/ndk/build/platforms/android-4/arch-arm/usr/include/linux/sunrpc/ |
clnt.h | 18 #include <linux/sunrpc/auth.h>
|
/ndk/build/platforms/android-5/arch-arm/usr/include/linux/sunrpc/ |
clnt.h | 18 #include <linux/sunrpc/auth.h>
|
/ndk/build/platforms/android-5/arch-x86/usr/include/linux/sunrpc/ |
clnt.h | 18 #include <linux/sunrpc/auth.h>
|
/ndk/build/platforms/android-8/arch-arm/usr/include/linux/sunrpc/ |
clnt.h | 18 #include <linux/sunrpc/auth.h>
|
/ndk/build/platforms/android-8/arch-x86/usr/include/linux/sunrpc/ |
clnt.h | 18 #include <linux/sunrpc/auth.h>
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/Auth/open/ |
openAuthSm.c | 136 /* next state and actions for AUTH state */ 244 authAlgo = pFrame->content.auth.authAlgo; 259 ("OPEN_AUTH_SM: DEBUG Authentication status is %d \n", pFrame->content.auth.status)); 261 pHandle->authData.status = pFrame->content.auth.status;
|
/system/wlan/ti/wilink_6_1/stad/src/Sta_Management/ |
openAuthSm.c | 134 /* next state and actions for AUTH state */ 216 authAlgo = ENDIAN_HANDLE_WORD(pFrame->content.auth.authAlgo); 229 TRACE1(pHandle->hReport, REPORT_SEVERITY_SM, "OPEN_AUTH_SM: DEBUG Authentication status is %d \n", pFrame->content.auth.status); 231 pHandle->authData.status = pFrame->content.auth.status;
|
/dalvik/libcore/auth/src/main/java/org/apache/harmony/auth/internal/nls/ |
Messages.java | 28 package org.apache.harmony.auth.internal.nls; 47 * org.apache.harmony.auth.internal.nls.messages 59 "org.apache.harmony.auth.internal.nls.messages";
|
/external/apache-http/src/org/apache/http/auth/ |
AuthState.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthState.java $ 31 package org.apache.http.auth; 139 buffer.append("auth scope [");
|
/external/apache-http/src/org/apache/http/impl/auth/ |
RFC2617Scheme.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/RFC2617Scheme.java $ 31 package org.apache.http.impl.auth; 38 import org.apache.http.auth.MalformedChallengeException;
|
/external/dropbear/ |
CHANGES | 14 - Add -f dbclient option for "background after auth" 101 - Log when pubkey auth fails because of bad ~/.ssh/authorized_keys permissions 169 - SECURITY: Fix for PAM auth so that usernames are logged and conversation 188 - Logging of IPs in auth success/failure messages for improved greppability 207 - Fix a small memory leak in the auth code 294 exploitable, all users with DSS and pubkey-auth compiled in are advised to 393 - Better checking of key lengths and parameters for DSS and RSA auth 395 - Print fingerprint of keys used for pubkey auth 399 - Added option to disable password auth (or just for root) at runtime 449 make sure that we kick off people if they don't auth within 5 minutes [all...] |
README | 20 Server public key auth: 35 Client public key auth: 37 Dropbear can do public key auth as a client, but you will have to convert
|
svr-agentfwd.c | 181 "auth-agent@openssh.com", 242 /* Format is "/tmp/dropbear-0246dead/auth-d00f7654-23". 247 snprintf(sockfile, sizeof(sockfile), "auth-%.8x-%d", prefix, fd);
|
/external/qemu/ |
vnc.h | 81 #include "vnc-auth-vencrypt.h" 84 #include "vnc-auth-sasl.h" 97 int auth; member in struct:VncDisplay
|
/external/wpa_supplicant/ |
eap_testing.txt | 88 2) used FreeRADIUS as inner auth server 139 - EAP-TTLS / CHAP (using FreeRADIUS as inner auth srv) 143 - EAP-TTLS / EAP-MD5-Challenge (using FreeRADIUS as inner auth srv) 144 - EAP-TTLS / EAP-GTC (using FreeRADIUS as inner auth srv) 145 - EAP-TTLS / EAP-MSCHAPv2 (using FreeRADIUS as inner auth srv) 146 - EAP-TTLS / EAP-TLS (using FreeRADIUS as inner auth srv) 218 Note: Needed to use unknown identity in outer auth and some times the server 226 Using 1300 for outer auth and 500 for inner auth seemed to work. 227 Note: Needed to use unknown identity in outer auth and some times the serve [all...] |
wpa_i.h | 37 } auth; member in union:wpa_ptk::__anon6786 98 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or 99 * 00:00:00:00:00:00 if no pre-auth is
|
/frameworks/base/core/java/android/bluetooth/ |
BluetoothServerSocket.java | 69 * @param auth require the remote device to be authenticated 75 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port) 77 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null);
|
/packages/providers/ContactsProvider/src/com/android/providers/contacts/ |
PhotoPriorityResolver.java | 95 for (AuthenticatorDescription auth : am.getAuthenticatorTypes()) { 96 if (accountType.equals(auth.type)) { 97 return resolvePhotoPriorityFromMetaData(auth.packageName);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/ |
mlmeBuilder.c | 172 /* sign the De Auth packet 173 * A De Auth indication (if occurs) will be provided via TxComplete 204 case AUTH:
|
mlmeSm.c | 59 #include "Auth/authSm.h" 62 #include "Auth/open/openAuthSm.h" 63 #include "Auth/shared/sharedKeyAuthSm.h" 528 /* Now, if the MLME legacy auth type is AUTO_SWITCH, and the Auth legacy auth type is shared key, 529 we configure the auth SM to open system, otherwise, this is really an authentication failure. */
|
/external/dbus/doc/ |
dbus-specification.xml | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 28 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon6909 274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 330 "Response/Auth-Reject"); 347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 27 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon6940 220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 424 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Auth-Reject");
|
/system/wlan/ti/sta_dk_4_0_4_32/ |
drv_sources.inc | 79 $(COMSRC)/core/mlme/Auth/open \ 80 $(COMSRC)/core/mlme/Auth/shared \ 226 $(COMSRC)/core/mlme/Auth/authSm.c \ 227 $(COMSRC)/core/mlme/Auth/open/openAuthSm.c \ 228 $(COMSRC)/core/mlme/Auth/shared/sharedKeyAuthSm.c \
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
hlr_auc_gw.c | 24 * SIM-REQ-AUTH <IMSI> <max_chal> 25 * SIM-RESP-AUTH <IMSI> Kc1:SRES1:RAND1 Kc2:SRES2:RAND2 [Kc3:SRES3:RAND3] 26 * SIM-RESP-AUTH <IMSI> FAILURE 29 * AKA-REQ-AUTH <IMSI> 30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 31 * AKA-RESP-AUTH <IMSI> FAILURE 412 ret = snprintf(rpos, rend - rpos, "SIM-RESP-AUTH %s", imsi); 471 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */ 510 ret = snprintf(pos, end - pos, "AKA-RESP-AUTH %s ", imsi); 599 if (strncmp(buf, "SIM-REQ-AUTH ", 13) == 0 [all...] |