/external/wpa_supplicant/ |
ctrl_iface.c | 1091 if (capa.auth & (WPA_DRIVER_AUTH_OPEN)) { 1100 if (capa.auth & (WPA_DRIVER_AUTH_SHARED)) { 1109 if (capa.auth & (WPA_DRIVER_AUTH_LEAP)) { [all...] |
wpa_supplicant_i.h | 218 unsigned int auth_algs; /* bitfield of allowed auth algs */
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.conf | 458 # (string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or 576 phase2="auth=MSCHAPV2" 603 phase2="auth=MSCHAPV2"
|
/dalvik/libcore/security/src/main/java/java/security/cert/ |
X509CRLSelector.java | 27 import javax.security.auth.x500.X500Principal;
|
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/provider/cert/ |
X509CRLImpl.java | 46 import javax.security.auth.x500.X500Principal;
|
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/x501/ |
AttributeTypeAndValue.java | 30 import javax.security.auth.x500.X500Principal;
|
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/x509/ |
TBSCertList.java | 32 import javax.security.auth.x500.X500Principal;
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 30 import javax.security.auth.x500.X500Principal;
|
X509CertificateObject.java | 32 import javax.security.auth.x500.X500Principal;
|
/external/apache-http/src/org/apache/http/impl/client/ |
AbstractHttpClient.java | 48 import org.apache.http.auth.AuthSchemeRegistry;
|
/external/dropbear/ |
packet.c | 35 #include "auth.h"
|
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 205 * This function is called with SADB_EXT_SUPPORTED_{AUTH,ENCRYPT} as the [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp.h | 121 * See draft-ietf-ipsec-isakmp-gss-auth-06.txt.
|
/external/ppp/pppd/ |
chap-new.c | 487 /* used for MS-CHAP v2 mutual auth, yuck */
|
eap.c | 657 /* Handle both initial auth and restart */ 958 * link_established() in auth.c. All that's necessary here is to [all...] |
/external/tcpdump/ |
print-l2tp.c | 168 { L2TP_AUTHEN_TYPE_NO_AUTH, "No Auth" },
|
/external/webkit/WebCore/platform/network/cf/ |
SocketStreamHandleCFNet.cpp | 413 // Fails e.g. for NTLM auth.
|
/frameworks/base/core/java/android/net/http/ |
AndroidHttpClient.java | 384 // Never print auth token -- we used to check ro.secure=0 to
|
/frameworks/base/core/java/com/android/internal/net/ |
DNParser.java | 25 import javax.security.auth.x500.X500Principal;
|
/frameworks/base/core/res/res/values/ |
config.xml | 102 "name,apn,proxy,port,username,password,server,mmsc,mmsproxy,mmsport,mcc,mnc,auth,type"
|
/frameworks/base/core/tests/coretests/src/com/android/internal/net/ |
DomainNameValidatorTest.java | 46 import javax.security.auth.x500.X500Principal;
|
/frameworks/base/docs/html/sdk/ |
android-2.0.jd | 284 <li>Centralized account manager API to securely store and access auth tokens/passwords </li>
|
/packages/apps/Email/tests/src/com/android/email/provider/ |
ProviderTestUtils.java | 225 * TODO: check host auth?
|
/packages/apps/Settings/src/com/android/settings/wifi/ |
WifiDialog.java | 147 "auth=" + mPhase2.getSelectedItem());
|
/system/wlan/ti/sta_dk_4_0_4_32/common/inc/ |
paramMng.h | 246 /* Auth section */
|