/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 126 * wpa_supplicant_eapol_send - Send IEEE 802.1X EAPOL packet to Authenticator 134 * to the current Authenticator. 163 * However, we've already waited for the AP/Authenticator to
|
README | 229 the Authenticator (AP) and Supplicant (client station). 233 the Authenticator and Supplicant. This handshake is also used to 234 verify that both Authenticator and Supplicant know the master session 259 negotiation with a WPA Authenticator and EAP authentication with 276 Authenticator in the AP) 280 with the Authenticator (AP) [all...] |
/hardware/libhardware/include/hardware/ |
keymaster_defs.h | 98 KM_TAG_USER_SECURE_ID = KM_ULONG_REP | 502, /* Secure ID of authorized user or authenticator(s). 102 KM_TAG_USER_AUTH_TYPE = KM_ENUM | 504, /* Bitmask of authenticator types allowed when 104 * rather than a secure authenticator ID. Defined in
|
fingerprint.h | 192 * Function return: current authenticator id or 0 if function failed.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
wanrouter.h | 29 * Added 'authenticator' to 'wan_ppp_conf_t' 174 char authenticator; /* AUTHENTICATOR or not */ member in struct:wan_ppp_conf
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
wanrouter.h | 29 * Added 'authenticator' to 'wan_ppp_conf_t' 174 char authenticator; /* AUTHENTICATOR or not */ member in struct:wan_ppp_conf
|
/prebuilts/tools/common/m2/repository/com/sun/istack/istack-commons-tools/2.21/ |
istack-commons-tools-2.21.jar | |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 261 * Authenticator is going to start authentication immediately 264 * EAPOL-Start if Authenticator does not start authentication. 785 * Supplicant corresponds to MS-MPPE-Recv-Key in Authenticator. 874 /* Send EAP-Packet from the EAP layer to the Authenticator */ [all...] |
/external/okhttp/ |
CHANGELOG.md | 447 * **OkAuthenticator has been replaced with Authenticator.** This new 448 authenticator has access to the full incoming response and can respond with 490 * Support OAuth in `Authenticator`.
|
/frameworks/base/services/core/java/com/android/server/fingerprint/ |
FingerprintService.java | [all...] |
/libcore/ojluni/src/main/java/java/net/ |
HttpURLConnection.java | 186 * {@link Authenticator} to set the VM-wide authentication handler: 188 * Authenticator.setDefault(new Authenticator() { [all...] |
/cts/tests/tests/content/ |
AndroidManifest.xml | 198 android:resource="@xml/authenticator" />
|
/development/samples/SampleSyncAdapter/src/com/example/android/samplesync/authenticator/ |
AuthenticatorActivity.java | 17 package com.example.android.samplesync.authenticator;
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.pde.api.tools.ee.cdcfoundation10_1.0.0.200901281111/org/eclipse/pde/api/tools/internal/api_stubs/ |
CDC-1.0_Foundation-1.0.zip | |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.pde.api.tools.ee.cdcfoundation11_1.0.0.200901281111/org/eclipse/pde/api/tools/internal/api_stubs/ |
CDC-1.1_Foundation-1.1.zip | |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.pde.api.tools.ee.osgiminimum12_1.0.1.200904031014/org/eclipse/pde/api/tools/internal/api_stubs/ |
OSGi_Minimum-1.2.zip | |
/external/jetty/src/java/org/eclipse/jetty/server/ |
Authentication.java | 83 /** Login with the LOGIN authenticator
|
/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 320 /* Authenticator does not need SMK anymore and it is required to forget
|
wpa_auth_glue.c | 2 * hostapd / WPA authenticator glue code 142 wpa_printf(MSG_DEBUG, "%s: WPA authenticator requests disconnect: "
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 2 * WPA/RSN - Shared functions for supplicant and authenticator 1036 * @aa: Authenticator address 1071 * @aa: Authenticator address 1104 * @aa: Authenticator address [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpc/ |
clnt.h | 131 AUTH *cl_auth; /* authenticator */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpc/ |
clnt.h | 131 AUTH *cl_auth; /* authenticator */
|
/external/tcpdump/ |
print-esp.c | 152 * remove authenticator, and see if we still have something to 319 * for the moment, ignore the auth algorith, just hard code the authenticator
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 359 wpa_printf(MSG_WARNING, "EAP-MSCHAPV2: Invalid authenticator " 605 /* Authenticator response is not really needed yet, but calculate it
|
/frameworks/base/obex/javax/obex/ |
ServerSession.java | 70 * @param auth the authenticator to use with this connection 74 public ServerSession(ObexTransport trans, ServerRequestHandler handler, Authenticator auth)
|