HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 126 - 150 of 707) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/dropbear/
svr-service.c 31 #include "auth.h"
60 dropbear_exit("request for connection before auth");
svr-session.c 40 #include "auth.h"
138 "exit after auth (%s): %s",
143 "exit before auth (user '%s', %d fails): %s",
148 "exit before auth: %s", format);
  /external/ppp/pppd/plugins/radius/etc/
dictionary 112 ATTRIBUTE Auth-Type 1000 integer
218 VALUE Auth-Type Local 0
219 VALUE Auth-Type System 1
220 VALUE Auth-Type SecurID 2
221 VALUE Auth-Type Crypt-Local 3
222 VALUE Auth-Type Reject 4
227 VALUE Auth-Type Pam 253
228 VALUE Auth-Type None 254
dictionary.ascend 95 ATTRIBUTE Ascend-Require-Auth 201 integer
125 ATTRIBUTE Ascend-Send-Auth 231 integer
193 VALUE Ascend-Send-Auth Send-Auth-None 0
194 VALUE Ascend-Send-Auth Send-Auth-PAP 1
195 VALUE Ascend-Send-Auth Send-Auth-CHAP 2
196 VALUE Ascend-Send-Auth Send-Auth-MS-CHAP
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
eap_testing.txt 103 EAP-FAST/GTC(auth) - - - + - + - - - + + +
110 EAP-FAST/MSCHAPv2(auth) - - - - - + - - - - + +
111 EAP-FAST/MD5(auth) - - - - - + - - - - + -
112 EAP-FAST/TLS(auth) - - - - - - - - - - + +
113 EAP-FAST/SIM(auth) - - - - - - - - - - + -
114 EAP-FAST/AKA(auth) - - - - - - - - - - + -
123 2) used FreeRADIUS as inner auth server
176 - EAP-TTLS / CHAP (using FreeRADIUS as inner auth srv)
180 - EAP-TTLS / EAP-MD5-Challenge (using FreeRADIUS as inner auth srv)
181 - EAP-TTLS / EAP-GTC (using FreeRADIUS as inner auth srv
    [all...]
  /cts/tests/res/xml/
intentfilter.xml 24 <auth host="testHost" port="80"/>
  /dalvik/libcore/auth/src/main/java/javax/security/auth/
DestroyFailedException.java 18 package javax.security.auth;
Destroyable.java 18 package javax.security.auth;
  /dalvik/libcore/auth/src/main/java/javax/security/auth/login/
LoginException.java 18 package javax.security.auth.login;
  /external/apache-http/src/org/apache/http/impl/client/
AbstractAuthenticationHandler.java 45 import org.apache.http.auth.AuthScheme;
46 import org.apache.http.auth.AuthSchemeRegistry;
47 import org.apache.http.auth.AuthenticationException;
48 import org.apache.http.auth.MalformedChallengeException;
  /external/bluetooth/bluez/compat/
dund.1 44 \fB\-\-auth\fR \fB\-A\fR
  /external/dbus/dbus/
dbus-auth-script.h 2 /* dbus-auth-script.h Test DBusAuth using a special script file (internal to D-Bus implementation)
Makefile.am 37 dbus-auth.c \
38 dbus-auth.h \
39 dbus-auth-script.c \
40 dbus-auth-script.h \
130 dbus-auth-util.c \
  /external/iptables/extensions/
libip6t_ipv6header.man 16 .IR auth
  /hardware/ti/wlan/wl1271/stad/src/Sta_Management/
sharedKeyAuthSm.c 146 /* next state and actions for AUTH state */
232 authAlgo = ENDIAN_HANDLE_WORD(pFrame->content.auth.authAlgo);
240 rspSeq = pFrame->content.auth.seqNum;
242 pHandle->authData.status = pFrame->content.auth.status;
243 pHandle->authData.pChalange = (char *)(pFrame->content.auth.pChallenge->text);
244 pHandle->authData.challangeLen = pFrame->content.auth.pChallenge->hdr[1];
253 if (pFrame->content.auth.pChallenge->hdr[0] != CHALLANGE_TEXT_IE_ID)
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/Auth/shared/
sharedKeyAuthSm.c 149 /* next state and actions for AUTH state */
264 authAlgo = pFrame->content.auth.authAlgo;
273 rspSeq = pFrame->content.auth.seqNum;
275 pHandle->authData.status = pFrame->content.auth.status;
276 pHandle->authData.pChalange = (char *)(pFrame->content.auth.pChallenge->text);
277 pHandle->authData.challangeLen = pFrame->content.auth.pChallenge->hdr.eleLen;
287 if (pFrame->content.auth.pChallenge->hdr.eleId != CHALLANGE_TEXT_IE_ID)
  /system/wlan/ti/wilink_6_1/stad/src/Sta_Management/
sharedKeyAuthSm.c 146 /* next state and actions for AUTH state */
232 authAlgo = ENDIAN_HANDLE_WORD(pFrame->content.auth.authAlgo);
240 rspSeq = pFrame->content.auth.seqNum;
242 pHandle->authData.status = pFrame->content.auth.status;
243 pHandle->authData.pChalange = (char *)(pFrame->content.auth.pChallenge->text);
244 pHandle->authData.challangeLen = pFrame->content.auth.pChallenge->hdr[1];
253 if (pFrame->content.auth.pChallenge->hdr[0] != CHALLANGE_TEXT_IE_ID)
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.c 595 u8 method, const u8 *auth, size_t auth_len)
603 /* TODO: validate AUTH */
609 u8 method, const u8 *auth,
629 wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data");
641 os_memcmp(auth, auth_data, auth_len) != 0) {
644 auth, auth_len);
658 const u8 *auth, size_t auth_len)
662 if (auth == NULL) {
673 auth_method = auth[0];
674 auth += 4
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.c 561 u8 method, const u8 *auth, size_t auth_len)
569 /* TODO: validate AUTH */
575 u8 method, const u8 *auth,
595 wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data");
607 os_memcmp(auth, auth_data, auth_len) != 0) {
610 auth, auth_len);
626 const u8 *auth, size_t auth_len)
630 if (auth == NULL) {
641 auth_method = auth[0];
642 auth += 4
    [all...]
  /frameworks/base/core/jni/
android_bluetooth_BluetoothSocket.cpp 93 jboolean auth; local
120 auth = env->GetBooleanField(obj, field_mAuth);
126 lm |= auth ? RFCOMM_LM_AUTH : 0;
128 lm |= (auth && encrypt) ? RFCOMM_LM_SECURE : 0;
131 lm |= auth ? L2CAP_LM_AUTH : 0;
133 lm |= (auth && encrypt) ? L2CAP_LM_SECURE : 0;
319 jboolean auth; local
367 auth = env->GetBooleanField(obj, field_mAuth);
374 type, fd, auth, encrypt, addr_jstr, -1);
  /packages/apps/Email/tests/src/com/android/email/mail/transport/
SmtpSenderUnitTests.java 95 * TODO: Test AUTH LOGIN
113 mockDash.expect(null, "250 AUTH LOGIN PLAIN CRAM-MD5");
117 mockDash.expect(null, "250 AUTH LOGIN PLAIN CRAM-MD5");
118 mockDash.expect("AUTH PLAIN .*", "235 2.7.0 ... authentication succeeded");
131 mockSpace.expect(null, "250-AUTH LOGIN PLAIN CRAM-MD5");
135 mockSpace.expect(null, "250-AUTH LOGIN PLAIN CRAM-MD5");
137 mockSpace.expect("AUTH PLAIN .*", "235 2.7.0 ... authentication succeeded");
449 mockTransport.expect(null, "250-AUTH LOGIN PLAIN CRAM-MD5");
459 mockTransport.expect("AUTH PLAIN .*", "235 2.7.0 ... authentication succeeded");
  /frameworks/base/core/java/android/bluetooth/
BluetoothSocket.java 110 * @param auth require the remote device to be authenticated
118 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt,
133 mAuth = auth;
156 * @param auth require the remote device to be authenticated
163 private BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, String address,
165 this(type, fd, auth, encrypt, new BluetoothDevice(address), port, null);
  /frameworks/base/core/java/android/net/http/
HttpAuthHeader.java 42 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth").
84 * value "auth" indicates authentication; the value "auth-int"
182 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth").
237 * DIGEST (only algorithm="md5", no qop or qop="auth).
248 (mQop == null || mQop.equals("auth"));
  /prebuilt/sdk/4/
android.jar 
  /external/apache-http/src/org/apache/http/auth/
AuthenticationException.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthenticationException.java $
31 package org.apache.http.auth;

Completed in 202 milliseconds

1 2 3 4 56 7 8 91011>>