/ndk/build/platforms/android-8/arch-x86/usr/include/netinet/ |
ip_icmp.h | 200 #define ICMP_PHOTURIS_AUTH_FAILED 2 /* auth failed */
|
/packages/apps/Email/src/com/android/exchange/ |
EasOutboxService.java | 154 // We mark the result as SUCCESS on a non-auth failure since the message itself is
|
/packages/apps/Gallery3D/src/com/cooliris/picasa/ |
GDataClient.java | 136 request.addHeader("Authorization", "GoogleLogin auth=" + authToken);
|
PicasaContentProvider.java | 559 for (PicasaApi.AuthAccount auth : authAccounts) { 560 if (auth.user.equals(user)) { 561 api.setAuth(auth);
|
/system/wlan/ti/wilink_6_1/Test/ |
siteMgrDebug.c | [all...] |
/system/wlan/ti/wilink_6_1/stad/Export_Inc/ |
InternalCmdCodes.h | 108 /* Auth section */
|
/external/ipsec-tools/src/libipsec/ |
key_debug.c | 229 printf("sadb_comb{ auth=%u encrypt=%u " 364 printf(" auth=%u encrypt=%u flags=0x%08x }\n", 664 printf(" refcnt=%u state=%u auth=%u enc=%u\n",
|
/external/kernel-headers/original/linux/ |
usb_ch9.h | 425 #define USB_ENC_TYPE_RSA_1 3 /* rsa3072/sha1 auth */ 548 USB_STATE_UNAUTHENTICATED, /* auth */ 549 USB_STATE_RECONNECTING, /* auth */
|
/external/wpa_supplicant/ |
eapol_test.c | 798 wpa_printf(MSG_DEBUG, "UMTS auth completed successfully"); 803 wpa_printf(MSG_DEBUG, "UMTS auth resulted in synchronization " 807 wpa_printf(MSG_DEBUG, "UMTS auth failed");
|
mlme.c | 99 } STRUCT_PACKED auth; member in union:ieee80211_mgmt::__anon6738 602 "auth frame"); 616 mgmt->u.auth.auth_alg = host_to_le16(wpa_s->mlme.auth_alg); 617 mgmt->u.auth.auth_transaction = host_to_le16(transaction); 619 mgmt->u.auth.status_code = host_to_le16(0); 1040 wpa_printf(MSG_DEBUG, "MLME: replying to auth challenge"); 1041 pos = mgmt->u.auth.variable; 1044 wpa_printf(MSG_DEBUG, "MLME: failed to parse Auth(challenge)"); 1049 "auth frame"); 1098 auth_alg = le_to_host16(mgmt->u.auth.auth_alg) [all...] |
eap_ttls.c | 103 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 106 } else if (os_strstr(config->phase2, "auth=MSCHAP")) { 109 } else if (os_strstr(config->phase2, "auth=PAP")) { 112 } else if (os_strstr(config->phase2, "auth=CHAP")) { 1118 /* EAP-TTLS does not use Phase2 on fast re-auth; this must be [all...] |
wpa_supplicant.conf | 380 # (string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or 493 # phase2="auth=MSCHAPV2" 520 # phase2="auth=MSCHAPV2"
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 108 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth Request 427 * wpa_ft_prepare_auth_request - Generate over-the-air auth request 842 * wpa_ft_start_over_ds - Generate over-the-DS auth request
|
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
connInfra.c | 530 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the 572 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the [all...] |
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/sme/conn/ |
connInfra.c | 544 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the 585 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the [all...] |
/system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/ |
connInfra.c | 518 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the 556 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the [all...] |
/external/ppp/pppd/ |
ccp.c | 546 * Start with a basic sanity check: mschap[v2] auth must be in 555 /* Leave only the mschap auth bits set */ 566 error("MPPE required, but auth done in both directions."); 571 error("MPPE required, but MS-CHAP[v2] auth not performed."); 584 /* LM auth not supported for MPPE */ [all...] |
chap_ms.c | 213 notice("Peer request for LANMAN auth not supported"); 260 /* Generate the expected response and our mutual auth. */ 270 * <auth_string> is the Authenticator Response (mutual auth)
|
pppd.h | 81 #define MAXNAMELEN 256 /* max length of hostname or name for auth */ 225 extern int auth_done[NUM_PPP]; /* Methods actually used for auth */ 525 /* Procedures exported from auth.c */ [all...] |
/external/dbus/ |
ChangeLog | 784 do the default check that the auth identity matches the bus identity [all...] |
NEWS | 183 - auth EXTERNAL now supported on BSD varients 272 - --with-console-auth-dir added to configure scripts for configuring the 530 the SHA-1 auth mechanism
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ndis.c | [all...] |
/external/dbus/bus/ |
config-parser.c | 115 DBusList *mechanisms; /**< Auth mechanisms */ 152 return "auth"; 474 * and legitimate auth will fail. If interactive auth (ask user for 780 else if (strcmp (element_name, "auth") == 0) 782 if (!check_no_attributes (parser, "auth", attribute_names, attribute_values, error)) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
eapol_test.c | 874 wpa_printf(MSG_DEBUG, "UMTS auth completed successfully"); 879 wpa_printf(MSG_DEBUG, "UMTS auth resulted in synchronization " 883 wpa_printf(MSG_DEBUG, "UMTS auth failed");
|
/hardware/ti/wlan/wl1271/stad/src/Application/ |
roamingMngr.c | [all...] |