HomeSort by relevance Sort by last modified time
    Searched full:authentication (Results 301 - 325 of 1714) sorted by null

<<11121314151617181920>>

  /external/wpa_supplicant_8/src/crypto/
milenage.c 8 * This file implements an example authentication algorithm defined for 3GPP
31 * @amf: AMF = 16-bit authentication management field
32 * @mac_a: Buffer for MAC-A = 64-bit network authentication code, or %NULL
33 * @mac_s: Buffer for MAC-S = 64-bit resync authentication code, or %NULL
163 * @amf: AMF = 16-bit authentication management field
167 * @autn: Buffer for AUTN = 128-bit authentication token
204 * @auts: AUTS = 112-bit authentication token from client
227 * gsm_milenage - Generate GSM-Milenage (3GPP TS 55.205) authentication triplet
262 * @autn: AUTN = 128-bit authentication token
  /system/keymaster/include/keymaster/
keymaster_defs.h 92 /* User authentication */
96 KM_TAG_NO_AUTH_REQUIRED = KM_BOOL | 502, /* If key is usable without authentication. */
101 KM_TAG_AUTH_TIMEOUT = KM_INT | 504, /* Required freshness of user authentication for
103 Public key operations require no authentication.
104 If absent, authentication is required for every
105 use. Authentication state is lost when the
107 KM_TAG_RESCOPE_AUTH_TIMEOUT = KM_INT | 505, /* Required freshness of user authentication for key
109 operations require no authentication. If absent,
110 authentication required for every rescoping. */
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 125 * AT_COUNTER_TOO_SMALL during re-authentication. Since we
157 /* Do not update pseudonym during re-authentication */
166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication "
167 "count exceeded - force full authentication");
253 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Re-authentication");
469 wpa_printf(MSG_DEBUG, "EAP-SIM: Using fast re-authentication");
506 /* Full authentication */
527 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication triplets "
534 "authentication triplets for the peer");
614 wpa_printf(MSG_WARNING, "EAP-SIM: Re-authentication message
    [all...]
  /libcore/luni/src/main/java/javax/net/ssl/
SSLSocket.java 941 * Sets whether the server should require client authentication. This
943 * Client authentication is one of the following:
945 * <li>authentication required</li>
946 * <li>authentication requested</li>
947 * <li>no authentication needed</li>
954 * Sets whether the server should request client authentication. Unlike
957 * #getUseClientMode() client mode}.The client authentication is one of:
959 * <li>authentication required</li>
960 * <li>authentication requested</li>
961 * <li>no authentication needed</li
    [all...]
  /external/srtp/include/
srtp.h 83 * (authentication tag and MKI) supported by libSRTP. This value is
107 sec_serv_auth = 2, /**< authentication */
108 sec_serv_conf_and_auth = 3 /**< confidentiality and authentication */
127 * authentication function. */
128 int auth_key_len; /**< The length of the authentication
130 int auth_tag_len; /**< The length of the authentication
293 * @warning This function assumes that it can write the authentication
352 * authentication check.
497 * policy structure to a short-authentication tag policy
505 * Counter Mode encryption and HMAC-SHA1 authentication, with a
    [all...]
  /external/chromium_org/chrome/browser/chromeos/login/users/
user.h 34 // Guest user, logs in without authentication.
36 // Retail mode user, logs in without authentication. This is a special user
39 // Public account user, logs in without authentication. Available only if
43 // authentication.
45 // Kiosk app robot, logs in without authentication.
135 // Whether online authentication against GAIA should be enforced during the
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
app_codelab7_useridentification.html 8 <li> Third Party Authentication (Twitter, Foursquare, etc.)</li>
12 Apps with authentication require the experimental permission in the
23 <p>Chrome Apps have a dedicated API for lauching the authentication flow to any third-party OAuth2 service, called $(ref:identity.launchWebAuthFlow).
61 <p>Now we are ready to ask user&#39;s authorization, so we can connect to the Tasks service and import his tasks into our Todo list. First, we will need to request an access token - which, at the first run will automatically pops up an authentication and authorization window to the user.
65 <li><p>Since this is time consuming and error prone, you can cheat and copy our JavaScript that handles the authentication to the Google Tasks API from here: <a href="https://github.com/GoogleChrome/chrome-app-codelab/blob/master/lab7_useridentification/angularjs/gapi_tasks.js">Angular gapi_tasks.js</a>
72 <p class="note"><b>Note:</b> This script is NOT intented to be used in production - it is just a very simple, limited and definitely not robust piece of code intented to highlight the basic authentication and API calls.</p></li>
app_identity.html 1 <h1>User Authentication</h1>
4 Web authentication protocols utilize HTTP features,
35 Apps that want to perform authentication with non-Google identity
42 <h2 id="google">Google account authentication</h2>
55 <li>Get the authentication token.</li>
252 <h2 id="non">Non-Google account authentication</h2>
261 <li>Get the authentication token.</li>
317 The provider will perform authentication and if appropriate,
  /external/chromium_org/net/socket_stream/
socket_stream.h 45 // For proxy authentication, only basic mechanisum is supported. It will try
46 // authentication identity for proxy URL first. If server requires proxy
47 // authentication, it will try authentication identity for realm that server
85 // Called when proxy authentication required.
155 // Restarts with authentication info.
  /external/chromium_org/third_party/libsrtp/srtp/test/
srtp_driver.c 759 * if the policy includes authentication, then test for false positives
795 /* unprotect, and check for authentication failure */
962 * if the policy includes authentication, then test for false positives
998 /* unprotect, and check for authentication failure */
1027 "authentication",
1028 "confidentiality and authentication"
    [all...]
  /frameworks/base/core/java/android/net/http/
RequestHandle.java 36 * redirects, HTTP authentication requests, etc.
155 // be careful and remove authentication headers, if any
222 * Create and queue an HTTP authentication-response (basic) request.
234 * Create and queue an HTTP authentication-response (digest) request.
273 * @return Basic-scheme authentication response: BASE64(username:password).
294 * @return Digest-scheme authentication response.
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf 117 # EAP fast re-authentication
118 # By default, fast re-authentication is enabled for all EAP methods that
119 # support it. This variable can be used to disable fast re-authentication.
384 # where client certificate/private key is used for authentication
430 # points support authentication with this credential. This is an
441 # phase1: Pre-configure Phase 1 (outer authentication) parameters
444 # phase2: Pre-configure Phase 2 (inner authentication) parameters
639 # WPA-EAP = WPA using EAP authentication
640 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
657 # auth_alg: list of allowed IEEE 802.11 authentication algorithm
    [all...]
ChangeLog 111 * fixed GSM authentication on USIM
124 * added support for simultaneous authentication of equals (SAE) for
125 stronger password-based authentication with WPA2-Personal
421 * disable network block temporarily on authentication failures
485 pre-authentication with nl80211 interface and drivers that handle
    [all...]
  /external/conscrypt/src/main/java/org/conscrypt/
SSLParametersImpl.java 52 * ssl socket, whether it require/want client authentication or not,
58 // default source of X.509 certificate based authentication keys
60 // default source of X.509 certificate based authentication trust decisions
73 // source of X.509 certificate based authentication keys or null if not provided
75 // source of Pre-Shared Key (PSK) authentication keys or null if not provided.
77 // source of X.509 certificate based authentication trust decisions or null if not provided
89 // if the peer with this parameters tuned to require client authentication
91 // if the peer with this parameters tuned to request client authentication
279 * Tunes the peer holding this parameters to require client authentication
289 * to require client authentication
    [all...]
  /external/smack/src/org/jivesoftware/smack/
ConnectionConfiguration.java 87 // Holds the authentication information for future reconnections
554 * Returns true if the client is going to use SASL authentication when logging into the
555 * server. If SASL authenticatin fails then the client will try to use non-sasl authentication.
558 * @return true if the client is going to use SASL authentication when logging into the
566 * Sets whether the client will use SASL authentication when logging into the
567 * server. If SASL authenticatin fails then the client will try to use non-sasl authentication.
570 * @param saslAuthenticationEnabled if the client is going to use SASL authentication when
662 * principal information during the SASL authentication. A CallbackHandler
664 * using SASL authentication.
667 * principal information during the SASL authentication
    [all...]
  /external/apache-http/src/org/apache/http/auth/
InvalidCredentialsException.java 34 * Authentication credentials required to respond to a authentication
  /external/apache-http/src/org/apache/http/client/protocol/
RequestTargetAuthentication.java 76 // Obtain authentication state
99 this.log.error("Authentication error: " + ex.getMessage());
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMEngine.java 34 * Abstract NTLM authentication engine. The engine can be used to
59 * authentication challenge.
UnsupportedDigestAlgorithmException.java 34 * Authentication credentials required to respond to a authentication
  /external/chromium_org/chrome/browser/chromeos/login/auth/
login_status_consumer.h 84 return "Google authentication failed.";
110 // authentication for Chromium OS.
  /external/chromium_org/chrome/browser/resources/login/
user_pod_template.html 10 <!-- Password Authentication -->
16 <!-- User Click Authentication -->
  /external/chromium_org/chrome/browser/ui/android/
chrome_http_auth_handler.h 16 // ContentViewClient to allow it to respond to HTTP authentication requests
48 // Cancels the authentication attempt of the observer.
  /external/chromium_org/chrome/service/cloud_print/
cloud_print_auth.h 18 // authentication tasks for Cloud Print.
94 // authentication with an LSID. This is only used for storing in prefs for
cloud_print_proxy_backend.h 85 // authentication.
87 // Our core, which communicates with AuthWatcher for GAIA authentication and
  /external/chromium_org/content/public/android/java/src/org/chromium/content/browser/
DownloadController.java 91 * be either a POST download or a GET download with authentication.
107 * download. This can be either a POST download or a GET download with authentication.

Completed in 1329 milliseconds

<<11121314151617181920>>