HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 301 - 325 of 707) sorted by null

<<11121314151617181920>>

  /external/openssl/ssl/
kssl.c 59 /* ssl/kssl.c -- Routines to support (& debug) Kerberos5 auth for openssl
1998 KRB5_AUTHENTBODY *auth = NULL; local
    [all...]
  /external/tcpdump/
print-ppp.c 193 "Auth-Prot", /* (3) */
214 "LCP-Auth-Opt", /* (24) */
329 /* Auth Algorithms */
354 #define CALLBACK_AUTH 0 /* Location determined by user auth */
393 { PAP_AREQ, "Auth-Req" },
394 { PAP_AACK, "Auth-ACK" },
395 { PAP_ANAK, "Auth-NACK" },
647 printf("%s", tok2str(ppptype2str,"Unknown Auth Proto (0x04x)",EXTRACT_16BITS(p+2)));
652 printf(", %s",tok2str(authalg_values,"Unknown Auth Alg %u",p[4]));
    [all...]
  /external/bluetooth/bluez/rfcomm/
main.c 57 static int auth = 0; variable
502 if (auth)
712 "\t-A, --auth Enable authentication\n"
734 { "auth", 0, 0, 'A' },
775 auth = 1;
  /frameworks/base/obex/javax/obex/
ServerSession.java 67 * @param auth the authenticator to use with this connection
71 public ServerSession(ObexTransport trans, ServerRequestHandler handler, Authenticator auth)
73 mAuthenticator = auth;
323 // the Auth chan is initiated by the server, client sent back the authResp .
335 // the Auth challenge is initiated by the client
  /hardware/broadcom/wlan/bcm4329/src/dhd/sys/
dhd_common.c 479 {WLC_E_AUTH, "AUTH"},
625 sprintf(err_msg, "AUTH unknown: %d", (int)auth_type);
762 DHD_EVENT(("MACEVENT: %s %d, MAC %s, status %d, reason %d, auth %d\n",
834 /* push up to external supp/auth */
854 /* push up to external supp/auth */
  /dalvik/libcore/security/src/main/java/java/security/
KeyStoreSpi.java 28 import javax.security.auth.callback.CallbackHandler;
29 import javax.security.auth.callback.PasswordCallback;
519 .getProperty("auth.login.defaultCallbackHandler"); //$NON-NLS-1$
  /external/ipsec-tools/src/racoon/
handler.h 126 vchar_t *authstr; /* place holder of string for auth. */
369 * check auth, integrity.
384 * check auth, integrity.
  /external/ppp/pppd/plugins/radius/
avpair.c 152 VALUE_PAIR *rc_avpair_gen (AUTH_HDR *auth)
170 ptr = auth->data;
171 length = ntohs ((unsigned short) auth->length) - AUTH_HDR_LEN;
  /external/wpa_supplicant/
driver_broadcom.c 524 int auth = 0; local
575 broadcom_ioctl(drv, WLC_SET_AUTH, &auth, sizeof(auth)) < 0 ||
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_broadcom.c 529 int auth = 0; local
580 broadcom_ioctl(drv, WLC_SET_AUTH, &auth, sizeof(auth)) < 0 ||
  /hardware/msm7k/librpc/rpc/
types.h 226 /* Auth types */
259 oncrpc_auth_types oa_flavor; /* flavor of auth */
260 caddr_t oa_base; /* address of more auth stuff */
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/Application/Roaming/
roamingMngr.c 175 neighbor APs, pre-auth APs and other APs */
    [all...]
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/Auth/
authSm.c 369 if (pFrame->subType != AUTH)
375 if (pFrame->content.auth.status != STATUS_SUCCESSFUL)
624 status = mlmeBuilder_sendFrame(pCtx->hMlme, AUTH, authMsg, len, wepOpt);
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 715 os_memcpy(buf, stk->u.auth.tx_mic_key, 8);
716 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8);
717 os_memcpy(stk->u.auth.rx_mic_key, buf, 8);
885 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8);
886 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);
    [all...]
  /dalvik/libcore/security/src/test/java/tests/api/java/security/
AccessControlContextTest.java 38 import javax.security.auth.Subject;
39 import javax.security.auth.SubjectDomainCombiner;
  /development/samples/SampleSyncAdapter/src/com/example/android/samplesync/client/
NetworkUtilities.java 31 import org.apache.http.auth.AuthenticationException;
64 public static final String AUTH_URI = BASE_URL + "/auth";
  /external/apache-http/src/org/apache/http/auth/
AuthScope.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthScope.java $
31 package org.apache.http.auth;
  /external/dbus/doc/
dbus-test-plan.xml 135 ## this tests a successful auth of type EXTERNAL
138 SEND 'AUTH EXTERNAL USERNAME_HEX'
  /external/dropbear/
cli-runopts.c 54 "-f Run in background after auth\n"
333 /* no username portion, the cli-auth.c code can figure the
common-session.c 176 /* check for auth timeout, rekeying required etc */
369 dropbear_close("Timeout before auth");
svr-main.c 213 /* close fds which have been authed or closed - svr-auth.c handles
214 * closing the auth sockets on success */
  /external/bluetooth/bluez/src/
adapter.c 2984 struct service_auth *auth = user_data; local
2996 struct service_auth *auth; local
    [all...]
  /hardware/ti/wlan/wl1271/stad/src/Connection_Managment/
admCtrlWpa2.c     [all...]
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/
mlmeParser.c 68 #include "Auth/authSm.h"
675 case AUTH:
676 /* Auth response frame is should be directed to our STA, and from the current AP */
681 pHandle->tempFrameInfo.frame.content.auth.authAlgo = ENDIAN_HANDLE_WORD(*(UINT16*)pData);
684 pHandle->tempFrameInfo.frame.content.auth.seqNum = ENDIAN_HANDLE_WORD(*(UINT16*)pData);
687 pHandle->tempFrameInfo.frame.content.auth.status = ENDIAN_HANDLE_WORD(*(UINT16*)pData);
691 ("MLME_PARSER: Read Auth: algo=%d, seq=%d, status=%d\n",
692 pHandle->tempFrameInfo.frame.content.auth.authAlgo,
693 pHandle->tempFrameInfo.frame.content.auth.seqNum,
694 pHandle->tempFrameInfo.frame.content.auth.status))
    [all...]
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/
admCtrlWpa2.c     [all...]

Completed in 473 milliseconds

<<11121314151617181920>>