Lines Matching full:is
19 1. The client is configured at instantiation of the transport with a single
22 2. The server is configured with a mapping of underlying security mechanism
31 4. The server receives this message and, if the mechanism name provided is
32 among the set of mechanisms this server transport is configured to accept,
34 If the mechanism name is not one which the server is configured to support, the
38 place via this transport. If the mechanism name is one which the server
49 underlying security mechanism. A challenge is generated by the underlying
50 security mechanism on the server, and this is used as the payload for a message
66 If at any point in time either side is able to interpret the challenge or
67 response sent by the other, but is dissatisfied with the contents thereof, this
71 the protocol above the thrift transport by whatever mechanism is appropriate
78 be passed to the protocol above the thrift transport by whatever mechanism is
82 If step 8 completes successfully, then the communication is considered
93 If no SASL QOP (quality of protection) is negotiated during steps 6 and 7, then
97 If a SASL QOP is negotiated, then this must be used by the Thrift transport for
98 all subsequent communication. This is done by wrapping subsequent writes to the
101 of the write to the underlying transport is the length of the data after it has