HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 201 - 225 of 707) sorted by null

1 2 3 4 5 6 7 891011>>

  /hardware/msm7k/librpc/
clnt.c 416 bool_t xdr_recv_auth (xdr_s_type *xdr, opaque_auth *auth)
418 switch(sizeof(auth->oa_flavor)) {
420 if(!XDR_RECV_INT8(xdr, (int8_t *)&(auth->oa_flavor))) return FALSE;
423 if(!XDR_RECV_INT16(xdr, (int16_t *)&(auth->oa_flavor))) return FALSE;
426 if(!XDR_RECV_INT32(xdr, (int32_t *)&(auth->oa_flavor))) return FALSE;
429 if (!XDR_RECV_UINT (xdr, (unsigned *)&(auth->oa_length))) {
433 if (auth->oa_length != 0) {
434 /* We throw away the auth stuff--it's always the default. */
435 auth->oa_base = NULL;
436 if (!XDR_RECV_BYTES (xdr, NULL, auth->oa_length)
    [all...]
  /external/dropbear/
options.h 97 * for hostkey as well as for verifying signatures with pubkey auth.
127 RFC Draft requires pubkey auth, and recommends password */
129 /* Note: PAM auth is quite simple, and only works for PAM modules which just do
286 /* Required for pubkey auth */
344 auth */
381 #error "You can't turn on PASSWORD and PAM auth both at once. Fix it in options.h"
Makefile.in 25 SVROBJS=svr-kex.o svr-algo.o svr-auth.o sshpty.o \
30 CLIOBJS=cli-algo.o cli-main.o cli-auth.o cli-authpasswd.o cli-kex.o \
46 dss.h bignum.h signkey.h rsa.h random.h service.h auth.h \
cli-service.c 75 dropbear_exit("request for connection before auth");
ssh.h 53 /* keyboard interactive auth */
  /external/ppp/pppd/
upap.c 71 "Set max number of transmissions for auth-reqs", OPT_PRIO },
198 * upap_timeout - Retransmission timer for sending auth-reqs expired.
222 * upap_reqtimeout - Give up waiting for the peer to send an auth-req.
252 upap_sauthreq(u); /* send an auth-request */
392 upap_sresp(u, UPAP_AUTHACK, id, "", 0); /* return auth-ack */
396 upap_sresp(u, UPAP_AUTHNAK, id, "", 0); /* return auth-nak */
  /external/wpa_supplicant/
preauth.c 67 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
68 wpa_hexdump(MSG_MSGDUMP, "RX pre-auth", buf, len);
74 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from "
103 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
111 "master session key from pre-auth EAPOL state "
311 return; /* invalid state for new pre-auth */
todo.txt 17 auth)
56 there to allow scanning multiple APs (e.g., for testing pre-auth and PMKSA
99 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS
pcsc_funcs.c 1054 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16);
1076 "auth request (len=%ld resp=%02x %02x)",
1090 "length for GSM auth (len=%ld, expected 14)",
1099 "length for USIM auth (len=%ld, "
1112 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - SRES", sres, 4);
1113 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - Kc", kc, 8);
1156 "auth");
1160 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN);
1161 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - AUTN", autn, AKA_AUTN_LEN);
1176 wpa_printf(MSG_WARNING, "SCARD: UMTS auth failed -
    [all...]
radius.c 292 u8 auth[MD5_MAC_LEN]; local
295 os_memset(auth, 0, MD5_MAC_LEN);
298 auth, MD5_MAC_LEN);
322 u8 auth[MD5_MAC_LEN]; local
327 os_memset(auth, 0, MD5_MAC_LEN);
329 auth, MD5_MAC_LEN);
584 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local
613 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, auth);
620 if (os_memcmp(orig, auth, MD5_MAC_LEN) != 0) {
630 size_t secret_len, struct radius_msg *sent_msg, int auth)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
preauth.c 67 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
68 wpa_hexdump(MSG_MSGDUMP, "RX pre-auth", buf, len);
73 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from "
102 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
111 "master session key from pre-auth EAPOL state "
312 return; /* invalid state for new pre-auth */
  /external/tcpdump/
print-vrrp.c 51 * | Auth Type | Adver Int | Checksum |
75 /* Auth Type */
130 printf(" auth \"");
  /sdk/ddms/libs/ddmuilib/src/com/android/ddmuilib/log/event/
DisplaySyncPerf.java 203 void processSyncEvent(EventContainer event, int auth, long startTime, long stopTime,
206 mDatasets[auth].add(new SimpleTimePeriod(startTime, stopTime), SERIES_YCOORD[auth]);
  /dalvik/libcore/security/src/test/java/org/apache/harmony/security/tests/java/security/
KSPasswordProtectionTest.java 32 import javax.security.auth.DestroyFailedException;
  /development/samples/SampleSyncAdapter/
_index.html 12 account manager to obtain an auth token for the account. An authenticator (a
  /external/apache-http/src/org/apache/http/auth/
package.html 5 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/package.html $
AuthScheme.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthScheme.java $
31 package org.apache.http.auth;
  /external/apache-http/src/org/apache/http/auth/params/
package.html 5 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/params/package.html $
  /external/dbus/dbus/
Android.mk 12 dbus-auth.c \
  /external/e2fsprogs/lib/et/test_cases/
heimdal.et 16 ec KDC_AUTH_EXP, "Kerberos auth expired"
  /external/webkit/WebKit/chromium/public/
WebSocketStreamHandleClient.h 61 // FIXME: auth challenge for proxy
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
mschapv2.c 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius.c 300 u8 auth[MD5_MAC_LEN]; local
303 os_memset(auth, 0, MD5_MAC_LEN);
306 auth, MD5_MAC_LEN);
330 u8 auth[MD5_MAC_LEN]; local
335 os_memset(auth, 0, MD5_MAC_LEN);
337 auth, MD5_MAC_LEN);
588 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local
618 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, auth);
625 if (os_memcmp(orig, auth, MD5_MAC_LEN) != 0) {
635 size_t secret_len, struct radius_msg *sent_msg, int auth)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/utils/
pcsc_funcs.c 1054 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16);
1076 "auth request (len=%ld resp=%02x %02x)",
1090 "length for GSM auth (len=%ld, expected 14)",
1099 "length for USIM auth (len=%ld, "
1112 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - SRES", sres, 4);
1113 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - Kc", kc, 8);
1156 "auth");
1160 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN);
1161 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - AUTN", autn, AKA_AUTN_LEN);
1176 wpa_printf(MSG_WARNING, "SCARD: UMTS auth failed -
    [all...]
  /dalvik/libcore/security/src/main/java/java/security/
security.properties 33 # See specification for javax.security.auth.login.Configuration class.
35 login.configuration.provider=org.apache.harmony.auth.login.DefaultConfiguration

Completed in 335 milliseconds

1 2 3 4 5 6 7 891011>>