/external/openssl/ssl/ |
d1_clnt.c | 877 krb5_data authenticator, *authp = NULL; local 895 if (KRB5SENDAUTH) authp = &authenticator; 936 ** optional authenticator omitted. 945 /* KerberosWrapper.Authenticator */ 959 s2n(0,p);/* null authenticator length */ [all...] |
s3_srvr.c | 2198 krb5_data authenticator; local [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
signed_settings.cc | 17 #include "chrome/browser/chromeos/login/authenticator.h" 280 return new CheckWhitelistOp(Authenticator::Canonicalize(email), d); 289 return new WhitelistOp(Authenticator::Canonicalize(email),
|
/external/wpa_supplicant_6/wpa_supplicant/ |
eapol_test.c | 673 /* RFC 2869, Ch. 5.13: valid Message-Authenticator attribute MUST be 680 "Access-Reject without Message-Authenticator " 685 "Message-Authenticator - dropped\n");
|
config_ssid.h | 219 * authenticator.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
eapol_test.c | 702 /* RFC 2869, Ch. 5.13: valid Message-Authenticator attribute MUST be 709 "Access-Reject without Message-Authenticator " 714 "Message-Authenticator - dropped\n");
|
config_ssid.h | 222 * authenticator.
|
wpas_glue.c | 117 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator 125 * to the current Authenticator.
|
/development/samples/SampleSyncAdapter/src/com/example/android/samplesync/authenticator/ |
AuthenticatorActivity.java | 17 package com.example.android.samplesync.authenticator;
|
/external/chromium/chrome/browser/printing/cloud_print/ |
cloud_print_setup_flow.cc | 240 // Start the authenticator.
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps.h | 367 * This data is stored at the higher layer Authenticator or Supplicant data
|
/external/wpa_supplicant_8/src/ap/ |
accounting.c | 439 "Authenticator - dropped\n");
|
ieee802_11_auth.c | 417 "correct authenticator - dropped\n");
|
peerkey_auth.c | 326 /* Authenticator does not need SMK anymore and it is required to forget
|
/packages/apps/Contacts/src/com/android/contacts/model/ |
ExternalAccountType.java | 68 // for the account type and resource IDs to be specified without an associated authenticator.
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpc/ |
clnt.h | 134 AUTH *cl_auth; /* authenticator */
|
/cts/tests/tests/accounts/src/android/accounts/cts/ |
AccountManagerTest.java | 118 // need to clean up the authenticator cached data 418 fail("should have found Authenticator type: " + ACCOUNT_TYPE); [all...] |
/external/tcpdump/ |
print-radius.c | 150 u_int8_t auth[16]; /* Authenticator */ 921 printf("RADIUS, length: %u\n\t%s (%u), id: 0x%02x, Authenticator: ", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_mschapv2.c | 352 wpa_printf(MSG_WARNING, "EAP-MSCHAPV2: Invalid authenticator " 584 /* Authenticator response is not really needed yet, but calculate it
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
hlr_auc_gw.c | 2 * HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator 646 "database/authenticator\n"
|
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 2 * HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator 647 "database/authenticator\n"
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 2 * WPA/RSN - Shared functions for supplicant and authenticator 717 * @aa: Authenticator address
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 358 wpa_printf(MSG_WARNING, "EAP-MSCHAPV2: Invalid authenticator " 590 /* Authenticator response is not really needed yet, but calculate it
|
/frameworks/base/obex/javax/obex/ |
ServerSession.java | 67 * @param auth the authenticator to use with this connection 71 public ServerSession(ObexTransport trans, ServerRequestHandler handler, Authenticator auth)
|
/packages/apps/Bluetooth/src/com/android/bluetooth/opp/ |
TestActivity.java | 63 import javax.obex.Authenticator; 571 public ServerSession acceptAndOpen(ServerRequestHandler handler, Authenticator auth)
|