/external/wpa_supplicant/ |
driver_ndis.c | [all...] |
l2_packet_ndis.c | 52 * fake support for two (EAPOL and RSN pre-auth) by switching to pre-auth
|
/frameworks/base/core/java/android/content/ |
SyncStorageEngine.java | 722 + " auth=" + op.authority 753 + " auth=" + op.authority 850 for (AuthorityInfo auth : acc.authorities.values()) { 851 removing.put(auth.ident, auth); [all...] |
/hardware/ti/wlan/wl1271/stad/src/Sta_Management/ |
mlmeParser.c | 680 case AUTH: 681 /* Auth response frame is should be directed to our STA, and from the current AP */ 686 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.authAlgo , pData); 689 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.seqNum , pData); 692 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.status , pData); 695 TRACE3(pHandle->hReport, REPORT_SEVERITY_INFORMATION, "MLME_PARSER: Read Auth: algo=%d, seq=%d, status=%d\n", pHandle->tempFrameInfo.frame.content.auth.authAlgo, pHandle->tempFrameInfo.frame.content.auth.seqNum, pHandle->tempFrameInfo.frame.content.auth.status); 698 pHandle->tempFrameInfo.frame.content.auth.pChallenge = &(pHandle->tempFrameInfo.challenge) [all...] |
/system/wlan/ti/wilink_6_1/stad/src/Sta_Management/ |
mlmeParser.c | 679 case AUTH: 680 /* Auth response frame is should be directed to our STA, and from the current AP */ 685 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.authAlgo , pData); 688 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.seqNum , pData); 691 COPY_WLAN_WORD(&pHandle->tempFrameInfo.frame.content.auth.status , pData); 694 TRACE3(pHandle->hReport, REPORT_SEVERITY_INFORMATION, "MLME_PARSER: Read Auth: algo=%d, seq=%d, status=%d\n", pHandle->tempFrameInfo.frame.content.auth.authAlgo, pHandle->tempFrameInfo.frame.content.auth.seqNum, pHandle->tempFrameInfo.frame.content.auth.status); 697 pHandle->tempFrameInfo.frame.content.auth.pChallenge = &(pHandle->tempFrameInfo.challenge) [all...] |
/dalvik/libcore/security/src/test/java/tests/security/cert/ |
TrustAnchorTest.java | 44 import javax.security.auth.x500.X500Principal; 204 args = {javax.security.auth.x500.X500Principal.class, java.security.PublicKey.class, byte[].class} 233 args = {javax.security.auth.x500.X500Principal.class, java.security.PublicKey.class, byte[].class} 256 args = {javax.security.auth.x500.X500Principal.class, java.security.PublicKey.class, byte[].class} 287 args = {javax.security.auth.x500.X500Principal.class, java.security.PublicKey.class, byte[].class} [all...] |
/external/ipsec-tools/src/racoon/ |
ipsec_doi.c | 314 plog(LLV_DEBUG, LOCATION, NULL, "agreed on %s auth.\n", [all...] |
/external/opencore/protocols/sdp/parser/src/ |
basemediainfoparser.cpp | 673 if (!oscl_strncmp(sptr, "auth-tag-len=", oscl_strlen("auth-tag-len="))) 675 sptr = sptr + oscl_strlen("auth-tag-len="); 679 PVMF_SDP_PARSER_LOGERROR((0, "SDPBaseMediaInfoParser::parseMediaInfo - Bad a=3GPP-SRTP-Config: line format for auth- (…) [all...] |
/external/dnsmasq/src/ |
rfc1035.c | 1141 int nxdomain = 0, auth = 1, trunc = 0; local 1280 auth = 0; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
mlme.c | 243 "auth frame"); 257 mgmt->u.auth.auth_alg = host_to_le16(wpa_s->mlme.auth_alg); 258 mgmt->u.auth.auth_transaction = host_to_le16(transaction); 260 mgmt->u.auth.status_code = host_to_le16(0); 745 wpa_printf(MSG_DEBUG, "MLME: replying to auth challenge"); 746 pos = mgmt->u.auth.variable; 749 wpa_printf(MSG_DEBUG, "MLME: failed to parse Auth(challenge)"); 754 "auth frame"); 803 auth_alg = le_to_host16(mgmt->u.auth.auth_alg); 804 auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction) [all...] |
/frameworks/base/docs/html/ |
sitemap.txt | 260 http://developer.android.com/reference/javax/security/auth/package-summary.html 261 http://developer.android.com/reference/javax/security/auth/callback/package-summary.html 262 http://developer.android.com/reference/javax/security/auth/login/package-summary.html 263 http://developer.android.com/reference/javax/security/auth/x500/package-summary.html 271 http://developer.android.com/reference/org/apache/http/auth/package-summary.html 272 http://developer.android.com/reference/org/apache/http/auth/params/package-summary.html 289 http://developer.android.com/reference/org/apache/http/impl/auth/package-summary.html [all...] |
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/fortress/ |
DefaultPolicy.java | 86 * the Principal is assumed to be javax.security.auth.x500.X500Principal with a 126 * <i>javax.security.auth.x500.X500Principal " <i>DN </i>" </i>
|
/development/apps/Development/src/com/android/development/ |
AccountsTester.java | 283 new CallbackToDialog(AccountsTester.this, "get auth token"), 366 getAndLogResult(future, "get auth token");
|
/external/ppp/pppd/plugins/ |
winbind.c | 269 int authenticated = NOT_AUTHENTICATED; /* not auth */ 576 notice("Peer request for LANMAN auth not supported");
|
/external/tcpdump/ |
print-bfd.c | 94 * | Auth Type | Auth Len | Authentication Data... |
|
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/ |
l2_packet_ndis.c | 52 * fake support for two (EAPOL and RSN pre-auth) by switching to pre-auth
|
/frameworks/base/docs/html/guide/topics/manifest/ |
provider-element.jd | 6 <dd><pre class="stx"><provider android:<a href="#auth">authorities</a>="<i>list</i>" 65 <dt><a name="auth"></a>{@code android:authorities}</dt>
|
/hardware/ti/wlan/wl1271/CUDK/os/linux/src/ |
ipc_event.c | 156 os_error_printf(CU_MSG_ERROR, "CLI Event - Disassociated due to no Auth response \n"); 160 os_error_printf(CU_MSG_ERROR, "CLI Event - Disassociated due to Auth response packet with reason = %d\n", pDisAssoc->uStatusCode);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/utils/ |
report.c | 121 os_memoryCopy(hOs, (void *)(pReport->moduleDesc[AUTH_MODULE_LOG]), "AUTH ", sizeof("AUTH "));
|
/system/wlan/ti/wilink_6_1/CUDK/os/linux/src/ |
ipc_event.c | 156 os_error_printf(CU_MSG_ERROR, "CLI Event - Disassociated due to no Auth response \n"); 160 os_error_printf(CU_MSG_ERROR, "CLI Event - Disassociated due to Auth response packet with reason = %d\n", pDisAssoc->uStatusCode);
|
/bionic/libc/include/netinet/ |
ip_icmp.h | 200 #define ICMP_PHOTURIS_AUTH_FAILED 2 /* auth failed */
|
/dalvik/libcore/security/src/main/java/java/security/cert/ |
X509CRL.java | 35 import javax.security.auth.x500.X500Principal;
|
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/provider/cert/ |
X509CRLEntryImpl.java | 31 import javax.security.auth.x500.X500Principal;
|
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 40 import javax.security.auth.x500.X500Principal;
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPath.java | 23 import javax.security.auth.x500.X500Principal;
|