OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:authentication
(Results
326 - 350
of
1714
) sorted by null
<<
11
12
13
14
15
16
17
18
19
20
>>
/external/chromium_org/crypto/
p224_spake_unittest.cc
29
CHECK(false) << "Parties differ on whether
authentication
was successful";
110
// If we have corrupted anything, we expect the
authentication
to fail,
/external/chromium_org/net/socket/
unix_domain_socket_posix.h
36
// Returns an
authentication
callback that always grants access for
37
// convenience in case you don't want to use
authentication
.
/external/chromium_org/net/third_party/nss/ssl/
sslenum.c
33
* * Within symmetric algorithm sections, order by message
authentication
35
* * Within message
authentication
algorithm sections, order by asymmetric
/external/chromium_org/remoting/android/java/src/org/chromium/chromoting/
Chromoting.java
39
* also requests and renews
authentication
tokens using the system account manager.
44
/** Only accounts of this type will be selectable for
authentication
. */
47
/** Scopes at which the
authentication
token we request will be valid. */
93
* This is set when receiving an
authentication
error from the HostListLoader. If that occurs,
94
* this flag is set and a fresh
authentication
token is fetched from the AccountsService, and
147
*
authentication
token from the system.
316
// User canceled
authentication
. No need to report an error.
402
//
Authentication
truly failed.
/external/chromium_org/third_party/libsrtp/srtp/crypto/include/
xfm.h
55
* provides both confidentiality and message
authentication
.
77
* and
authentication
tag (after the call)
/external/chromium_org/third_party/openssl/openssl/crypto/poly1305/
poly1305.h
71
*
authentication
tag with the one-time key |key|. Note that |key| is a
84
*
authentication
tag to |mac|. */
/external/chromium_org/third_party/openssl/openssl/include/openssl/
poly1305.h
71
*
authentication
tag with the one-time key |key|. Note that |key| is a
84
*
authentication
tag to |mac|. */
/external/ppp/pppd/
upap.c
2
* upap.c - User/Password
Authentication
Protocol.
73
"Set time limit for peer PAP
authentication
", OPT_PRIO },
298
error("PAP
authentication
failed due to protocol-reject");
302
error("PAP
authentication
of peer failed (protocol-reject)");
452
notice("PAP peer
authentication
succeeded for %q", rhostname);
456
warn("PAP peer
authentication
failed for %q", rhostname);
501
notice("PAP
authentication
succeeded");
542
error("PAP
authentication
failed");
/external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/
Socks5Proxy.java
59
* <li>only supports the no-
authentication
authentication
method</li>
368
// second byte number of
authentication
methods supported
371
// read list of supported
authentication
methods
378
// only
authentication
method 0, no
authentication
, supported
391
throw new XMPPException("
Authentication
method not supported");
394
authMethodSelectionResponse[1] = (byte) 0x00; // no-
authentication
method
/external/wpa_supplicant_8/hs20/server/
hs20_spp_server.c
105
debug_print(ctx, 1, "Request HTTP
authentication
");
106
return 2; /* Request
authentication
*/
/external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c
2
* hostapd / IEEE 802.11
authentication
(ACL)
8
* Access control list for IEEE 802.11
authentication
can uses statically
11
*
authentication
frame processing.
49
u8 *auth_msg; /* IEEE 802.11
authentication
frame from station */
219
* @msg:
Authentication
message
467
* hostapd_acl_recv_radius - Process incoming RADIUS
Authentication
messages
574
/* Re-send original
authentication
frame for 802.11 processing */
575
wpa_printf(MSG_DEBUG, "Re-sending
authentication
frame after "
/external/wpa_supplicant_8/src/crypto/
aes-omac1.c
38
* This is a mode for using block cipher (AES in this case) for
authentication
.
111
* This is a mode for using block cipher (AES in this case) for
authentication
.
/external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm_i.h
92
/* Backend
Authentication
state machine */
157
*
Authentication
server */
/libcore/support/src/test/java/libcore/javax/net/ssl/
TestTrustManager.java
105
*
authentication
of peers.
108
*
authentication
of peers.
/external/srtp/test/
srtp_driver.c
711
* if the policy includes
authentication
, then test for false positives
746
/* unprotect, and check for
authentication
failure */
910
* if the policy includes
authentication
, then test for false positives
945
/* unprotect, and check for
authentication
failure */
972
"
authentication
",
973
"confidentiality and
authentication
"
[
all
...]
/external/apache-http/src/org/apache/http/impl/client/
DefaultRequestDirector.java
138
/** The target
authentication
handler. */
141
/** The proxy
authentication
handler. */
209
("Target
authentication
handler may not be null.");
213
("Proxy
authentication
handler may not be null.");
730
this.log.error("Proxy
authentication
error: " + ex.getMessage());
750
this.log.debug("Proxy requested
authentication
");
759
this.log.warn("
Authentication
error: " + ex.getMessage());
[
all
...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
Mac.java
5
* The base interface for implementations of message
authentication
codes (MACs).
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/
HttpAuthDatabase.java
158
* Sets the HTTP
authentication
password. Tuple (HTTPAUTH_HOST_COL, HTTPAUTH_REALM_COL,
181
* Retrieves the HTTP
authentication
username and password for a given host and realm pair. If
221
* Determines if there are any HTTP
authentication
passwords saved.
245
* Clears the HTTP
authentication
password database.
/external/chromium_org/chrome/browser/chromeos/login/signin/
oauth2_login_manager.h
53
// Generate OAuth2 refresh token from
authentication
profile's cookie jar.
60
// Restore session from
authentication
code passed via command line.
104
// Stops all background
authentication
requests.
171
// Signals delegate that
authentication
is completed, kicks off token fetching
oauth2_token_fetcher.h
24
//
authentication
profile into OAuth2 tokens and GAIA credentials that will be
/external/chromium_org/chrome/browser/resources/inline_login/
inline_login.js
35
* @param {!Object} credentials Credentials of the completed
authentication
.
/external/chromium_org/chrome/browser/signin/
fake_signin_manager.h
40
// A signin manager that bypasses actual
authentication
routines with servers
/external/chromium_org/chrome/common/extensions/docs/server2/
github_file_system.py
40
# Check if Github
authentication
failed.
42
logging.error('Github
authentication
failed for %s, falling back to '
182
# Check if Github
authentication
failed.
184
logging.warning('Github
authentication
failed for %s, falling back to '
/external/chromium_org/chromeos/test/data/network/
toplevel_openvpn_clientcert_with_cert_pems.onc
32
"RemoteCertEKU": "TLS Web Server
Authentication
",
toplevel_partially_invalid.onc
36
"
Authentication
": "None"
Completed in 1014 milliseconds
<<
11
12
13
14
15
16
17
18
19
20
>>