/external/dropbear/ |
svr-service.c | 31 #include "auth.h" 60 dropbear_exit("request for connection before auth");
|
svr-session.c | 40 #include "auth.h" 138 "exit after auth (%s): %s", 143 "exit before auth (user '%s', %d fails): %s", 148 "exit before auth: %s", format);
|
/external/ppp/pppd/plugins/radius/etc/ |
dictionary | 112 ATTRIBUTE Auth-Type 1000 integer 218 VALUE Auth-Type Local 0 219 VALUE Auth-Type System 1 220 VALUE Auth-Type SecurID 2 221 VALUE Auth-Type Crypt-Local 3 222 VALUE Auth-Type Reject 4 227 VALUE Auth-Type Pam 253 228 VALUE Auth-Type None 254
|
dictionary.ascend | 95 ATTRIBUTE Ascend-Require-Auth 201 integer 125 ATTRIBUTE Ascend-Send-Auth 231 integer 193 VALUE Ascend-Send-Auth Send-Auth-None 0 194 VALUE Ascend-Send-Auth Send-Auth-PAP 1 195 VALUE Ascend-Send-Auth Send-Auth-CHAP 2 196 VALUE Ascend-Send-Auth Send-Auth-MS-CHAP [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
eap_testing.txt | 103 EAP-FAST/GTC(auth) - - - + - + - - - + + + 110 EAP-FAST/MSCHAPv2(auth) - - - - - + - - - - + + 111 EAP-FAST/MD5(auth) - - - - - + - - - - + - 112 EAP-FAST/TLS(auth) - - - - - - - - - - + + 113 EAP-FAST/SIM(auth) - - - - - - - - - - + - 114 EAP-FAST/AKA(auth) - - - - - - - - - - + - 123 2) used FreeRADIUS as inner auth server 176 - EAP-TTLS / CHAP (using FreeRADIUS as inner auth srv) 180 - EAP-TTLS / EAP-MD5-Challenge (using FreeRADIUS as inner auth srv) 181 - EAP-TTLS / EAP-GTC (using FreeRADIUS as inner auth srv [all...] |
/cts/tests/res/xml/ |
intentfilter.xml | 24 <auth host="testHost" port="80"/>
|
/dalvik/libcore/auth/src/main/java/javax/security/auth/ |
DestroyFailedException.java | 18 package javax.security.auth;
|
Destroyable.java | 18 package javax.security.auth;
|
/dalvik/libcore/auth/src/main/java/javax/security/auth/login/ |
LoginException.java | 18 package javax.security.auth.login;
|
/external/apache-http/src/org/apache/http/impl/client/ |
AbstractAuthenticationHandler.java | 45 import org.apache.http.auth.AuthScheme; 46 import org.apache.http.auth.AuthSchemeRegistry; 47 import org.apache.http.auth.AuthenticationException; 48 import org.apache.http.auth.MalformedChallengeException;
|
/external/bluetooth/bluez/compat/ |
dund.1 | 44 \fB\-\-auth\fR \fB\-A\fR
|
/external/dbus/dbus/ |
dbus-auth-script.h | 2 /* dbus-auth-script.h Test DBusAuth using a special script file (internal to D-Bus implementation)
|
Makefile.am | 37 dbus-auth.c \ 38 dbus-auth.h \ 39 dbus-auth-script.c \ 40 dbus-auth-script.h \ 130 dbus-auth-util.c \
|
/external/iptables/extensions/ |
libip6t_ipv6header.man | 16 .IR auth
|
/hardware/ti/wlan/wl1271/stad/src/Sta_Management/ |
sharedKeyAuthSm.c | 146 /* next state and actions for AUTH state */ 232 authAlgo = ENDIAN_HANDLE_WORD(pFrame->content.auth.authAlgo); 240 rspSeq = pFrame->content.auth.seqNum; 242 pHandle->authData.status = pFrame->content.auth.status; 243 pHandle->authData.pChalange = (char *)(pFrame->content.auth.pChallenge->text); 244 pHandle->authData.challangeLen = pFrame->content.auth.pChallenge->hdr[1]; 253 if (pFrame->content.auth.pChallenge->hdr[0] != CHALLANGE_TEXT_IE_ID)
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/Auth/shared/ |
sharedKeyAuthSm.c | 149 /* next state and actions for AUTH state */ 264 authAlgo = pFrame->content.auth.authAlgo; 273 rspSeq = pFrame->content.auth.seqNum; 275 pHandle->authData.status = pFrame->content.auth.status; 276 pHandle->authData.pChalange = (char *)(pFrame->content.auth.pChallenge->text); 277 pHandle->authData.challangeLen = pFrame->content.auth.pChallenge->hdr.eleLen; 287 if (pFrame->content.auth.pChallenge->hdr.eleId != CHALLANGE_TEXT_IE_ID)
|
/system/wlan/ti/wilink_6_1/stad/src/Sta_Management/ |
sharedKeyAuthSm.c | 146 /* next state and actions for AUTH state */ 232 authAlgo = ENDIAN_HANDLE_WORD(pFrame->content.auth.authAlgo); 240 rspSeq = pFrame->content.auth.seqNum; 242 pHandle->authData.status = pFrame->content.auth.status; 243 pHandle->authData.pChalange = (char *)(pFrame->content.auth.pChallenge->text); 244 pHandle->authData.challangeLen = pFrame->content.auth.pChallenge->hdr[1]; 253 if (pFrame->content.auth.pChallenge->hdr[0] != CHALLANGE_TEXT_IE_ID)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.c | 595 u8 method, const u8 *auth, size_t auth_len) 603 /* TODO: validate AUTH */ 609 u8 method, const u8 *auth, 629 wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data"); 641 os_memcmp(auth, auth_data, auth_len) != 0) { 644 auth, auth_len); 658 const u8 *auth, size_t auth_len) 662 if (auth == NULL) { 673 auth_method = auth[0]; 674 auth += 4 [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
ikev2.c | 561 u8 method, const u8 *auth, size_t auth_len) 569 /* TODO: validate AUTH */ 575 u8 method, const u8 *auth, 595 wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data"); 607 os_memcmp(auth, auth_data, auth_len) != 0) { 610 auth, auth_len); 626 const u8 *auth, size_t auth_len) 630 if (auth == NULL) { 641 auth_method = auth[0]; 642 auth += 4 [all...] |
/frameworks/base/core/jni/ |
android_bluetooth_BluetoothSocket.cpp | 93 jboolean auth; local 120 auth = env->GetBooleanField(obj, field_mAuth); 126 lm |= auth ? RFCOMM_LM_AUTH : 0; 128 lm |= (auth && encrypt) ? RFCOMM_LM_SECURE : 0; 131 lm |= auth ? L2CAP_LM_AUTH : 0; 133 lm |= (auth && encrypt) ? L2CAP_LM_SECURE : 0; 319 jboolean auth; local 367 auth = env->GetBooleanField(obj, field_mAuth); 374 type, fd, auth, encrypt, addr_jstr, -1);
|
/packages/apps/Email/tests/src/com/android/email/mail/transport/ |
SmtpSenderUnitTests.java | 95 * TODO: Test AUTH LOGIN 113 mockDash.expect(null, "250 AUTH LOGIN PLAIN CRAM-MD5"); 117 mockDash.expect(null, "250 AUTH LOGIN PLAIN CRAM-MD5"); 118 mockDash.expect("AUTH PLAIN .*", "235 2.7.0 ... authentication succeeded"); 131 mockSpace.expect(null, "250-AUTH LOGIN PLAIN CRAM-MD5"); 135 mockSpace.expect(null, "250-AUTH LOGIN PLAIN CRAM-MD5"); 137 mockSpace.expect("AUTH PLAIN .*", "235 2.7.0 ... authentication succeeded"); 449 mockTransport.expect(null, "250-AUTH LOGIN PLAIN CRAM-MD5"); 459 mockTransport.expect("AUTH PLAIN .*", "235 2.7.0 ... authentication succeeded");
|
/frameworks/base/core/java/android/bluetooth/ |
BluetoothSocket.java | 110 * @param auth require the remote device to be authenticated 118 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, 133 mAuth = auth; 156 * @param auth require the remote device to be authenticated 163 private BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, String address, 165 this(type, fd, auth, encrypt, new BluetoothDevice(address), port, null);
|
/frameworks/base/core/java/android/net/http/ |
HttpAuthHeader.java | 42 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth"). 84 * value "auth" indicates authentication; the value "auth-int" 182 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth"). 237 * DIGEST (only algorithm="md5", no qop or qop="auth). 248 (mQop == null || mQop.equals("auth"));
|
/prebuilt/sdk/4/ |
android.jar | |
/external/apache-http/src/org/apache/http/auth/ |
AuthenticationException.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthenticationException.java $ 31 package org.apache.http.auth;
|