HomeSort by relevance Sort by last modified time
    Searched full:authentication (Results 226 - 250 of 1714) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/eap_server/
eap_sim_db.c 8 * This is an example implementation of the EAP-SIM/AKA database/authentication
10 * GSM/UMTS authentication center (HLR/AuC). hlr_auc_gw is an example
467 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed "
558 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed "
693 * eap_sim_db_init - Initialize EAP-SIM DB / authentication gateway interface
763 * eap_sim_db_deinit - Deinitialize EAP-SIM DB/authentication gw interface
862 * start a request and return EAP_SIM_DB_PENDING immediately if authentication
936 wpa_printf(MSG_DEBUG, "EAP-SIM DB: requesting SIM authentication "
983 * with eap_sim_db_add_pseudonym() once the authentication has been completed
1013 * This function is used to generate a fast re-authentication identity fo
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
README 55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
56 Following authentication methods are supported with an integrate IEEE 802.1X
81 authentication)
90 * pre-authentication
184 machines. However, there can be used as inner authentication
218 protection, and non-keyed authentication does not protect against bit
226 keyed packet authentication mechanism (Michael MIC).
229 an external authentication server (e.g., RADIUS) and EAP just like
254 messages in initial key handshake, pre-authentication, and PMKSA caching).
263 negotiation with a WPA Authenticator and EAP authentication wit
    [all...]
  /development/samples/SipDemo/src/com/example/android/sip/
SipSettings.java 23 * Handles SIP authentication settings for the Walkie Talkie app.
  /device/moto/shamu/overlay/packages/apps/Settings/res/values-mcc302-mnc610/
arrays.xml 18 <!-- Authentication Types used in APN editor -->
  /external/apache-http/src/org/apache/http/impl/client/
AbstractAuthenticationHandler.java 127 this.log.debug("Authentication schemes in the order of preference: "
138 this.log.debug(id + " authentication scheme selected");
145 this.log.warn("Authentication scheme " + id + " not supported");
151 this.log.debug("Challenge for " + id + " authentication scheme not available");
  /external/bluetooth/bluedroid/bta/pb/
bta_pbs_cfg.c 37 /* Specifies whether or not client's user id is required during obex authentication */
bta_pbs_int.h 45 BOOLEAN userid_req; /* TRUE if user id is required during obex authentication (Server only) */
  /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/
PKCS11AuthenticationManager.java 19 * @return true iff SmartCard-based authentication is available.
  /external/chromium_org/chrome/browser/chromeos/login/auth/
auth_prewarmer.h 22 // Class for prewarming authentication network connection.
key.h 12 // Key for user authentication. The class supports hashing of plain text
  /external/chromium_org/chrome/browser/chromeos/login/
fake_login_utils.h 15 // * Fake authentication. You can configure expected usernames and password for
  /external/chromium_org/chrome/browser/password_manager/
password_manager_util.h 26 // the user was successfully authenticated, or if authentication was not
  /external/chromium_org/chrome/browser/ui/cocoa/
one_click_signin_bubble_controller.h 30 // alternate message that will be displayed in the case of an authentication
  /external/chromium_org/chrome/common/extensions/api/
cast_channel.idl 30 // Authentication was requested and the receiver could not be
34 // authentication (e.g., there is already an open channel to the same URL).
49 // Authentication methods that may be required to connect to a Cast receiver.
67 // The authentication method required for the channel.
enterprise_platform_keys.idl 8 // for TLS authentication and network access.
58 // certificates that are usable for a certain authentication.
68 // system and browser for authentication.
78 // considered during authentication and do not clutter the certificate
  /external/chromium_org/chromeos/test/data/network/
managed_toplevel1.onc 36 "Authentication": "None"
managed_toplevel1_with_cert_pems.onc 36 "Authentication": "None"
shill_openvpn.json 16 "OpenVPN.RemoteCertEKU":"TLS Web Server Authentication",
shill_openvpn_with_errors.json 22 "OpenVPN.RemoteCertEKU": "TLS Web Server Authentication",
translation_of_shill_openvpn.onc 17 "RemoteCertEKU": "TLS Web Server Authentication",
valid_openvpn.onc 17 "RemoteCertEKU": "TLS Web Server Authentication",
valid_openvpn_with_cert_pems.onc 18 "RemoteCertEKU": "TLS Web Server Authentication",
  /external/chromium_org/components/data_reduction_proxy/browser/
data_reduction_proxy_params.h 22 // authentication key are taken from flags if available and from preprocessor
52 // Returns true if the authentication key was set on the command line.
127 // Set the proxy authentication key.
132 // Returns the proxy authentication key.
  /external/chromium_org/components/signin/ios/browser/
profile_oauth2_token_service_ios.h 20 // ProfileOAuth2TokenServiceFactory for OS_IOS when iOS authentication service
51 // This method should not be called when using shared authentication.
70 // Upgrades to using shared authentication token service.
151 // authentication during |LoadCredentials|. Note that |LoadCredentials| is
  /external/chromium_org/content/public/browser/android/
download_controller_android.h 28 // request with authentication or a POST request. Notifies the embedding

Completed in 728 milliseconds

1 2 3 4 5 6 7 8 91011>>