/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 8 * This file implements an example authentication algorithm defined for 3GPP 31 * @amf: AMF = 16-bit authentication management field 32 * @mac_a: Buffer for MAC-A = 64-bit network authentication code, or %NULL 33 * @mac_s: Buffer for MAC-S = 64-bit resync authentication code, or %NULL 163 * @amf: AMF = 16-bit authentication management field 167 * @autn: Buffer for AUTN = 128-bit authentication token 204 * @auts: AUTS = 112-bit authentication token from client 227 * gsm_milenage - Generate GSM-Milenage (3GPP TS 55.205) authentication triplet 262 * @autn: AUTN = 128-bit authentication token
|
/system/keymaster/include/keymaster/ |
keymaster_defs.h | 92 /* User authentication */ 96 KM_TAG_NO_AUTH_REQUIRED = KM_BOOL | 502, /* If key is usable without authentication. */ 101 KM_TAG_AUTH_TIMEOUT = KM_INT | 504, /* Required freshness of user authentication for 103 Public key operations require no authentication. 104 If absent, authentication is required for every 105 use. Authentication state is lost when the 107 KM_TAG_RESCOPE_AUTH_TIMEOUT = KM_INT | 505, /* Required freshness of user authentication for key 109 operations require no authentication. If absent, 110 authentication required for every rescoping. */
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 125 * AT_COUNTER_TOO_SMALL during re-authentication. Since we 157 /* Do not update pseudonym during re-authentication */ 166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " 167 "count exceeded - force full authentication"); 253 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Re-authentication"); 469 wpa_printf(MSG_DEBUG, "EAP-SIM: Using fast re-authentication"); 506 /* Full authentication */ 527 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication triplets " 534 "authentication triplets for the peer"); 614 wpa_printf(MSG_WARNING, "EAP-SIM: Re-authentication message [all...] |
/libcore/luni/src/main/java/javax/net/ssl/ |
SSLSocket.java | 941 * Sets whether the server should require client authentication. This 943 * Client authentication is one of the following: 945 * <li>authentication required</li> 946 * <li>authentication requested</li> 947 * <li>no authentication needed</li> 954 * Sets whether the server should request client authentication. Unlike 957 * #getUseClientMode() client mode}.The client authentication is one of: 959 * <li>authentication required</li> 960 * <li>authentication requested</li> 961 * <li>no authentication needed</li [all...] |
/external/srtp/include/ |
srtp.h | 83 * (authentication tag and MKI) supported by libSRTP. This value is 107 sec_serv_auth = 2, /**< authentication */ 108 sec_serv_conf_and_auth = 3 /**< confidentiality and authentication */ 127 * authentication function. */ 128 int auth_key_len; /**< The length of the authentication 130 int auth_tag_len; /**< The length of the authentication 293 * @warning This function assumes that it can write the authentication 352 * authentication check. 497 * policy structure to a short-authentication tag policy 505 * Counter Mode encryption and HMAC-SHA1 authentication, with a [all...] |
/external/chromium_org/chrome/browser/chromeos/login/users/ |
user.h | 34 // Guest user, logs in without authentication. 36 // Retail mode user, logs in without authentication. This is a special user 39 // Public account user, logs in without authentication. Available only if 43 // authentication. 45 // Kiosk app robot, logs in without authentication. 135 // Whether online authentication against GAIA should be enforced during the
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
app_codelab7_useridentification.html | 8 <li> Third Party Authentication (Twitter, Foursquare, etc.)</li> 12 Apps with authentication require the experimental permission in the 23 <p>Chrome Apps have a dedicated API for lauching the authentication flow to any third-party OAuth2 service, called $(ref:identity.launchWebAuthFlow). 61 <p>Now we are ready to ask user's authorization, so we can connect to the Tasks service and import his tasks into our Todo list. First, we will need to request an access token - which, at the first run will automatically pops up an authentication and authorization window to the user. 65 <li><p>Since this is time consuming and error prone, you can cheat and copy our JavaScript that handles the authentication to the Google Tasks API from here: <a href="https://github.com/GoogleChrome/chrome-app-codelab/blob/master/lab7_useridentification/angularjs/gapi_tasks.js">Angular gapi_tasks.js</a> 72 <p class="note"><b>Note:</b> This script is NOT intented to be used in production - it is just a very simple, limited and definitely not robust piece of code intented to highlight the basic authentication and API calls.</p></li>
|
app_identity.html | 1 <h1>User Authentication</h1> 4 Web authentication protocols utilize HTTP features, 35 Apps that want to perform authentication with non-Google identity 42 <h2 id="google">Google account authentication</h2> 55 <li>Get the authentication token.</li> 252 <h2 id="non">Non-Google account authentication</h2> 261 <li>Get the authentication token.</li> 317 The provider will perform authentication and if appropriate,
|
/external/chromium_org/net/socket_stream/ |
socket_stream.h | 45 // For proxy authentication, only basic mechanisum is supported. It will try 46 // authentication identity for proxy URL first. If server requires proxy 47 // authentication, it will try authentication identity for realm that server 85 // Called when proxy authentication required. 155 // Restarts with authentication info.
|
/external/chromium_org/third_party/libsrtp/srtp/test/ |
srtp_driver.c | 759 * if the policy includes authentication, then test for false positives 795 /* unprotect, and check for authentication failure */ 962 * if the policy includes authentication, then test for false positives 998 /* unprotect, and check for authentication failure */ 1027 "authentication", 1028 "confidentiality and authentication" [all...] |
/frameworks/base/core/java/android/net/http/ |
RequestHandle.java | 36 * redirects, HTTP authentication requests, etc. 155 // be careful and remove authentication headers, if any 222 * Create and queue an HTTP authentication-response (basic) request. 234 * Create and queue an HTTP authentication-response (digest) request. 273 * @return Basic-scheme authentication response: BASE64(username:password). 294 * @return Digest-scheme authentication response.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 117 # EAP fast re-authentication 118 # By default, fast re-authentication is enabled for all EAP methods that 119 # support it. This variable can be used to disable fast re-authentication. 384 # where client certificate/private key is used for authentication 430 # points support authentication with this credential. This is an 441 # phase1: Pre-configure Phase 1 (outer authentication) parameters 444 # phase2: Pre-configure Phase 2 (inner authentication) parameters 639 # WPA-EAP = WPA using EAP authentication 640 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically 657 # auth_alg: list of allowed IEEE 802.11 authentication algorithm [all...] |
ChangeLog | 111 * fixed GSM authentication on USIM 124 * added support for simultaneous authentication of equals (SAE) for 125 stronger password-based authentication with WPA2-Personal 421 * disable network block temporarily on authentication failures 485 pre-authentication with nl80211 interface and drivers that handle [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
SSLParametersImpl.java | 52 * ssl socket, whether it require/want client authentication or not, 58 // default source of X.509 certificate based authentication keys 60 // default source of X.509 certificate based authentication trust decisions 73 // source of X.509 certificate based authentication keys or null if not provided 75 // source of Pre-Shared Key (PSK) authentication keys or null if not provided. 77 // source of X.509 certificate based authentication trust decisions or null if not provided 89 // if the peer with this parameters tuned to require client authentication 91 // if the peer with this parameters tuned to request client authentication 279 * Tunes the peer holding this parameters to require client authentication 289 * to require client authentication [all...] |
/external/smack/src/org/jivesoftware/smack/ |
ConnectionConfiguration.java | 87 // Holds the authentication information for future reconnections 554 * Returns true if the client is going to use SASL authentication when logging into the 555 * server. If SASL authenticatin fails then the client will try to use non-sasl authentication. 558 * @return true if the client is going to use SASL authentication when logging into the 566 * Sets whether the client will use SASL authentication when logging into the 567 * server. If SASL authenticatin fails then the client will try to use non-sasl authentication. 570 * @param saslAuthenticationEnabled if the client is going to use SASL authentication when 662 * principal information during the SASL authentication. A CallbackHandler 664 * using SASL authentication. 667 * principal information during the SASL authentication [all...] |
/external/apache-http/src/org/apache/http/auth/ |
InvalidCredentialsException.java | 34 * Authentication credentials required to respond to a authentication
|
/external/apache-http/src/org/apache/http/client/protocol/ |
RequestTargetAuthentication.java | 76 // Obtain authentication state 99 this.log.error("Authentication error: " + ex.getMessage());
|
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMEngine.java | 34 * Abstract NTLM authentication engine. The engine can be used to 59 * authentication challenge.
|
UnsupportedDigestAlgorithmException.java | 34 * Authentication credentials required to respond to a authentication
|
/external/chromium_org/chrome/browser/chromeos/login/auth/ |
login_status_consumer.h | 84 return "Google authentication failed."; 110 // authentication for Chromium OS.
|
/external/chromium_org/chrome/browser/resources/login/ |
user_pod_template.html | 10 <!-- Password Authentication --> 16 <!-- User Click Authentication -->
|
/external/chromium_org/chrome/browser/ui/android/ |
chrome_http_auth_handler.h | 16 // ContentViewClient to allow it to respond to HTTP authentication requests 48 // Cancels the authentication attempt of the observer.
|
/external/chromium_org/chrome/service/cloud_print/ |
cloud_print_auth.h | 18 // authentication tasks for Cloud Print. 94 // authentication with an LSID. This is only used for storing in prefs for
|
cloud_print_proxy_backend.h | 85 // authentication. 87 // Our core, which communicates with AuthWatcher for GAIA authentication and
|
/external/chromium_org/content/public/android/java/src/org/chromium/content/browser/ |
DownloadController.java | 91 * be either a POST download or a GET download with authentication. 107 * download. This can be either a POST download or a GET download with authentication.
|