HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 426 - 450 of 707) sorted by null

<<11121314151617181920>>

  /ndk/build/platforms/android-8/arch-x86/usr/include/netinet/
ip_icmp.h 200 #define ICMP_PHOTURIS_AUTH_FAILED 2 /* auth failed */
  /packages/apps/Email/src/com/android/exchange/
EasOutboxService.java 154 // We mark the result as SUCCESS on a non-auth failure since the message itself is
  /packages/apps/Gallery3D/src/com/cooliris/picasa/
GDataClient.java 136 request.addHeader("Authorization", "GoogleLogin auth=" + authToken);
PicasaContentProvider.java 559 for (PicasaApi.AuthAccount auth : authAccounts) {
560 if (auth.user.equals(user)) {
561 api.setAuth(auth);
  /system/wlan/ti/wilink_6_1/Test/
siteMgrDebug.c     [all...]
  /system/wlan/ti/wilink_6_1/stad/Export_Inc/
InternalCmdCodes.h 108 /* Auth section */
  /external/ipsec-tools/src/libipsec/
key_debug.c 229 printf("sadb_comb{ auth=%u encrypt=%u "
364 printf(" auth=%u encrypt=%u flags=0x%08x }\n",
664 printf(" refcnt=%u state=%u auth=%u enc=%u\n",
  /external/kernel-headers/original/linux/
usb_ch9.h 425 #define USB_ENC_TYPE_RSA_1 3 /* rsa3072/sha1 auth */
548 USB_STATE_UNAUTHENTICATED, /* auth */
549 USB_STATE_RECONNECTING, /* auth */
  /external/wpa_supplicant/
eapol_test.c 798 wpa_printf(MSG_DEBUG, "UMTS auth completed successfully");
803 wpa_printf(MSG_DEBUG, "UMTS auth resulted in synchronization "
807 wpa_printf(MSG_DEBUG, "UMTS auth failed");
mlme.c 99 } STRUCT_PACKED auth; member in union:ieee80211_mgmt::__anon6738
602 "auth frame");
616 mgmt->u.auth.auth_alg = host_to_le16(wpa_s->mlme.auth_alg);
617 mgmt->u.auth.auth_transaction = host_to_le16(transaction);
619 mgmt->u.auth.status_code = host_to_le16(0);
1040 wpa_printf(MSG_DEBUG, "MLME: replying to auth challenge");
1041 pos = mgmt->u.auth.variable;
1044 wpa_printf(MSG_DEBUG, "MLME: failed to parse Auth(challenge)");
1049 "auth frame");
1098 auth_alg = le_to_host16(mgmt->u.auth.auth_alg)
    [all...]
eap_ttls.c 103 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) {
106 } else if (os_strstr(config->phase2, "auth=MSCHAP")) {
109 } else if (os_strstr(config->phase2, "auth=PAP")) {
112 } else if (os_strstr(config->phase2, "auth=CHAP")) {
1118 /* EAP-TTLS does not use Phase2 on fast re-auth; this must be
    [all...]
wpa_supplicant.conf 380 # (string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or
493 # phase2="auth=MSCHAPV2"
520 # phase2="auth=MSCHAPV2"
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 108 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth Request
427 * wpa_ft_prepare_auth_request - Generate over-the-air auth request
842 * wpa_ft_start_over_ds - Generate over-the-DS auth request
  /hardware/ti/wlan/wl1271/stad/src/Connection_Managment/
connInfra.c 530 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the
572 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the
    [all...]
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/sme/conn/
connInfra.c 544 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the
585 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the
    [all...]
  /system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/
connInfra.c 518 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the
556 /* Must be called AFTER mlme_stop. since De-Auth packet should be sent with the
    [all...]
  /external/ppp/pppd/
ccp.c 546 * Start with a basic sanity check: mschap[v2] auth must be in
555 /* Leave only the mschap auth bits set */
566 error("MPPE required, but auth done in both directions.");
571 error("MPPE required, but MS-CHAP[v2] auth not performed.");
584 /* LM auth not supported for MPPE */
    [all...]
chap_ms.c 213 notice("Peer request for LANMAN auth not supported");
260 /* Generate the expected response and our mutual auth. */
270 * <auth_string> is the Authenticator Response (mutual auth)
pppd.h 81 #define MAXNAMELEN 256 /* max length of hostname or name for auth */
225 extern int auth_done[NUM_PPP]; /* Methods actually used for auth */
525 /* Procedures exported from auth.c */
    [all...]
  /external/dbus/
ChangeLog 784 do the default check that the auth identity matches the bus identity
    [all...]
NEWS 183 - auth EXTERNAL now supported on BSD varients
272 - --with-console-auth-dir added to configure scripts for configuring the
530 the SHA-1 auth mechanism
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ndis.c     [all...]
  /external/dbus/bus/
config-parser.c 115 DBusList *mechanisms; /**< Auth mechanisms */
152 return "auth";
474 * and legitimate auth will fail. If interactive auth (ask user for
780 else if (strcmp (element_name, "auth") == 0)
782 if (!check_no_attributes (parser, "auth", attribute_names, attribute_values, error))
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
eapol_test.c 874 wpa_printf(MSG_DEBUG, "UMTS auth completed successfully");
879 wpa_printf(MSG_DEBUG, "UMTS auth resulted in synchronization "
883 wpa_printf(MSG_DEBUG, "UMTS auth failed");
  /hardware/ti/wlan/wl1271/stad/src/Application/
roamingMngr.c     [all...]

Completed in 254 milliseconds

<<11121314151617181920>>