/external/wpa_supplicant_8/hs20/server/ca/ |
hs20.oid | 4 1.3.6.1.4.1.40808.1.1.2 id-kp-HS2.0Auth
|
/frameworks/base/services/tests/servicestests/assets/DevicePolicyManagerServiceMigrationTest3/ |
profile_device_policies.xml | 5 <strong-auth-unlock-timeout value="0" />
|
/prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-parent/0.3.0/ |
BUILD | 7 source = "google-auth-library-parent-0.3.0.pom",
|
/prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-parent/0.4.0/ |
BUILD | 7 source = "google-auth-library-parent-0.4.0.pom",
|
/prebuilts/tools/common/google-api-java-client/1.8.0-rc/ |
google-api-java-client-min-repackaged.jar | |
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMScheme.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/NTLMScheme.java $ 31 package org.apache.http.impl.auth; 35 import org.apache.http.auth.AUTH; 36 import org.apache.http.auth.AuthenticationException; 37 import org.apache.http.auth.Credentials; 38 import org.apache.http.auth.InvalidCredentialsException; 39 import org.apache.http.auth.MalformedChallengeException; 40 import org.apache.http.auth.NTCredentials; 41 import org.apache.http.impl.auth.AuthSchemeBase [all...] |
/external/curl/tests/data/ |
test2040 | 6 HTTP Basic auth 12 <!-- First request has Basic auth, right password --> 22 <!-- Second request with Basic auth disabled -->
|
test831 | 6 SASL AUTH NTLM 15 AUTH NTLM 19 REPLY * A002 NO AUTH exchange cancelled by client
|
test2027 | 6 HTTP Digest auth 18 new response just as a duplicate and it sends another and detects the auth 23 <!-- First request has Digest auth, wrong password --> 25 HTTP/1.1 401 Need Digest auth
44 <!-- Second request has Digest auth, right password --> 46 HTTP/1.1 401 Need Digest auth (2)
64 <!-- Third request has Digest auth, wrong password --> 66 HTTP/1.1 401 Need Digest auth (3)
85 <!-- Fourth request has Digest auth, wrong password --> 87 HTTP/1.1 401 Need Digest auth (4) [all...] |
test168 | 7 HTTP proxy Digest auth 8 HTTP Digest auth 15 # this is returned first since we get no proxy-auth 23 # then this is returned since we get no server-auth 36 Nice auth sir! 50 Nice auth sir!
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
tmpCallbackHandler.java | 27 import javax.security.auth.callback.Callback; 28 import javax.security.auth.callback.CallbackHandler; 29 import javax.security.auth.callback.UnsupportedCallbackException;
|
/external/dhcpcd-6.8.2/ |
auth.c | 39 #include "auth.h" 106 dhcp_auth_validate(struct authstate *state, const struct auth *auth, 134 if (!(auth->options & DHCPCD_AUTH_SEND)) { 141 } else if (protocol != auth->protocol || 142 algorithm != auth->algorithm || 143 rdm != auth->rdm) 148 auth->options & DHCPCD_AUTH_REQUIRE) 274 TAILQ_FOREACH(t, &auth->tokens, next) { 388 get_next_rdm_monotonic_counter(struct auth *auth [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/auth/ |
DestroyFailedExceptionTest.java | 18 package org.apache.harmony.tests.javax.security.auth; 21 import javax.security.auth.DestroyFailedException; 37 * javax.security.auth.DestroyFailedException#DestroyFailedException() 47 * javax.security.auth.DestroyFailedException#DestroyFailedException(String msg) 60 * javax.security.auth.DestroyFailedException#DestroyFailedException(String msg)
|
LoginExceptionTest.java | 18 package org.apache.harmony.tests.javax.security.auth; 22 import javax.security.auth.login.LoginException; 37 * javax.security.auth.login.LoginException#LoginException() 47 * javax.security.auth.login.LoginException#LoginException(String msg) 60 * javax.security.auth.login.LoginException#LoginException(String msg)
|
/prebuilts/tools/common/google-api-java-client/1.20.0/ |
google-api-java-client-min-repackaged-1.20.0.jar | |
/external/wpa_supplicant_8/src/crypto/ |
aes-ccm.c | 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) 127 auth[i] = x[i] ^ tmp[i]; 128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); 132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) 137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); 142 t[i] = auth[i] ^ tmp[i]; 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) 169 aes_ccm_encr_auth(aes, M, x, a, auth); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 196 aes_ccm_decr_auth(aes, M, a, auth, t) [all...] |
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.microsoft | 35 ATTRIBUTE MS-Acct-Auth-Type 23 integer Microsoft 67 # MS-Acct-Auth-Type Values 69 VALUE MS-Acct-Auth-Type PAP 1 70 VALUE MS-Acct-Auth-Type CHAP 2 71 VALUE MS-Acct-Auth-Type MS-CHAP-1 3 72 VALUE MS-Acct-Auth-Type MS-CHAP-2 4 73 VALUE MS-Acct-Auth-Type EAP 5
|
/external/volley/src/main/java/com/android/volley/toolbox/ |
AndroidAuthenticator.java | 30 * An Authenticator that uses {@link AccountManager} to get auth 45 * @param authTokenType Auth token type passed to AccountManager 55 * @param authTokenType Auth token type passed to AccountManager 56 * @param notifyAuthFailure Whether to raise a notification upon auth failure 80 * Returns the Auth Token Type used by this authenticator. 96 throw new AuthFailureError("Error while retrieving auth token", e); 107 throw new AuthFailureError("Got null auth token for type: " + mAuthTokenType);
|
/external/webrtc/talk/session/media/ |
externalhmac.h | 31 // External libsrtp HMAC auth module which implements methods defined in 33 // The default auth module will be replaced only when the ENABLE_EXTERNAL_AUTH 35 // as the default auth implementation doesn't provide access and avoids 42 // libsrtp also provides a mechanism to select different auth functions for 44 // the auth_type of srtp_policy_t. The application must first register auth 52 #include "auth.h" // NOLINT 54 #include "third_party/libsrtp/srtp/crypto/include/auth.h"
|
/system/vold/ |
KeyStorage.cpp | 107 static bool generateKeymasterKey(Keymaster& keymaster, const KeyAuthentication& auth, 115 if (auth.token.empty()) { 116 LOG(DEBUG) << "Creating key that doesn't need auth token"; 119 LOG(DEBUG) << "Auth token required for key"; 120 if (auth.token.size() != sizeof(hw_auth_token_t)) { 121 LOG(ERROR) << "Auth token should be " << sizeof(hw_auth_token_t) << " bytes, was " 122 << auth.token.size() << " bytes"; 125 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data()); 133 static AuthorizationSet beginParams(const KeyAuthentication& auth, 140 if (!auth.token.empty()) [all...] |
/external/tcpdump/tests/ |
hsrp_1-v.out | 2 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 4 192.168.0.20.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 6 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 8 192.168.0.20.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 10 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 12 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 14 192.168.0.20.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 18 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 20 192.168.0.20.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 22 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@ [all...] |
hsrp_2-v.out | 2 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 4 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 6 192.168.0.20.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 8 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 12 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 16 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 18 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 22 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 28 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 30 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@ [all...] |
/external/ppp/pppd/plugins/radius/ |
sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) 42 buf = auth->data; 107 vector = (char *)auth->vector; 143 memcpy ((char *) md5buf + secretlen, (char *) auth->vector, 200 AUTH_HDR *auth, *recv_auth; local 262 auth = (AUTH_HDR *) send_buffer; 263 auth->code = data->code; 264 auth->id = data->seq_nbr; 268 total_length = rc_pack_list(data->send_pairs, secret, auth) + AUTH_HDR_LEN; 270 auth->length = htons ((unsigned short) total_length) [all...] |
/external/libdrm/tests/ |
lock.c | 88 struct drm_auth auth; local 91 /* Get a client magic number and pass it to the master for auth. */ 92 ret = ioctl(drmfd, DRM_IOCTL_GET_MAGIC, &auth); 96 ret = write(commfd[0], &auth.magic, sizeof(auth.magic)); 98 err(1, "Couldn't write auth data"); 104 struct drm_auth auth; local 109 ret = read(commfd[1], &auth.magic, sizeof(auth.magic)); 113 ret = ioctl(drmfd, DRM_IOCTL_AUTH_MAGIC, &auth); [all...] |
/external/autotest/client/common_lib/cros/fake_device_server/client_lib/ |
client_lib_test.py | 14 auth code. To get an auth code, run this script with the argument URL 15 which will print out a link for you to visit and get your auth code. 17 Then re-run the test with that auth code like so: 44 help=('Either your auth code or "URL" to return the' 76 # TODO(sosa): Do better. Change this to use fake auth server when it exists.
|