HomeSort by relevance Sort by last modified time
    Searched defs:auth (Results 151 - 175 of 232) sorted by null

1 2 3 4 5 67 8 910

  /external/wpa_supplicant/wpa_gui/
networkconfig.ui.h 41 int auth, encr = 0; local
43 auth = AUTH_WPA2_EAP;
45 auth = AUTH_WPA_EAP;
47 auth = AUTH_WPA2_PSK;
49 auth = AUTH_WPA_PSK;
51 auth = AUTH_NONE;
62 authSelect->setCurrentItem(auth);
63 authChanged(auth);
104 int auth = authSelect->currentItem(); local
106 if (auth == AUTH_WPA_PSK || auth == AUTH_WPA2_PSK)
331 int auth = AUTH_NONE, encr = 0; local
    [all...]
  /external/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 71 int auth, encr = 0; local
73 auth = AUTH_WPA2_EAP;
75 auth = AUTH_WPA_EAP;
77 auth = AUTH_WPA2_PSK;
79 auth = AUTH_WPA_PSK;
81 auth = AUTH_NONE;
92 authSelect->setCurrentItem(auth);
93 authChanged(auth);
134 int auth = authSelect->currentItem(); local
136 if (auth == AUTH_WPA_PSK || auth == AUTH_WPA2_PSK)
370 int auth = AUTH_NONE, encr = 0; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 28 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon14085
274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
330 "Response/Auth-Reject");
347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sake.c 27 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon14116
220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
424 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Auth-Reject");
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_wpa.c 46 struct wpa_state_machine *auth; member in struct:wpa
81 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame");
82 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol,
239 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
242 wpa_printf(MSG_DEBUG, "AUTH: %s", txt);
261 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
281 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
294 wpa_printf(MSG_DEBUG, "AUTH: Initializing group state machine");
312 wpa_printf(MSG_DEBUG, "AUTH: wpa_init() failed");
322 wpa->auth = wpa_auth_sta_init(wpa->auth_group, wpa->supp_addr)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui/
networkconfig.ui.h 41 int auth, encr = 0; local
43 auth = AUTH_WPA2_EAP;
45 auth = AUTH_WPA_EAP;
47 auth = AUTH_WPA2_PSK;
49 auth = AUTH_WPA_PSK;
51 auth = AUTH_NONE;
62 authSelect->setCurrentItem(auth);
63 authChanged(auth);
104 int auth = authSelect->currentItem(); local
106 if (auth == AUTH_WPA_PSK || auth == AUTH_WPA2_PSK)
345 int auth = AUTH_NONE, encr = 0; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 74 int auth, encr = 0; local
76 auth = AUTH_WPA2_EAP;
78 auth = AUTH_WPA_EAP;
80 auth = AUTH_WPA2_PSK;
82 auth = AUTH_WPA_PSK;
84 auth = AUTH_NONE;
95 authSelect->setCurrentIndex(auth);
96 authChanged(auth);
99 wepEnabled(auth == AUTH_NONE && encr == 1);
160 phase2Select->addItem("GTC(auth) + MSCHAPv2(prov)")
188 int auth = authSelect->currentIndex(); local
520 int auth = AUTH_NONE, encr = 0; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 29 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon14299
275 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
319 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
331 "Response/Auth-Reject");
348 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 28 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon14331
221 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
370 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
407 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
425 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Auth-Reject");
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui/
networkconfig.ui.h 41 int auth, encr = 0; local
43 auth = AUTH_WPA2_EAP;
45 auth = AUTH_WPA_EAP;
47 auth = AUTH_WPA2_PSK;
49 auth = AUTH_WPA_PSK;
51 auth = AUTH_NONE;
62 authSelect->setCurrentItem(auth);
63 authChanged(auth);
104 int auth = authSelect->currentItem(); local
106 if (auth == AUTH_WPA_PSK || auth == AUTH_WPA2_PSK)
345 int auth = AUTH_NONE, encr = 0; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 77 int auth, encr = 0; local
79 auth = AUTH_WPA2_EAP;
81 auth = AUTH_WPA_EAP;
83 auth = AUTH_WPA2_PSK;
85 auth = AUTH_WPA_PSK;
87 auth = AUTH_NONE_OPEN;
95 if (auth == AUTH_NONE_OPEN)
96 auth = AUTH_NONE_WEP;
100 authSelect->setCurrentIndex(auth);
101 authChanged(auth);
196 int auth = authSelect->currentIndex(); local
539 int auth = AUTH_NONE_OPEN, encr = 0; local
    [all...]
  /frameworks/base/core/jni/
android_bluetooth_BluetoothSocket.cpp 97 jboolean auth; local
124 auth = env->GetBooleanField(obj, field_mAuth);
130 lm |= auth ? RFCOMM_LM_AUTH : 0;
132 lm |= (auth && encrypt) ? RFCOMM_LM_SECURE : 0;
135 lm |= auth ? L2CAP_LM_AUTH : 0;
137 lm |= (auth && encrypt) ? L2CAP_LM_SECURE : 0;
344 jboolean auth; local
392 auth = env->GetBooleanField(obj, field_mAuth);
399 type, fd, auth, encrypt, addr_jstr, -1);
  /libcore/luni/src/main/java/javax/security/auth/x500/
X500Principal.java 18 package javax.security.auth.x500;
  /packages/experimental/LoaderApp/src/com/android/loaderapp/model/
Sources.java 205 final AuthenticatorDescription auth = findAuthenticator(auths, accountType); local
209 source = new GoogleSource(auth.packageName);
211 source = new ExchangeSource(auth.packageName);
215 + ", packageName=" + auth.packageName);
216 source = new ExternalSource(auth.packageName);
220 source.accountType = auth.type;
221 source.titleRes = auth.labelId;
222 source.iconRes = auth.iconId;
237 for (AuthenticatorDescription auth : auths) {
238 if (accountType.equals(auth.type))
    [all...]
  /sdk/ddms/libs/ddmuilib/src/com/android/ddmuilib/log/event/
DisplaySync.java 135 int auth = getAuth(event.getValueAsString(0)); local
136 if (auth >= 0) {
138 mDatasetsSyncTickle[auth].addOrUpdate(new FixedMillisecond(msec), -1);
173 * @param auth The authority associated with the event
178 private String getTextFromDetails(int auth, String details, int eventSource) {
181 sb.append(AUTH_NAMES[auth]).append(": \n");
189 if (auth == GMAIL && "M".equals(key)) {
191 } else if (auth == GMAIL && "L".equals(key)) {
193 } else if (auth == GMAIL && "C".equals(key)) {
195 } else if (auth == GMAIL && "A".equals(key))
    [all...]
  /external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/
KerberosTicketTest.java 18 package org.apache.harmony.auth.tests.javax.security.auth.kerberos;
26 import javax.security.auth.DestroyFailedException;
27 import javax.security.auth.RefreshFailedException;
28 import javax.security.auth.kerberos.KerberosKey;
29 import javax.security.auth.kerberos.KerberosPrincipal;
30 import javax.security.auth.kerberos.KerberosTicket;
34 import org.apache.harmony.auth.tests.support.TestUtils;
89 * @tests javax.security.auth.kerberos.KerberosTicket#getAuthTime()
106 // auth time: null value is illegal for constructo
    [all...]
  /external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/
Sasl3Test.java 22 package org.apache.harmony.auth.tests.javax.security.sasl;
29 import javax.security.auth.callback.Callback;
30 import javax.security.auth.callback.CallbackHandler;
31 import javax.security.auth.callback.NameCallback;
32 import javax.security.auth.callback.PasswordCallback;
33 import javax.security.auth.callback.TextOutputCallback;
34 import javax.security.auth.callback.UnsupportedCallbackException;
42 import org.apache.harmony.auth.tests.support.SpiEngUtils;
  /external/bluetooth/bluez/audio/
device.c 744 struct service_auth *auth = priv->auths->data; local
746 auth->cb(derr, auth->user_data);
747 priv->auths = g_slist_remove(priv->auths, auth);
748 g_free(auth);
799 struct service_auth *auth; local
802 auth = g_try_new0(struct service_auth, 1);
803 if (!auth)
806 auth->cb = cb;
807 auth->user_data = user_data
835 struct service_auth *auth = l->data; local
    [all...]
  /external/bluetooth/bluez/plugins/
service.c 295 struct pending_auth *auth = l->data; local
296 return auth;
309 struct pending_auth *auth = l->data; local
310 if (g_str_equal(auth->sender, sender))
311 return auth;
321 struct pending_auth *auth; local
328 auth = find_pending_by_sender(serv_adapter, user_record->sender);
329 if (auth) {
331 auth);
332 g_free(auth);
527 struct pending_auth *auth; local
578 struct pending_auth *auth; local
657 struct pending_auth *auth; local
    [all...]
  /external/bluetooth/bluez/test/
rctest.c 81 static int auth = 0; variable
200 if (auth)
278 if (auth)
669 auth = 1;
  /external/bluetooth/bluez/tools/
rfcomm.c 57 static int auth = 0; variable
506 if (auth)
716 "\t-A, --auth Enable authentication\n"
738 { "auth", 0, 0, 'A' },
779 auth = 1;
  /external/dbus/dbus/
dbus-transport.c 30 #include "dbus-auth.h"
104 DBusAuth *auth; local
114 auth = _dbus_auth_server_new (server_guid);
116 auth = _dbus_auth_client_new ();
117 if (auth == NULL)
126 _dbus_auth_unref (auth);
135 _dbus_auth_unref (auth);
153 _dbus_auth_unref (auth);
162 transport->auth = auth;
    [all...]
  /external/wpa_supplicant/
driver_broadcom.c 524 int auth = 0; local
575 broadcom_ioctl(drv, WLC_SET_AUTH, &auth, sizeof(auth)) < 0 ||
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_broadcom.c 529 int auth = 0; local
580 broadcom_ioctl(drv, WLC_SET_AUTH, &auth, sizeof(auth)) < 0 ||
  /external/wpa_supplicant_8/hostapd/
ctrl_iface.c 504 char *ssid, *auth, *encr = NULL, *key = NULL; local
512 auth = pos;
524 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);

Completed in 517 milliseconds

1 2 3 4 5 67 8 910