/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/clients/ |
H A D | imap.py | 32 def authenticate(self, url, consumer, token): member in class:IMAP4_SSL 39 imaplib.IMAP4_SSL.authenticate(self, 'XOAUTH',
|
H A D | smtp.py | 33 def authenticate(self, url, consumer, token): member in class:SMTP
|
/external/apache-http/src/org/apache/http/auth/ |
H A D | AuthScheme.java | 137 Header authenticate(Credentials credentials, HttpRequest request) method in interface:AuthScheme
|
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | BasicScheme.java | 130 public Header authenticate( method in class:BasicScheme 142 return authenticate(credentials, charset, isProxy()); 154 public static Header authenticate( method in class:BasicScheme
|
H A D | NTLMScheme.java | 106 public Header authenticate( method in class:NTLMScheme
|
H A D | DigestScheme.java | 219 public Header authenticate( method in class:DigestScheme
|
/external/apache-http/src/org/apache/http/client/protocol/ |
H A D | RequestProxyAuthentication.java | 95 request.addHeader(authScheme.authenticate(creds, request));
|
H A D | RequestTargetAuthentication.java | 96 request.addHeader(authScheme.authenticate(creds, request));
|
/external/webkit/Tools/Scripts/webkitpy/common/net/bugzilla/ |
H A D | bugzilla.py | 110 self._bugzilla.authenticate() 351 self.authenticate() 361 # We need to authenticate to download patches from security bugs. 362 self.authenticate() 376 self.authenticate() 399 def authenticate(self): member in class:Bugzilla 489 self.authenticate() 515 self.authenticate() 569 self.authenticate() 627 self.authenticate() [all...] |
H A D | bugzilla_unittest.py | 295 bugzilla.authenticate = lambda: None 313 bugzilla.authenticate = lambda: None
|
/external/webkit/Tools/Scripts/webkitpy/tool/bot/ |
H A D | flakytestreporter.py | 58 self._tool.bugs.authenticate()
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/ |
H A D | __init__.py | 151 HOP_BY_HOP = ['connection', 'keep-alive', 'proxy-authenticate', 'proxy-authorization', 'te', 'trailers', 'transfer-encoding', 'upgrade'] 242 def _parse_www_authenticate(headers, headername='www-authenticate'): 247 authenticate = headers[headername].strip() 249 while authenticate: 252 (auth_scheme, the_rest) = ('digest', authenticate) 254 (auth_scheme, the_rest) = authenticate.split(" ", 1) 265 authenticate = the_rest.strip() 463 challenge = _parse_www_authenticate(response, 'www-authenticate') 501 challenge = _parse_www_authenticate(response, 'www-authenticate').get('digest', {}) 521 challenge = _parse_www_authenticate(response, 'www-authenticate') [all...] |
/external/chromium/net/tools/testserver/ |
H A D | chromiumsync.py | 754 response.authenticate.user.email = 'syncjuser@chromium' 755 response.authenticate.user.display_name = 'Sync J User'
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | driver_i.h | 60 if (wpa_s->driver->authenticate) 61 return wpa_s->driver->authenticate(wpa_s->drv_priv, params);
|
/external/apache-http/src/org/apache/http/impl/client/ |
H A D | DefaultRequestDirector.java | 727 connect.addHeader(authScheme.authenticate(creds, connect));
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver.h | 279 * Data for struct wpa_driver_ops::authenticate(). 1280 * authenticate - Request driver to authenticate 1291 int (*authenticate)(void *priv, member in struct:wpa_driver_ops 2370 * strength, in order to try to pre-authenticate first with candidates 2417 * event starts RSN authentication with the other STA to authenticate 2427 * authentication step (struct wpa_driver_ops::authenticate). 2846 /** Whether RSN IE includes pre-authenticate flag */
|
H A D | driver_nl80211.c | 6778 .authenticate = wpa_driver_nl80211_authenticate,
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver.h | 279 * Data for struct wpa_driver_ops::authenticate(). 1280 * authenticate - Request driver to authenticate 1291 int (*authenticate)(void *priv, member in struct:wpa_driver_ops 2370 * strength, in order to try to pre-authenticate first with candidates 2417 * event starts RSN authentication with the other STA to authenticate 2427 * authentication step (struct wpa_driver_ops::authenticate). 2846 /** Whether RSN IE includes pre-authenticate flag */
|
H A D | driver_nl80211.c | 6778 .authenticate = wpa_driver_nl80211_authenticate,
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver.h | 279 * Data for struct wpa_driver_ops::authenticate(). 1280 * authenticate - Request driver to authenticate 1291 int (*authenticate)(void *priv, member in struct:wpa_driver_ops 2370 * strength, in order to try to pre-authenticate first with candidates 2417 * event starts RSN authentication with the other STA to authenticate 2427 * authentication step (struct wpa_driver_ops::authenticate). 2846 /** Whether RSN IE includes pre-authenticate flag */
|
H A D | driver_nl80211.c | 6778 .authenticate = wpa_driver_nl80211_authenticate,
|
/external/dropbear/libtomcrypt/ |
H A D | crypt.tex | 1349 This mode has no \textit{Associated Data} like EAX mode does which means you cannot authenticate metadata along with the stream. 1439 CCM is a NIST proposal for encrypt + authenticate that is centered around using AES (or any 16--byte cipher) as a primitive. Unlike EAX and OCB mode, 2093 to use to authenticate the message. The \textit{key} parameter is the pointer to the array of chars that make up the key. The \textit{keylen} parameter is the 2094 length (in octets) of the key you want to use to authenticate the message. To send octets of a message through the HMAC system you must use the following function: 2215 wish to use. The \textit{key} and \textit{keylen} parameters are the keys used to authenticate the data.
|