HomeSort by relevance Sort by last modified time
    Searched full:authentication (Results 326 - 350 of 1714) sorted by null

<<11121314151617181920>>

  /external/chromium_org/crypto/
p224_spake_unittest.cc 29 CHECK(false) << "Parties differ on whether authentication was successful";
110 // If we have corrupted anything, we expect the authentication to fail,
  /external/chromium_org/net/socket/
unix_domain_socket_posix.h 36 // Returns an authentication callback that always grants access for
37 // convenience in case you don't want to use authentication.
  /external/chromium_org/net/third_party/nss/ssl/
sslenum.c 33 * * Within symmetric algorithm sections, order by message authentication
35 * * Within message authentication algorithm sections, order by asymmetric
  /external/chromium_org/remoting/android/java/src/org/chromium/chromoting/
Chromoting.java 39 * also requests and renews authentication tokens using the system account manager.
44 /** Only accounts of this type will be selectable for authentication. */
47 /** Scopes at which the authentication token we request will be valid. */
93 * This is set when receiving an authentication error from the HostListLoader. If that occurs,
94 * this flag is set and a fresh authentication token is fetched from the AccountsService, and
147 * authentication token from the system.
316 // User canceled authentication. No need to report an error.
402 // Authentication truly failed.
  /external/chromium_org/third_party/libsrtp/srtp/crypto/include/
xfm.h 55 * provides both confidentiality and message authentication.
77 * and authentication tag (after the call)
  /external/chromium_org/third_party/openssl/openssl/crypto/poly1305/
poly1305.h 71 * authentication tag with the one-time key |key|. Note that |key| is a
84 * authentication tag to |mac|. */
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
poly1305.h 71 * authentication tag with the one-time key |key|. Note that |key| is a
84 * authentication tag to |mac|. */
  /external/ppp/pppd/
upap.c 2 * upap.c - User/Password Authentication Protocol.
73 "Set time limit for peer PAP authentication", OPT_PRIO },
298 error("PAP authentication failed due to protocol-reject");
302 error("PAP authentication of peer failed (protocol-reject)");
452 notice("PAP peer authentication succeeded for %q", rhostname);
456 warn("PAP peer authentication failed for %q", rhostname);
501 notice("PAP authentication succeeded");
542 error("PAP authentication failed");
  /external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/
Socks5Proxy.java 59 * <li>only supports the no-authentication authentication method</li>
368 // second byte number of authentication methods supported
371 // read list of supported authentication methods
378 // only authentication method 0, no authentication, supported
391 throw new XMPPException("Authentication method not supported");
394 authMethodSelectionResponse[1] = (byte) 0x00; // no-authentication method
  /external/wpa_supplicant_8/hs20/server/
hs20_spp_server.c 105 debug_print(ctx, 1, "Request HTTP authentication");
106 return 2; /* Request authentication */
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 2 * hostapd / IEEE 802.11 authentication (ACL)
8 * Access control list for IEEE 802.11 authentication can uses statically
11 * authentication frame processing.
49 u8 *auth_msg; /* IEEE 802.11 authentication frame from station */
219 * @msg: Authentication message
467 * hostapd_acl_recv_radius - Process incoming RADIUS Authentication messages
574 /* Re-send original authentication frame for 802.11 processing */
575 wpa_printf(MSG_DEBUG, "Re-sending authentication frame after "
  /external/wpa_supplicant_8/src/crypto/
aes-omac1.c 38 * This is a mode for using block cipher (AES in this case) for authentication.
111 * This is a mode for using block cipher (AES in this case) for authentication.
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm_i.h 92 /* Backend Authentication state machine */
157 * Authentication server */
  /libcore/support/src/test/java/libcore/javax/net/ssl/
TestTrustManager.java 105 * authentication of peers.
108 * authentication of peers.
  /external/srtp/test/
srtp_driver.c 711 * if the policy includes authentication, then test for false positives
746 /* unprotect, and check for authentication failure */
910 * if the policy includes authentication, then test for false positives
945 /* unprotect, and check for authentication failure */
972 "authentication",
973 "confidentiality and authentication"
    [all...]
  /external/apache-http/src/org/apache/http/impl/client/
DefaultRequestDirector.java 138 /** The target authentication handler. */
141 /** The proxy authentication handler. */
209 ("Target authentication handler may not be null.");
213 ("Proxy authentication handler may not be null.");
730 this.log.error("Proxy authentication error: " + ex.getMessage());
750 this.log.debug("Proxy requested authentication");
759 this.log.warn("Authentication error: " + ex.getMessage());
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
Mac.java 5 * The base interface for implementations of message authentication codes (MACs).
  /external/chromium_org/android_webview/java/src/org/chromium/android_webview/
HttpAuthDatabase.java 158 * Sets the HTTP authentication password. Tuple (HTTPAUTH_HOST_COL, HTTPAUTH_REALM_COL,
181 * Retrieves the HTTP authentication username and password for a given host and realm pair. If
221 * Determines if there are any HTTP authentication passwords saved.
245 * Clears the HTTP authentication password database.
  /external/chromium_org/chrome/browser/chromeos/login/signin/
oauth2_login_manager.h 53 // Generate OAuth2 refresh token from authentication profile's cookie jar.
60 // Restore session from authentication code passed via command line.
104 // Stops all background authentication requests.
171 // Signals delegate that authentication is completed, kicks off token fetching
oauth2_token_fetcher.h 24 // authentication profile into OAuth2 tokens and GAIA credentials that will be
  /external/chromium_org/chrome/browser/resources/inline_login/
inline_login.js 35 * @param {!Object} credentials Credentials of the completed authentication.
  /external/chromium_org/chrome/browser/signin/
fake_signin_manager.h 40 // A signin manager that bypasses actual authentication routines with servers
  /external/chromium_org/chrome/common/extensions/docs/server2/
github_file_system.py 40 # Check if Github authentication failed.
42 logging.error('Github authentication failed for %s, falling back to '
182 # Check if Github authentication failed.
184 logging.warning('Github authentication failed for %s, falling back to '
  /external/chromium_org/chromeos/test/data/network/
toplevel_openvpn_clientcert_with_cert_pems.onc 32 "RemoteCertEKU": "TLS Web Server Authentication",
toplevel_partially_invalid.onc 36 "Authentication": "None"

Completed in 1014 milliseconds

<<11121314151617181920>>