/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.c | 8 * This is an example implementation of the EAP-SIM/AKA database/authentication 10 * GSM/UMTS authentication center (HLR/AuC). hlr_auc_gw is an example 467 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed " 558 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed " 693 * eap_sim_db_init - Initialize EAP-SIM DB / authentication gateway interface 763 * eap_sim_db_deinit - Deinitialize EAP-SIM DB/authentication gw interface 862 * start a request and return EAP_SIM_DB_PENDING immediately if authentication 936 wpa_printf(MSG_DEBUG, "EAP-SIM DB: requesting SIM authentication " 983 * with eap_sim_db_add_pseudonym() once the authentication has been completed 1013 * This function is used to generate a fast re-authentication identity fo [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
README | 55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 56 Following authentication methods are supported with an integrate IEEE 802.1X 81 authentication) 90 * pre-authentication 184 machines. However, there can be used as inner authentication 218 protection, and non-keyed authentication does not protect against bit 226 keyed packet authentication mechanism (Michael MIC). 229 an external authentication server (e.g., RADIUS) and EAP just like 254 messages in initial key handshake, pre-authentication, and PMKSA caching). 263 negotiation with a WPA Authenticator and EAP authentication wit [all...] |
/development/samples/SipDemo/src/com/example/android/sip/ |
SipSettings.java | 23 * Handles SIP authentication settings for the Walkie Talkie app.
|
/device/moto/shamu/overlay/packages/apps/Settings/res/values-mcc302-mnc610/ |
arrays.xml | 18 <!-- Authentication Types used in APN editor -->
|
/external/apache-http/src/org/apache/http/impl/client/ |
AbstractAuthenticationHandler.java | 127 this.log.debug("Authentication schemes in the order of preference: " 138 this.log.debug(id + " authentication scheme selected"); 145 this.log.warn("Authentication scheme " + id + " not supported"); 151 this.log.debug("Challenge for " + id + " authentication scheme not available");
|
/external/bluetooth/bluedroid/bta/pb/ |
bta_pbs_cfg.c | 37 /* Specifies whether or not client's user id is required during obex authentication */
|
bta_pbs_int.h | 45 BOOLEAN userid_req; /* TRUE if user id is required during obex authentication (Server only) */
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/ |
PKCS11AuthenticationManager.java | 19 * @return true iff SmartCard-based authentication is available.
|
/external/chromium_org/chrome/browser/chromeos/login/auth/ |
auth_prewarmer.h | 22 // Class for prewarming authentication network connection.
|
key.h | 12 // Key for user authentication. The class supports hashing of plain text
|
/external/chromium_org/chrome/browser/chromeos/login/ |
fake_login_utils.h | 15 // * Fake authentication. You can configure expected usernames and password for
|
/external/chromium_org/chrome/browser/password_manager/ |
password_manager_util.h | 26 // the user was successfully authenticated, or if authentication was not
|
/external/chromium_org/chrome/browser/ui/cocoa/ |
one_click_signin_bubble_controller.h | 30 // alternate message that will be displayed in the case of an authentication
|
/external/chromium_org/chrome/common/extensions/api/ |
cast_channel.idl | 30 // Authentication was requested and the receiver could not be 34 // authentication (e.g., there is already an open channel to the same URL). 49 // Authentication methods that may be required to connect to a Cast receiver. 67 // The authentication method required for the channel.
|
enterprise_platform_keys.idl | 8 // for TLS authentication and network access. 58 // certificates that are usable for a certain authentication. 68 // system and browser for authentication. 78 // considered during authentication and do not clutter the certificate
|
/external/chromium_org/chromeos/test/data/network/ |
managed_toplevel1.onc | 36 "Authentication": "None"
|
managed_toplevel1_with_cert_pems.onc | 36 "Authentication": "None"
|
shill_openvpn.json | 16 "OpenVPN.RemoteCertEKU":"TLS Web Server Authentication",
|
shill_openvpn_with_errors.json | 22 "OpenVPN.RemoteCertEKU": "TLS Web Server Authentication",
|
translation_of_shill_openvpn.onc | 17 "RemoteCertEKU": "TLS Web Server Authentication",
|
valid_openvpn.onc | 17 "RemoteCertEKU": "TLS Web Server Authentication",
|
valid_openvpn_with_cert_pems.onc | 18 "RemoteCertEKU": "TLS Web Server Authentication",
|
/external/chromium_org/components/data_reduction_proxy/browser/ |
data_reduction_proxy_params.h | 22 // authentication key are taken from flags if available and from preprocessor 52 // Returns true if the authentication key was set on the command line. 127 // Set the proxy authentication key. 132 // Returns the proxy authentication key.
|
/external/chromium_org/components/signin/ios/browser/ |
profile_oauth2_token_service_ios.h | 20 // ProfileOAuth2TokenServiceFactory for OS_IOS when iOS authentication service 51 // This method should not be called when using shared authentication. 70 // Upgrades to using shared authentication token service. 151 // authentication during |LoadCredentials|. Note that |LoadCredentials| is
|
/external/chromium_org/content/public/browser/android/ |
download_controller_android.h | 28 // request with authentication or a POST request. Notifies the embedding
|