/hardware/msm7k/librpc/ |
clnt.c | 416 bool_t xdr_recv_auth (xdr_s_type *xdr, opaque_auth *auth) 418 switch(sizeof(auth->oa_flavor)) { 420 if(!XDR_RECV_INT8(xdr, (int8_t *)&(auth->oa_flavor))) return FALSE; 423 if(!XDR_RECV_INT16(xdr, (int16_t *)&(auth->oa_flavor))) return FALSE; 426 if(!XDR_RECV_INT32(xdr, (int32_t *)&(auth->oa_flavor))) return FALSE; 429 if (!XDR_RECV_UINT (xdr, (unsigned *)&(auth->oa_length))) { 433 if (auth->oa_length != 0) { 434 /* We throw away the auth stuff--it's always the default. */ 435 auth->oa_base = NULL; 436 if (!XDR_RECV_BYTES (xdr, NULL, auth->oa_length) [all...] |
/external/dropbear/ |
options.h | 97 * for hostkey as well as for verifying signatures with pubkey auth. 127 RFC Draft requires pubkey auth, and recommends password */ 129 /* Note: PAM auth is quite simple, and only works for PAM modules which just do 286 /* Required for pubkey auth */ 344 auth */ 381 #error "You can't turn on PASSWORD and PAM auth both at once. Fix it in options.h"
|
Makefile.in | 25 SVROBJS=svr-kex.o svr-algo.o svr-auth.o sshpty.o \ 30 CLIOBJS=cli-algo.o cli-main.o cli-auth.o cli-authpasswd.o cli-kex.o \ 46 dss.h bignum.h signkey.h rsa.h random.h service.h auth.h \
|
cli-service.c | 75 dropbear_exit("request for connection before auth");
|
ssh.h | 53 /* keyboard interactive auth */
|
/external/ppp/pppd/ |
upap.c | 71 "Set max number of transmissions for auth-reqs", OPT_PRIO }, 198 * upap_timeout - Retransmission timer for sending auth-reqs expired. 222 * upap_reqtimeout - Give up waiting for the peer to send an auth-req. 252 upap_sauthreq(u); /* send an auth-request */ 392 upap_sresp(u, UPAP_AUTHACK, id, "", 0); /* return auth-ack */ 396 upap_sresp(u, UPAP_AUTHNAK, id, "", 0); /* return auth-nak */
|
/external/wpa_supplicant/ |
preauth.c | 67 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 68 wpa_hexdump(MSG_MSGDUMP, "RX pre-auth", buf, len); 74 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from " 103 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 111 "master session key from pre-auth EAPOL state " 311 return; /* invalid state for new pre-auth */
|
todo.txt | 17 auth) 56 there to allow scanning multiple APs (e.g., for testing pre-auth and PMKSA 99 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS
|
pcsc_funcs.c | 1054 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); 1076 "auth request (len=%ld resp=%02x %02x)", 1090 "length for GSM auth (len=%ld, expected 14)", 1099 "length for USIM auth (len=%ld, " 1112 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - SRES", sres, 4); 1113 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - Kc", kc, 8); 1156 "auth"); 1160 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); 1161 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - AUTN", autn, AKA_AUTN_LEN); 1176 wpa_printf(MSG_WARNING, "SCARD: UMTS auth failed - [all...] |
radius.c | 292 u8 auth[MD5_MAC_LEN]; local 295 os_memset(auth, 0, MD5_MAC_LEN); 298 auth, MD5_MAC_LEN); 322 u8 auth[MD5_MAC_LEN]; local 327 os_memset(auth, 0, MD5_MAC_LEN); 329 auth, MD5_MAC_LEN); 584 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local 613 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, auth); 620 if (os_memcmp(orig, auth, MD5_MAC_LEN) != 0) { 630 size_t secret_len, struct radius_msg *sent_msg, int auth) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
preauth.c | 67 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 68 wpa_hexdump(MSG_MSGDUMP, "RX pre-auth", buf, len); 73 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from " 102 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 111 "master session key from pre-auth EAPOL state " 312 return; /* invalid state for new pre-auth */
|
/external/tcpdump/ |
print-vrrp.c | 51 * | Auth Type | Adver Int | Checksum | 75 /* Auth Type */ 130 printf(" auth \"");
|
/sdk/ddms/libs/ddmuilib/src/com/android/ddmuilib/log/event/ |
DisplaySyncPerf.java | 203 void processSyncEvent(EventContainer event, int auth, long startTime, long stopTime, 206 mDatasets[auth].add(new SimpleTimePeriod(startTime, stopTime), SERIES_YCOORD[auth]);
|
/dalvik/libcore/security/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSPasswordProtectionTest.java | 32 import javax.security.auth.DestroyFailedException;
|
/development/samples/SampleSyncAdapter/ |
_index.html | 12 account manager to obtain an auth token for the account. An authenticator (a
|
/external/apache-http/src/org/apache/http/auth/ |
package.html | 5 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/package.html $
|
AuthScheme.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthScheme.java $ 31 package org.apache.http.auth;
|
/external/apache-http/src/org/apache/http/auth/params/ |
package.html | 5 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/params/package.html $
|
/external/dbus/dbus/ |
Android.mk | 12 dbus-auth.c \
|
/external/e2fsprogs/lib/et/test_cases/ |
heimdal.et | 16 ec KDC_AUTH_EXP, "Kerberos auth expired"
|
/external/webkit/WebKit/chromium/public/ |
WebSocketStreamHandleClient.h | 61 // FIXME: auth challenge for proxy
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
mschapv2.c | 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 300 u8 auth[MD5_MAC_LEN]; local 303 os_memset(auth, 0, MD5_MAC_LEN); 306 auth, MD5_MAC_LEN); 330 u8 auth[MD5_MAC_LEN]; local 335 os_memset(auth, 0, MD5_MAC_LEN); 337 auth, MD5_MAC_LEN); 588 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local 618 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, auth); 625 if (os_memcmp(orig, auth, MD5_MAC_LEN) != 0) { 635 size_t secret_len, struct radius_msg *sent_msg, int auth) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
pcsc_funcs.c | 1054 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); 1076 "auth request (len=%ld resp=%02x %02x)", 1090 "length for GSM auth (len=%ld, expected 14)", 1099 "length for USIM auth (len=%ld, " 1112 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - SRES", sres, 4); 1113 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - Kc", kc, 8); 1156 "auth"); 1160 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); 1161 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - AUTN", autn, AKA_AUTN_LEN); 1176 wpa_printf(MSG_WARNING, "SCARD: UMTS auth failed - [all...] |
/dalvik/libcore/security/src/main/java/java/security/ |
security.properties | 33 # See specification for javax.security.auth.login.Configuration class. 35 login.configuration.provider=org.apache.harmony.auth.login.DefaultConfiguration
|