HomeSort by relevance Sort by last modified time
    Searched full:sess (Results 1 - 25 of 61) sorted by null

1 2 3

  /packages/apps/Bluetooth/res/values-pt/
strings_pbap.xml 4 <string name="pbap_session_key_dialog_title" msgid="3580996574333882561">"Digite a chave de sessão para %1$s"</string>
5 <string name="pbap_session_key_dialog_header" msgid="2772472422782758981">"É necessário fornecer a chave de sessão Bluetooth"</string>
7 <string name="pbap_authentication_timeout_message" msgid="4166979525521902687">"Tempo limite esgotado para inserir a chave de sessão com %1$s"</string>
9 <string name="auth_notif_title" msgid="7599854855681573258">"Chave de sessão"</string>
10 <string name="auth_notif_message" msgid="6667218116427605038">"Digite a chave de sessão para %1$s"</string>
  /packages/apps/Bluetooth/res/values-pt-rPT/
strings_pbap.xml 4 <string name="pbap_session_key_dialog_title" msgid="3580996574333882561">"Escreva a chave de sessão para %1$s"</string>
5 <string name="pbap_session_key_dialog_header" msgid="2772472422782758981">"Necessária chave de sessão Bluetooth"</string>
7 <string name="pbap_authentication_timeout_message" msgid="4166979525521902687">"Foi excedido o tempo para introduzir a chave de sessão com %1$s"</string>
9 <string name="auth_notif_title" msgid="7599854855681573258">"Chave de sessão"</string>
10 <string name="auth_notif_message" msgid="6667218116427605038">"Escreva a chave de sessão para %1$s"</string>
  /external/wpa_supplicant_8/src/radius/
radius_server.c 355 struct radius_session *sess = client->sessions; local
357 while (sess) {
358 if (sess->sess_id == sess_id) {
361 sess = sess->next;
364 return sess;
369 struct radius_session *sess)
371 eloop_cancel_timeout(radius_server_session_timeout, data, sess);
372 eloop_cancel_timeout(radius_server_session_remove_timeout, data, sess);
373 eap_server_sm_deinit(sess->eap)
412 struct radius_session *sess = timeout_ctx; local
421 struct radius_session *sess = timeout_ctx; local
432 struct radius_session *sess; local
464 struct radius_session *sess; local
696 struct radius_session *sess; local
1477 struct radius_session *sess = ctx; local
1487 struct radius_session *sess = ctx; local
1512 struct radius_session *s, *sess = NULL; local
    [all...]
  /external/ganymed-ssh2/examples/
PublicKeyAuthentication.java 44 Session sess = conn.openSession(); local
46 sess.execCommand("uname -a && date && uptime && who");
48 InputStream stdout = new StreamGobbler(sess.getStdout());
64 sess.close();
Basic.java 45 Session sess = conn.openSession(); local
47 sess.execCommand("uname -a && date && uptime && who");
56 InputStream stdout = new StreamGobbler(sess.getStdout());
70 System.out.println("ExitCode: " + sess.getExitStatus());
74 sess.close();
StdoutAndStderr.java 41 Session sess = conn.openSession(); local
43 sess.execCommand("echo \"Text on STDOUT\"; echo \"Text on STDERR\" >&2");
45 InputStream stdout = new StreamGobbler(sess.getStdout());
46 InputStream stderr = new StreamGobbler(sess.getStderr());
73 sess.close();
UsingKnownHosts.java 52 Session sess = conn.openSession(); local
54 sess.execCommand("uname -a && date && uptime && who");
56 InputStream stdout = new StreamGobbler(sess.getStdout());
71 sess.close();
BasicWithHTTPProxy.java 56 Session sess = conn.openSession(); local
58 sess.execCommand("uname -a && date && uptime && who");
67 InputStream stdout = new StreamGobbler(sess.getStdout());
81 System.out.println("ExitCode: " + sess.getExitStatus());
85 sess.close();
SingleThreadStdoutStderr.java 39 Session sess = conn.openSession(); local
41 sess.execCommand("echo \"Huge amounts of text on STDOUT\"; echo \"Huge amounts of text on STDERR\" >&2");
56 InputStream stdout = sess.getStdout();
57 InputStream stderr = sess.getStderr();
71 int conditions = sess.waitForCondition(ChannelCondition.STDOUT_DATA | ChannelCondition.STDERR_DATA
125 sess.close();
SwingShell.java 173 Session sess; field in class:SwingShell.TerminalDialog
292 public TerminalDialog(JFrame parent, String title, Session sess, int x, int y) throws IOException
296 this.sess = sess;
298 in = sess.getStdout();
299 out = sess.getStdin();
661 Session sess = conn.openSession(); local
666 sess.requestPTY("dumb", x_width, y_width, 0, 0, null);
667 sess.startShell();
669 TerminalDialog td = new TerminalDialog(loginFrame, username + "@" + hostname, sess, x_width, y_width)
    [all...]
  /external/openssl/crypto/engine/
eng_cryptodev.c 244 struct session_op sess; local
251 memset(&sess, 0, sizeof(sess));
252 sess.key = (caddr_t)"123456789abcdefghijklmno";
257 sess.cipher = ciphers[i].id;
258 sess.keylen = ciphers[i].keylen;
259 sess.mac = 0;
260 if (ioctl(fd, CIOCGSESSION, &sess) != -1 &&
261 ioctl(fd, CIOCFSESSION, &sess.ses) != -1)
284 struct session_op sess; local
369 struct session_op *sess = &state->d_sess; local
422 struct session_op *sess = &state->d_sess; local
464 struct session_op *sess = &state->d_sess; local
678 struct session_op *sess = &state->d_sess; local
712 struct session_op *sess = &state->d_sess; local
758 struct session_op *sess = &state->d_sess; local
794 struct session_op *sess = &state->d_sess; local
826 struct session_op *sess; local
    [all...]
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
SCPClient.java 181 Session sess = null; local
200 sess = conn.openSession();
201 sess.execCommand(cmd, charsetName);
203 return new SCPOutputStream(this, sess, remoteFile, length, mode);
216 Session sess = null; local
227 sess = conn.openSession();
228 sess.execCommand(cmd, charsetName);
230 return new SCPInputStream(this, sess);
  /frameworks/base/core/tests/coretests/src/android/net/http/
DefaultHttpClientTest.java 102 authenticateDigestAlgorithm("MD5-sess");
104 authenticateDigestAlgorithm("md5-sess");
105 authenticateDigestAlgorithm("md5-SESS");
106 authenticateDigestAlgorithm("MD5-SESS");
  /external/openssl/crypto/evp/
openbsd_hw.c 276 session_op sess;
284 if(!dev_crypto_init(&md_data->sess))
290 md_data->sess.mac=mac;
292 if (ioctl(fd,CIOCGSESSION,&md_data->sess) == -1)
302 if (ioctl(fd,CIOCFSESSION,&md_data->sess.ses) == -1)
377 return do_digest(md_data->sess.ses,md_data->md,data,len);
398 ret=do_digest(md_data->sess.ses,md,md_data->data,md_data->len);
  /external/openssl/ssl/
s2_clnt.c 618 SSL_SESSION *sess; local
632 sess=s->session;
637 i=ssl_put_cipher_by_char(s,sess->cipher,p);
642 sess->key_arg_length=i;
650 if (RAND_pseudo_bytes(sess->key_arg,i) <= 0)
655 sess->master_key_length=i;
658 if (i > (int)sizeof(sess->master_key))
664 if (RAND_bytes(sess->master_key,i) <= 0)
671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
673 else if (SSL_C_IS_EXPORT(sess->cipher)
    [all...]
ssl_sess.c 159 SSL_SESSION *sess; local
164 sess = ssl->session;
165 if(sess)
166 sess->references++;
168 return(sess);
1079 int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess))
1084 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess)
1090 void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess))
1095 void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(SSL_CTX * ctx,SSL_SESSION *sess)
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
MessageDigestAlgorithm.java 20 * @param algorithm a string indicating a pair of algorithms (MD5 (default), or MD5-sess) used
59 "cnonce_value may not be absent for MD5-Sess algorithm.");
94 * @param algorithm a string indicating a pair of algorithms (MD5 (default), or MD5-sess) used
141 "cnonce_value may not be absent for MD5-Sess algorithm.");
  /frameworks/base/packages/VpnDialogs/res/values-pt/
strings.xml 25 <string name="session" msgid="6470628549473641030">"Sessão:"</string>
  /frameworks/base/packages/VpnDialogs/res/values-pt-rPT/
strings.xml 25 <string name="session" msgid="6470628549473641030">"Sessão"</string>
  /packages/apps/Stk/res/values-pt/
strings.xml 20 <string name="menu_end_session" msgid="7368541737750982217">"Finalizar a sessão"</string>
  /packages/apps/Stk/res/values-pt-rPT/
strings.xml 20 <string name="menu_end_session" msgid="7368541737750982217">"Terminar sessão"</string>
  /external/ppp/pppd/plugins/rp-pppoe/
debug.c 119 case CODE_SESS: fprintf(fp, "SESS "); break;
122 fprintf(fp, "sess-id %d length %d\n",
  /external/chromium/net/http/
http_auth_handler_digest.cc 30 // | md5-sess | |
33 // auth-int | md5-sess | |
39 // | md5-sess | MD5(user:realm:password):nonce:cnonce |
245 } else if (LowerCaseEqualsASCII(value, "md5-sess")) {
291 return "MD5-sess";
http_auth_handler_digest_unittest.cc 212 { // Check that md5-sess is a supported algorithm.
213 "Digest nonce=\"xyz\", algorithm=\"md5-sess\", realm=\"Oblivion\"",
482 { // MD5-sess
488 "algorithm=\"md5-sess\", qop=auth",
496 "nonce=\"AAAAAAAA\", uri=\"/\", algorithm=MD5-sess, "
  /external/nist-sip/java/gov/nist/javax/sip/header/ims/
PServedUser.java 120 throw new NullPointerException("sess-case Parameter value is null");

Completed in 492 milliseconds

1 2 3