HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 376 - 400 of 707) sorted by null

<<11121314151617181920>>

  /external/wpa_supplicant/
driver_ndis.c     [all...]
l2_packet_ndis.c 52 * fake support for two (EAPOL and RSN pre-auth) by switching to pre-auth
  /frameworks/base/core/java/android/content/
SyncStorageEngine.java 722 + " auth=" + op.authority
753 + " auth=" + op.authority
850 for (AuthorityInfo auth : acc.authorities.values()) {
851 removing.put(auth.ident, auth);
    [all...]
  /hardware/ti/wlan/wl1271/stad/src/Sta_Management/
mlmeParser.c 680 case AUTH:
681 /* Auth response frame is should be directed to our STA, and from the current AP */
686 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.authAlgo , pData);
689 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.seqNum , pData);
692 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.status , pData);
695 TRACE3(pHandle->hReport, REPORT_SEVERITY_INFORMATION, "MLME_PARSER: Read Auth: algo=%d, seq=%d, status=%d\n", pHandle->tempFrameInfo.frame.content.auth.authAlgo, pHandle->tempFrameInfo.frame.content.auth.seqNum, pHandle->tempFrameInfo.frame.content.auth.status);
698 pHandle->tempFrameInfo.frame.content.auth.pChallenge = &(pHandle->tempFrameInfo.challenge)
    [all...]
  /system/wlan/ti/wilink_6_1/stad/src/Sta_Management/
mlmeParser.c 679 case AUTH:
680 /* Auth response frame is should be directed to our STA, and from the current AP */
685 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.authAlgo , pData);
688 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.seqNum , pData);
691 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.status , pData);
694 TRACE3(pHandle->hReport, REPORT_SEVERITY_INFORMATION, "MLME_PARSER: Read Auth: algo=%d, seq=%d, status=%d\n", pHandle->tempFrameInfo.frame.content.auth.authAlgo, pHandle->tempFrameInfo.frame.content.auth.seqNum, pHandle->tempFrameInfo.frame.content.auth.status);
697 pHandle->tempFrameInfo.frame.content.auth.pChallenge = &(pHandle->tempFrameInfo.challenge)
    [all...]
  /dalvik/libcore/security/src/test/java/tests/security/cert/
TrustAnchorTest.java 44 import javax.security.auth.x500.X500Principal;
204 args = {javax.security.auth.x500.X500Principal.class, java.security.PublicKey.class, byte[].class}
233 args = {javax.security.auth.x500.X500Principal.class, java.security.PublicKey.class, byte[].class}
256 args = {javax.security.auth.x500.X500Principal.class, java.security.PublicKey.class, byte[].class}
287 args = {javax.security.auth.x500.X500Principal.class, java.security.PublicKey.class, byte[].class}
    [all...]
  /external/ipsec-tools/src/racoon/
ipsec_doi.c 314 plog(LLV_DEBUG, LOCATION, NULL, "agreed on %s auth.\n",
    [all...]
  /external/opencore/protocols/sdp/parser/src/
basemediainfoparser.cpp 673 if (!oscl_strncmp(sptr, "auth-tag-len=", oscl_strlen("auth-tag-len=")))
675 sptr = sptr + oscl_strlen("auth-tag-len=");
679 PVMF_SDP_PARSER_LOGERROR((0, "SDPBaseMediaInfoParser::parseMediaInfo - Bad a=3GPP-SRTP-Config: line format for auth- (…)
    [all...]
  /external/dnsmasq/src/
rfc1035.c 1141 int nxdomain = 0, auth = 1, trunc = 0; local
1280 auth = 0;
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
mlme.c 243 "auth frame");
257 mgmt->u.auth.auth_alg = host_to_le16(wpa_s->mlme.auth_alg);
258 mgmt->u.auth.auth_transaction = host_to_le16(transaction);
260 mgmt->u.auth.status_code = host_to_le16(0);
745 wpa_printf(MSG_DEBUG, "MLME: replying to auth challenge");
746 pos = mgmt->u.auth.variable;
749 wpa_printf(MSG_DEBUG, "MLME: failed to parse Auth(challenge)");
754 "auth frame");
803 auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
804 auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction)
    [all...]
  /frameworks/base/docs/html/
sitemap.txt 260 http://developer.android.com/reference/javax/security/auth/package-summary.html
261 http://developer.android.com/reference/javax/security/auth/callback/package-summary.html
262 http://developer.android.com/reference/javax/security/auth/login/package-summary.html
263 http://developer.android.com/reference/javax/security/auth/x500/package-summary.html
271 http://developer.android.com/reference/org/apache/http/auth/package-summary.html
272 http://developer.android.com/reference/org/apache/http/auth/params/package-summary.html
289 http://developer.android.com/reference/org/apache/http/impl/auth/package-summary.html
    [all...]
  /dalvik/libcore/security/src/main/java/org/apache/harmony/security/fortress/
DefaultPolicy.java 86 * the Principal is assumed to be javax.security.auth.x500.X500Principal with a
126 * <i>javax.security.auth.x500.X500Principal &quot; <i>DN </i>&quot; </i>
  /development/apps/Development/src/com/android/development/
AccountsTester.java 283 new CallbackToDialog(AccountsTester.this, "get auth token"),
366 getAndLogResult(future, "get auth token");
  /external/ppp/pppd/plugins/
winbind.c 269 int authenticated = NOT_AUTHENTICATED; /* not auth */
576 notice("Peer request for LANMAN auth not supported");
  /external/tcpdump/
print-bfd.c 94 * | Auth Type | Auth Len | Authentication Data... |
  /external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/
l2_packet_ndis.c 52 * fake support for two (EAPOL and RSN pre-auth) by switching to pre-auth
  /frameworks/base/docs/html/guide/topics/manifest/
provider-element.jd 6 <dd><pre class="stx">&lt;provider android:<a href="#auth">authorities</a>="<i>list</i>"
65 <dt><a name="auth"></a>{@code android:authorities}</dt>
  /hardware/ti/wlan/wl1271/CUDK/os/linux/src/
ipc_event.c 156 os_error_printf(CU_MSG_ERROR, "CLI Event - Disassociated due to no Auth response \n");
160 os_error_printf(CU_MSG_ERROR, "CLI Event - Disassociated due to Auth response packet with reason = %d\n", pDisAssoc->uStatusCode);
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/utils/
report.c 121 os_memoryCopy(hOs, (void *)(pReport->moduleDesc[AUTH_MODULE_LOG]), "AUTH ", sizeof("AUTH "));
  /system/wlan/ti/wilink_6_1/CUDK/os/linux/src/
ipc_event.c 156 os_error_printf(CU_MSG_ERROR, "CLI Event - Disassociated due to no Auth response \n");
160 os_error_printf(CU_MSG_ERROR, "CLI Event - Disassociated due to Auth response packet with reason = %d\n", pDisAssoc->uStatusCode);
  /bionic/libc/include/netinet/
ip_icmp.h 200 #define ICMP_PHOTURIS_AUTH_FAILED 2 /* auth failed */
  /dalvik/libcore/security/src/main/java/java/security/cert/
X509CRL.java 35 import javax.security.auth.x500.X500Principal;
  /dalvik/libcore/security/src/main/java/org/apache/harmony/security/provider/cert/
X509CRLEntryImpl.java 31 import javax.security.auth.x500.X500Principal;
  /dalvik/libcore/security/src/main/java/org/apache/harmony/security/utils/
JarUtils.java 40 import javax.security.auth.x500.X500Principal;
  /dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/
PKIXCertPath.java 23 import javax.security.auth.x500.X500Principal;

Completed in 190 milliseconds

<<11121314151617181920>>