/external/openssl/ssl/ |
kssl.c | 59 /* ssl/kssl.c -- Routines to support (& debug) Kerberos5 auth for openssl 1998 KRB5_AUTHENTBODY *auth = NULL; local [all...] |
/external/tcpdump/ |
print-ppp.c | 193 "Auth-Prot", /* (3) */ 214 "LCP-Auth-Opt", /* (24) */ 329 /* Auth Algorithms */ 354 #define CALLBACK_AUTH 0 /* Location determined by user auth */ 393 { PAP_AREQ, "Auth-Req" }, 394 { PAP_AACK, "Auth-ACK" }, 395 { PAP_ANAK, "Auth-NACK" }, 647 printf("%s", tok2str(ppptype2str,"Unknown Auth Proto (0x04x)",EXTRACT_16BITS(p+2))); 652 printf(", %s",tok2str(authalg_values,"Unknown Auth Alg %u",p[4])); [all...] |
/external/bluetooth/bluez/rfcomm/ |
main.c | 57 static int auth = 0; variable 502 if (auth) 712 "\t-A, --auth Enable authentication\n" 734 { "auth", 0, 0, 'A' }, 775 auth = 1;
|
/frameworks/base/obex/javax/obex/ |
ServerSession.java | 67 * @param auth the authenticator to use with this connection 71 public ServerSession(ObexTransport trans, ServerRequestHandler handler, Authenticator auth) 73 mAuthenticator = auth; 323 // the Auth chan is initiated by the server, client sent back the authResp . 335 // the Auth challenge is initiated by the client
|
/hardware/broadcom/wlan/bcm4329/src/dhd/sys/ |
dhd_common.c | 479 {WLC_E_AUTH, "AUTH"}, 625 sprintf(err_msg, "AUTH unknown: %d", (int)auth_type); 762 DHD_EVENT(("MACEVENT: %s %d, MAC %s, status %d, reason %d, auth %d\n", 834 /* push up to external supp/auth */ 854 /* push up to external supp/auth */
|
/dalvik/libcore/security/src/main/java/java/security/ |
KeyStoreSpi.java | 28 import javax.security.auth.callback.CallbackHandler; 29 import javax.security.auth.callback.PasswordCallback; 519 .getProperty("auth.login.defaultCallbackHandler"); //$NON-NLS-1$
|
/external/ipsec-tools/src/racoon/ |
handler.h | 126 vchar_t *authstr; /* place holder of string for auth. */ 369 * check auth, integrity. 384 * check auth, integrity.
|
/external/ppp/pppd/plugins/radius/ |
avpair.c | 152 VALUE_PAIR *rc_avpair_gen (AUTH_HDR *auth) 170 ptr = auth->data; 171 length = ntohs ((unsigned short) auth->length) - AUTH_HDR_LEN;
|
/external/wpa_supplicant/ |
driver_broadcom.c | 524 int auth = 0; local 575 broadcom_ioctl(drv, WLC_SET_AUTH, &auth, sizeof(auth)) < 0 ||
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_broadcom.c | 529 int auth = 0; local 580 broadcom_ioctl(drv, WLC_SET_AUTH, &auth, sizeof(auth)) < 0 ||
|
/hardware/msm7k/librpc/rpc/ |
types.h | 226 /* Auth types */ 259 oncrpc_auth_types oa_flavor; /* flavor of auth */ 260 caddr_t oa_base; /* address of more auth stuff */
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/Application/Roaming/ |
roamingMngr.c | 175 neighbor APs, pre-auth APs and other APs */ [all...] |
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/Auth/ |
authSm.c | 369 if (pFrame->subType != AUTH) 375 if (pFrame->content.auth.status != STATUS_SUCCESSFUL) 624 status = mlmeBuilder_sendFrame(pCtx->hMlme, AUTH, authMsg, len, wepOpt);
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 715 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); 716 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); 717 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); 885 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8); 886 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8); [all...] |
/dalvik/libcore/security/src/test/java/tests/api/java/security/ |
AccessControlContextTest.java | 38 import javax.security.auth.Subject; 39 import javax.security.auth.SubjectDomainCombiner;
|
/development/samples/SampleSyncAdapter/src/com/example/android/samplesync/client/ |
NetworkUtilities.java | 31 import org.apache.http.auth.AuthenticationException; 64 public static final String AUTH_URI = BASE_URL + "/auth";
|
/external/apache-http/src/org/apache/http/auth/ |
AuthScope.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthScope.java $ 31 package org.apache.http.auth;
|
/external/dbus/doc/ |
dbus-test-plan.xml | 135 ## this tests a successful auth of type EXTERNAL 138 SEND 'AUTH EXTERNAL USERNAME_HEX'
|
/external/dropbear/ |
cli-runopts.c | 54 "-f Run in background after auth\n" 333 /* no username portion, the cli-auth.c code can figure the
|
common-session.c | 176 /* check for auth timeout, rekeying required etc */ 369 dropbear_close("Timeout before auth");
|
svr-main.c | 213 /* close fds which have been authed or closed - svr-auth.c handles 214 * closing the auth sockets on success */
|
/external/bluetooth/bluez/src/ |
adapter.c | 2984 struct service_auth *auth = user_data; local 2996 struct service_auth *auth; local [all...] |
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
admCtrlWpa2.c | [all...] |
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/ |
mlmeParser.c | 68 #include "Auth/authSm.h" 675 case AUTH: 676 /* Auth response frame is should be directed to our STA, and from the current AP */ 681 pHandle->tempFrameInfo.frame.content.auth.authAlgo = ENDIAN_HANDLE_WORD(*(UINT16*)pData); 684 pHandle->tempFrameInfo.frame.content.auth.seqNum = ENDIAN_HANDLE_WORD(*(UINT16*)pData); 687 pHandle->tempFrameInfo.frame.content.auth.status = ENDIAN_HANDLE_WORD(*(UINT16*)pData); 691 ("MLME_PARSER: Read Auth: algo=%d, seq=%d, status=%d\n", 692 pHandle->tempFrameInfo.frame.content.auth.authAlgo, 693 pHandle->tempFrameInfo.frame.content.auth.seqNum, 694 pHandle->tempFrameInfo.frame.content.auth.status)) [all...] |
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/ |
admCtrlWpa2.c | [all...] |