/external/ppp/pppd/ |
chap-new.h | 126 /* Called by auth. code to start authenticating us to the peer. */
|
Makefile.linux | 15 ecp.c ipxcp.c auth.c options.c sys-linux.c md4.c chap_ms.c \ 24 ecp.o auth.o options.o demand.o utils.o sys-linux.o ipxcp.o tty.o \
|
/external/tcpdump/ |
print-syslog.c | 61 { 4, "auth" },
|
tcp.h | 81 #define TCPOPT_AUTH 20 /* Enhanced AUTH option */
|
print-ip6opts.c | 118 printf(", auth: trunc"); 121 printf(", auth spi: 0x%08x", EXTRACT_32BITS(&bp[i + 2]));
|
print-mobility.c | 147 printf("(auth: trunc)"); 150 printf("(auth)");
|
print-zephyr.c | 46 int auth; member in struct:z_packet 164 PARSE_FIELD_INT(z.auth);
|
/frameworks/base/include/media/stagefright/ |
MetaData.h | 63 kKeyAuthor = 'auth', // cstring
|
/frameworks/base/telephony/java/com/android/internal/telephony/gsm/ |
ApnSetting.java | 70 // data[12] = auth
|
/packages/apps/IM/plugin/com/android/im/plugin/ |
ImpsConfigNames.java | 92 public static final String SMS_AUTH = "imps.sms-auth";
|
/packages/providers/TelephonyProvider/src/com/android/providers/telephony/ |
TelephonyProvider.java | 193 // The auth type column can have 4 values: 0 (None), 1 (PAP), 2 (CHAP) 258 String auth = parser.getAttributeValue(null, "authtype"); local 259 if (auth != null) { 260 map.put(Telephony.Carriers.AUTH_TYPE, Integer.parseInt(auth));
|
/external/dbus/dbus/ |
Makefile.in | 68 am__objects_1 = dbus-address.lo dbus-auth.lo dbus-auth-script.lo \ 86 am__objects_3 = dbus-auth-util.lo dbus-mainloop.lo \ 332 dbus-auth.c \ 333 dbus-auth.h \ 334 dbus-auth-script.c \ 335 dbus-auth-script.h \ 424 dbus-auth-util.c \ 561 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/dbus-auth-script.Plo@am__quote@ 562 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/dbus-auth-util.Plo@am__quote [all...] |
/external/bluetooth/hcidump/parser/ |
obex.c | 171 return "Auth. Challenge"; 173 return "Auth. Response";
|
/external/ipsec-tools/src/racoon/ |
ipsec_doi.h | 128 * When negotiating ESP without authentication, the Auth 130 * When negotiating ESP without confidentiality, the Auth
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.h | 206 * public key is used to validate the sender's AUTH payload */ 316 const u8 *auth; member in struct:ikev2_payloads
|
/cts/tools/test-progress-new/etc/ |
test-progress | 84 $INPUT/dalvik/libcore/auth/src/main/java:\ 171 tests.api.javax.security.auth \ 223 javax.security.auth \ 224 javax.security.auth.callback \ 225 javax.security.auth.login \ 226 javax.security.auth.x500 \
|
/external/dbus/bus/ |
dbus-daemon.1 | 221 .I "<auth>" 226 <auth> elements, all the listed mechanisms are allowed. The order in 230 Example: <auth>EXTERNAL</auth> 233 Example: <auth>DBUS_COOKIE_SHA1</auth> 352 - all user="connection's auth user" policies are applied
|
dbus-daemon.1.in | 221 .I "<auth>" 226 <auth> elements, all the listed mechanisms are allowed. The order in 230 Example: <auth>EXTERNAL</auth> 233 Example: <auth>DBUS_COOKIE_SHA1</auth> 352 - all user="connection's auth user" policies are applied
|
/hardware/ti/wlan/wl1271/stad/src/Application/ |
roamingMngr_autoSM.c | 384 { /* This AP is a pre-auth AP */ 389 { /* This AP is not Neighbor nor Pre-Auth */ 450 { /* Pre-Auth APs are the second priority to Roam */ 621 /* No Pre-Auth is required */ 784 { /* No Pre-Auth is required */ 787 TRACE0(pRoamingMngr->hReport, REPORT_SEVERITY_INFORMATION, "roamingMngr_smStartIdle, Pre-Auth to cur AP\n");
|
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
admCtrl.c | 846 /* This table presents supported pairs of auth.mode/cipher type */ 876 * I - authEncrCapability - ptr to list of auth.mode/cipher pairs \n 894 /* of auth/encr pairs */ 899 TRACE2(pAdmCtrl->hReport, REPORT_SEVERITY_INFORMATION, "admCtrl get AuthEncr capability: No. of auth/encr pairs = %d, No of PMKIDs = %d \n", authEncrCapability->NoOfAuthEncrPairSupported, authEncrCapability->NoOfPMKIDs); 901 /* Copy the hardcoded table of the auth.mode/cipher type */ 909 TRACE3(pAdmCtrl->hReport, REPORT_SEVERITY_INFORMATION, "admCtrl get AuthEncr pair list: i = %d, auth mode = %d , cipher suite = %d \n", i, authEncrCapability->authEncrPairs[i].authenticationMode, authEncrCapability->authEncrPairs[i].cipherSuite);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/ |
admCtrl.c | 830 /* This table presents supported pairs of auth.mode/cipher type */ 860 * I - authEncrCapability - ptr to list of auth.mode/cipher pairs \n 878 /* of auth/encr pairs */ 884 ("admCtrl get AuthEncr capability: No. of auth/encr pairs = %d, No of PMKIDs = %d \n", 887 /* Copy the hardcoded table of the auth.mode/cipher type */ 896 ("admCtrl get AuthEncr pair list: i = %d, auth mode = %d , cipher suite = %d \n", i,
|
/system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/ |
admCtrl.c | 834 /* This table presents supported pairs of auth.mode/cipher type */ 864 * I - authEncrCapability - ptr to list of auth.mode/cipher pairs \n 882 /* of auth/encr pairs */ 887 TRACE2(pAdmCtrl->hReport, REPORT_SEVERITY_INFORMATION, "admCtrl get AuthEncr capability: No. of auth/encr pairs = %d, No of PMKIDs = %d \n", authEncrCapability->NoOfAuthEncrPairSupported, authEncrCapability->NoOfPMKIDs); 889 /* Copy the hardcoded table of the auth.mode/cipher type */ 897 TRACE3(pAdmCtrl->hReport, REPORT_SEVERITY_INFORMATION, "admCtrl get AuthEncr pair list: i = %d, auth mode = %d , cipher suite = %d \n", i, authEncrCapability->authEncrPairs[i].authenticationMode, authEncrCapability->authEncrPairs[i].cipherSuite);
|
/prebuilt/sdk/5/ |
android.jar | |
/external/wpa_supplicant/ |
radius_client.c | 92 int sock, int sock6, int auth); 739 int sock, int sock6, int auth) 754 auth ? "Authentication" : "Accounting", 768 if (auth) 779 if ((auth && entry->msg_type != RADIUS_AUTH) || 780 (!auth && entry->msg_type != RADIUS_ACCT)) 824 if (auth)
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius_client.c | 93 int sock, int sock6, int auth); 740 int sock, int sock6, int auth) 756 auth ? "Authentication" : "Accounting", 770 if (auth) 781 if ((auth && entry->msg_type != RADIUS_AUTH) || 782 (!auth && entry->msg_type != RADIUS_ACCT)) 880 if (auth) [all...] |