HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 276 - 300 of 707) sorted by null

<<11121314151617181920>>

  /external/ppp/pppd/
chap-new.h 126 /* Called by auth. code to start authenticating us to the peer. */
Makefile.linux 15 ecp.c ipxcp.c auth.c options.c sys-linux.c md4.c chap_ms.c \
24 ecp.o auth.o options.o demand.o utils.o sys-linux.o ipxcp.o tty.o \
  /external/tcpdump/
print-syslog.c 61 { 4, "auth" },
tcp.h 81 #define TCPOPT_AUTH 20 /* Enhanced AUTH option */
print-ip6opts.c 118 printf(", auth: trunc");
121 printf(", auth spi: 0x%08x", EXTRACT_32BITS(&bp[i + 2]));
print-mobility.c 147 printf("(auth: trunc)");
150 printf("(auth)");
print-zephyr.c 46 int auth; member in struct:z_packet
164 PARSE_FIELD_INT(z.auth);
  /frameworks/base/include/media/stagefright/
MetaData.h 63 kKeyAuthor = 'auth', // cstring
  /frameworks/base/telephony/java/com/android/internal/telephony/gsm/
ApnSetting.java 70 // data[12] = auth
  /packages/apps/IM/plugin/com/android/im/plugin/
ImpsConfigNames.java 92 public static final String SMS_AUTH = "imps.sms-auth";
  /packages/providers/TelephonyProvider/src/com/android/providers/telephony/
TelephonyProvider.java 193 // The auth type column can have 4 values: 0 (None), 1 (PAP), 2 (CHAP)
258 String auth = parser.getAttributeValue(null, "authtype"); local
259 if (auth != null) {
260 map.put(Telephony.Carriers.AUTH_TYPE, Integer.parseInt(auth));
  /external/dbus/dbus/
Makefile.in 68 am__objects_1 = dbus-address.lo dbus-auth.lo dbus-auth-script.lo \
86 am__objects_3 = dbus-auth-util.lo dbus-mainloop.lo \
332 dbus-auth.c \
333 dbus-auth.h \
334 dbus-auth-script.c \
335 dbus-auth-script.h \
424 dbus-auth-util.c \
561 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/dbus-auth-script.Plo@am__quote@
562 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/dbus-auth-util.Plo@am__quote
    [all...]
  /external/bluetooth/hcidump/parser/
obex.c 171 return "Auth. Challenge";
173 return "Auth. Response";
  /external/ipsec-tools/src/racoon/
ipsec_doi.h 128 * When negotiating ESP without authentication, the Auth
130 * When negotiating ESP without confidentiality, the Auth
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
ikev2_common.h 206 * public key is used to validate the sender's AUTH payload */
316 const u8 *auth; member in struct:ikev2_payloads
  /cts/tools/test-progress-new/etc/
test-progress 84 $INPUT/dalvik/libcore/auth/src/main/java:\
171 tests.api.javax.security.auth \
223 javax.security.auth \
224 javax.security.auth.callback \
225 javax.security.auth.login \
226 javax.security.auth.x500 \
  /external/dbus/bus/
dbus-daemon.1 221 .I "<auth>"
226 <auth> elements, all the listed mechanisms are allowed. The order in
230 Example: <auth>EXTERNAL</auth>
233 Example: <auth>DBUS_COOKIE_SHA1</auth>
352 - all user="connection's auth user" policies are applied
dbus-daemon.1.in 221 .I "<auth>"
226 <auth> elements, all the listed mechanisms are allowed. The order in
230 Example: <auth>EXTERNAL</auth>
233 Example: <auth>DBUS_COOKIE_SHA1</auth>
352 - all user="connection's auth user" policies are applied
  /hardware/ti/wlan/wl1271/stad/src/Application/
roamingMngr_autoSM.c 384 { /* This AP is a pre-auth AP */
389 { /* This AP is not Neighbor nor Pre-Auth */
450 { /* Pre-Auth APs are the second priority to Roam */
621 /* No Pre-Auth is required */
784 { /* No Pre-Auth is required */
787 TRACE0(pRoamingMngr->hReport, REPORT_SEVERITY_INFORMATION, "roamingMngr_smStartIdle, Pre-Auth to cur AP\n");
  /hardware/ti/wlan/wl1271/stad/src/Connection_Managment/
admCtrl.c 846 /* This table presents supported pairs of auth.mode/cipher type */
876 * I - authEncrCapability - ptr to list of auth.mode/cipher pairs \n
894 /* of auth/encr pairs */
899 TRACE2(pAdmCtrl->hReport, REPORT_SEVERITY_INFORMATION, "admCtrl get AuthEncr capability: No. of auth/encr pairs = %d, No of PMKIDs = %d \n", authEncrCapability->NoOfAuthEncrPairSupported, authEncrCapability->NoOfPMKIDs);
901 /* Copy the hardcoded table of the auth.mode/cipher type */
909 TRACE3(pAdmCtrl->hReport, REPORT_SEVERITY_INFORMATION, "admCtrl get AuthEncr pair list: i = %d, auth mode = %d , cipher suite = %d \n", i, authEncrCapability->authEncrPairs[i].authenticationMode, authEncrCapability->authEncrPairs[i].cipherSuite);
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/
admCtrl.c 830 /* This table presents supported pairs of auth.mode/cipher type */
860 * I - authEncrCapability - ptr to list of auth.mode/cipher pairs \n
878 /* of auth/encr pairs */
884 ("admCtrl get AuthEncr capability: No. of auth/encr pairs = %d, No of PMKIDs = %d \n",
887 /* Copy the hardcoded table of the auth.mode/cipher type */
896 ("admCtrl get AuthEncr pair list: i = %d, auth mode = %d , cipher suite = %d \n", i,
  /system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/
admCtrl.c 834 /* This table presents supported pairs of auth.mode/cipher type */
864 * I - authEncrCapability - ptr to list of auth.mode/cipher pairs \n
882 /* of auth/encr pairs */
887 TRACE2(pAdmCtrl->hReport, REPORT_SEVERITY_INFORMATION, "admCtrl get AuthEncr capability: No. of auth/encr pairs = %d, No of PMKIDs = %d \n", authEncrCapability->NoOfAuthEncrPairSupported, authEncrCapability->NoOfPMKIDs);
889 /* Copy the hardcoded table of the auth.mode/cipher type */
897 TRACE3(pAdmCtrl->hReport, REPORT_SEVERITY_INFORMATION, "admCtrl get AuthEncr pair list: i = %d, auth mode = %d , cipher suite = %d \n", i, authEncrCapability->authEncrPairs[i].authenticationMode, authEncrCapability->authEncrPairs[i].cipherSuite);
  /prebuilt/sdk/5/
android.jar 
  /external/wpa_supplicant/
radius_client.c 92 int sock, int sock6, int auth);
739 int sock, int sock6, int auth)
754 auth ? "Authentication" : "Accounting",
768 if (auth)
779 if ((auth && entry->msg_type != RADIUS_AUTH) ||
780 (!auth && entry->msg_type != RADIUS_ACCT))
824 if (auth)
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius_client.c 93 int sock, int sock6, int auth);
740 int sock, int sock6, int auth)
756 auth ? "Authentication" : "Accounting",
770 if (auth)
781 if ((auth && entry->msg_type != RADIUS_AUTH) ||
782 (!auth && entry->msg_type != RADIUS_ACCT))
880 if (auth)
    [all...]

Completed in 489 milliseconds

<<11121314151617181920>>