authentication): argument 115 (key_value, authentication), 2, 1000) 118 def _set_security_wep(self, key_value, authentication): argument
|
D | trendnet432brp_ap_configurator.py | 123 def set_security_wep(self, key_value, authentication): argument 125 (key_value, authentication), 2, 900) 128 def _set_security_wep(self, key_value, authentication): argument
|
D | trendnet654tr_ap_configurator.py | 132 def set_security_wep(self, key_value, authentication): argument 134 (key_value, authentication), 1, 100) 137 def _set_security_wep(self, key_value, authentication): argument
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | eapol_test.sgml | 45 authentication client code from hostapd. In addition, it has 62 test suite for a RADIUS authentication server.</para> 71 <para>tries to complete EAP authentication based on the network 73 on the local host. A re-authentication is triggered to test fast 74 re-authentication. The configuration file uses the same format for 92 <listitem><para>IP address of the authentication server. The 106 <listitem><para>UDP port of the authentication server. The 113 <listitem><para>Shared secret with the authentication server. 180 <listitem><para>Save configuration after authentication.
|
/external/curl/docs/ |
D | FEATURES | 48 - authentication: Basic, Digest, NTLM (*9) and Negotiate (SPNEGO) (*3) 60 - proxy authentication 79 - authentication 134 - authentication with NTLMv1 137 - authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9), Kerberos 5 152 - authentication: Clear Text, APOP and SASL 153 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9), 167 - authentication: Clear Text and SASL 168 - SASL based authentication: Plain, Login, CRAM-MD5, Digest-MD5, NTLM (*9),
|
/external/curl/tests/data/ |
D | test151 | 17 though it's a response code that triggers authentication, we're not using 18 authentication so we should still fail. 28 HTTP GET with an error code that might trick authentication
|
D | test152 | 18 though it's a response code that triggers authentication, we're not using 19 authentication so we should still fail. 29 HTTP GET with an error code that might trick authentication and --fail
|
/external/autotest/client/site_tests/network_VPNConnect/ |
D | control.openvpn_user_pass | 13 Tests that we can complete OpenVPN authentication with a server that 14 performs username/password authentication. This is a client-only test 22 This server performs username / password authentication.
|
/external/srtp/doc/ |
D | rfc3711.txt | 35 can provide confidentiality, message authentication, and replay 128 can provide confidentiality, message authentication, and replay 132 SRTP provides a framework for encryption and message authentication 143 encryption, a keyed-hash based function for message authentication, 179 authentication" and "authentication tag" as is common practice, even 182 authentication. 268 SRTP does to RTP. SRTCP message authentication is MANDATORY and 311 | : authentication tag (RECOMMENDED) : | 344 message authentication is not used [V02]. Each specification for a 347 authentication codes define their own padding, so this default does [all …]
|
/external/apache-harmony/support/src/test/resources/tests/resources/manifest/ |
D | hyts_MANIFEST.MF | 19 Export-Package: com.ibm.ive.eccomm.client.services.authentication; specification-version=1.0.0, 20 com.ibm.ive.eccomm.service.authentication; specification-version=1.0.0, 23 Export-Service: com.ibm.ive.eccomm.service.authentication.AuthenticationService,
|
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/ |
D | control.wifi_check1x_PEAP | 16 PEAP authentication with tunneled MSCHAPv2, MD5, and GTC. 26 # We do these tests for only one inner authentication protocol because 27 # we presume that supplicant reuses this code between inner authentication
|
D | control.wifi_check1x_TTLS | 16 TTLS authentication with several tunneled protocols. 26 # We do these tests for only one inner authentication protocol because 27 # we presume that supplicant reuses this code between inner authentication
|