HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 176 - 200 of 707) sorted by null

1 2 3 4 5 6 78 91011>>

  /ndk/build/platforms/android-4/arch-arm/usr/include/linux/sunrpc/
clnt.h 18 #include <linux/sunrpc/auth.h>
  /ndk/build/platforms/android-5/arch-arm/usr/include/linux/sunrpc/
clnt.h 18 #include <linux/sunrpc/auth.h>
  /ndk/build/platforms/android-5/arch-x86/usr/include/linux/sunrpc/
clnt.h 18 #include <linux/sunrpc/auth.h>
  /ndk/build/platforms/android-8/arch-arm/usr/include/linux/sunrpc/
clnt.h 18 #include <linux/sunrpc/auth.h>
  /ndk/build/platforms/android-8/arch-x86/usr/include/linux/sunrpc/
clnt.h 18 #include <linux/sunrpc/auth.h>
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/Auth/open/
openAuthSm.c 136 /* next state and actions for AUTH state */
244 authAlgo = pFrame->content.auth.authAlgo;
259 ("OPEN_AUTH_SM: DEBUG Authentication status is %d \n", pFrame->content.auth.status));
261 pHandle->authData.status = pFrame->content.auth.status;
  /system/wlan/ti/wilink_6_1/stad/src/Sta_Management/
openAuthSm.c 134 /* next state and actions for AUTH state */
216 authAlgo = ENDIAN_HANDLE_WORD(pFrame->content.auth.authAlgo);
229 TRACE1(pHandle->hReport, REPORT_SEVERITY_SM, "OPEN_AUTH_SM: DEBUG Authentication status is %d \n", pFrame->content.auth.status);
231 pHandle->authData.status = pFrame->content.auth.status;
  /dalvik/libcore/auth/src/main/java/org/apache/harmony/auth/internal/nls/
Messages.java 28 package org.apache.harmony.auth.internal.nls;
47 * org.apache.harmony.auth.internal.nls.messages
59 "org.apache.harmony.auth.internal.nls.messages";
  /external/apache-http/src/org/apache/http/auth/
AuthState.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthState.java $
31 package org.apache.http.auth;
139 buffer.append("auth scope [");
  /external/apache-http/src/org/apache/http/impl/auth/
RFC2617Scheme.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/RFC2617Scheme.java $
31 package org.apache.http.impl.auth;
38 import org.apache.http.auth.MalformedChallengeException;
  /external/dropbear/
CHANGES 14 - Add -f dbclient option for "background after auth"
101 - Log when pubkey auth fails because of bad ~/.ssh/authorized_keys permissions
169 - SECURITY: Fix for PAM auth so that usernames are logged and conversation
188 - Logging of IPs in auth success/failure messages for improved greppability
207 - Fix a small memory leak in the auth code
294 exploitable, all users with DSS and pubkey-auth compiled in are advised to
393 - Better checking of key lengths and parameters for DSS and RSA auth
395 - Print fingerprint of keys used for pubkey auth
399 - Added option to disable password auth (or just for root) at runtime
449 make sure that we kick off people if they don't auth within 5 minutes
    [all...]
README 20 Server public key auth:
35 Client public key auth:
37 Dropbear can do public key auth as a client, but you will have to convert
svr-agentfwd.c 181 "auth-agent@openssh.com",
242 /* Format is "/tmp/dropbear-0246dead/auth-d00f7654-23".
247 snprintf(sockfile, sizeof(sockfile), "auth-%.8x-%d", prefix, fd);
  /external/qemu/
vnc.h 81 #include "vnc-auth-vencrypt.h"
84 #include "vnc-auth-sasl.h"
97 int auth; member in struct:VncDisplay
  /external/wpa_supplicant/
eap_testing.txt 88 2) used FreeRADIUS as inner auth server
139 - EAP-TTLS / CHAP (using FreeRADIUS as inner auth srv)
143 - EAP-TTLS / EAP-MD5-Challenge (using FreeRADIUS as inner auth srv)
144 - EAP-TTLS / EAP-GTC (using FreeRADIUS as inner auth srv)
145 - EAP-TTLS / EAP-MSCHAPv2 (using FreeRADIUS as inner auth srv)
146 - EAP-TTLS / EAP-TLS (using FreeRADIUS as inner auth srv)
218 Note: Needed to use unknown identity in outer auth and some times the server
226 Using 1300 for outer auth and 500 for inner auth seemed to work.
227 Note: Needed to use unknown identity in outer auth and some times the serve
    [all...]
wpa_i.h 37 } auth; member in union:wpa_ptk::__anon6786
98 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or
99 * 00:00:00:00:00:00 if no pre-auth is
  /frameworks/base/core/java/android/bluetooth/
BluetoothServerSocket.java 69 * @param auth require the remote device to be authenticated
75 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port)
77 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null);
  /packages/providers/ContactsProvider/src/com/android/providers/contacts/
PhotoPriorityResolver.java 95 for (AuthenticatorDescription auth : am.getAuthenticatorTypes()) {
96 if (accountType.equals(auth.type)) {
97 return resolvePhotoPriorityFromMetaData(auth.packageName);
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/
mlmeBuilder.c 172 /* sign the De Auth packet
173 * A De Auth indication (if occurs) will be provided via TxComplete
204 case AUTH:
mlmeSm.c 59 #include "Auth/authSm.h"
62 #include "Auth/open/openAuthSm.h"
63 #include "Auth/shared/sharedKeyAuthSm.h"
528 /* Now, if the MLME legacy auth type is AUTO_SWITCH, and the Auth legacy auth type is shared key,
529 we configure the auth SM to open system, otherwise, this is really an authentication failure. */
  /external/dbus/doc/
dbus-specification.xml     [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 28 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon6909
274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
330 "Response/Auth-Reject");
347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sake.c 27 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon6940
220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
424 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Auth-Reject");
  /system/wlan/ti/sta_dk_4_0_4_32/
drv_sources.inc 79 $(COMSRC)/core/mlme/Auth/open \
80 $(COMSRC)/core/mlme/Auth/shared \
226 $(COMSRC)/core/mlme/Auth/authSm.c \
227 $(COMSRC)/core/mlme/Auth/open/openAuthSm.c \
228 $(COMSRC)/core/mlme/Auth/shared/sharedKeyAuthSm.c \
  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
hlr_auc_gw.c 24 * SIM-REQ-AUTH <IMSI> <max_chal>
25 * SIM-RESP-AUTH <IMSI> Kc1:SRES1:RAND1 Kc2:SRES2:RAND2 [Kc3:SRES3:RAND3]
26 * SIM-RESP-AUTH <IMSI> FAILURE
29 * AKA-REQ-AUTH <IMSI>
30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
31 * AKA-RESP-AUTH <IMSI> FAILURE
412 ret = snprintf(rpos, rend - rpos, "SIM-RESP-AUTH %s", imsi);
471 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
510 ret = snprintf(pos, end - pos, "AKA-RESP-AUTH %s ", imsi);
599 if (strncmp(buf, "SIM-REQ-AUTH ", 13) == 0
    [all...]

Completed in 267 milliseconds

1 2 3 4 5 6 78 91011>>