HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 151 - 175 of 2231) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/wpa_supplicant_8/hs20/server/ca/
hs20.oid 4 1.3.6.1.4.1.40808.1.1.2 id-kp-HS2.0Auth
  /frameworks/base/services/tests/servicestests/assets/DevicePolicyManagerServiceMigrationTest3/
profile_device_policies.xml 5 <strong-auth-unlock-timeout value="0" />
  /prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-parent/0.3.0/
BUILD 7 source = "google-auth-library-parent-0.3.0.pom",
  /prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-parent/0.4.0/
BUILD 7 source = "google-auth-library-parent-0.4.0.pom",
  /prebuilts/tools/common/google-api-java-client/1.8.0-rc/
google-api-java-client-min-repackaged.jar 
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMScheme.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/NTLMScheme.java $
31 package org.apache.http.impl.auth;
35 import org.apache.http.auth.AUTH;
36 import org.apache.http.auth.AuthenticationException;
37 import org.apache.http.auth.Credentials;
38 import org.apache.http.auth.InvalidCredentialsException;
39 import org.apache.http.auth.MalformedChallengeException;
40 import org.apache.http.auth.NTCredentials;
41 import org.apache.http.impl.auth.AuthSchemeBase
    [all...]
  /external/curl/tests/data/
test2040 6 HTTP Basic auth
12 <!-- First request has Basic auth, right password -->
22 <!-- Second request with Basic auth disabled -->
test831 6 SASL AUTH NTLM
15 AUTH NTLM
19 REPLY * A002 NO AUTH exchange cancelled by client
test2027 6 HTTP Digest auth
18 new response just as a duplicate and it sends another and detects the auth
23 <!-- First request has Digest auth, wrong password -->
25 HTTP/1.1 401 Need Digest auth
44 <!-- Second request has Digest auth, right password -->
46 HTTP/1.1 401 Need Digest auth (2)
64 <!-- Third request has Digest auth, wrong password -->
66 HTTP/1.1 401 Need Digest auth (3)
85 <!-- Fourth request has Digest auth, wrong password -->
87 HTTP/1.1 401 Need Digest auth (4)
    [all...]
test168 7 HTTP proxy Digest auth
8 HTTP Digest auth
15 # this is returned first since we get no proxy-auth
23 # then this is returned since we get no server-auth
36 Nice auth sir!
50 Nice auth sir!
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
tmpCallbackHandler.java 27 import javax.security.auth.callback.Callback;
28 import javax.security.auth.callback.CallbackHandler;
29 import javax.security.auth.callback.UnsupportedCallbackException;
  /external/dhcpcd-6.8.2/
auth.c 39 #include "auth.h"
106 dhcp_auth_validate(struct authstate *state, const struct auth *auth,
134 if (!(auth->options & DHCPCD_AUTH_SEND)) {
141 } else if (protocol != auth->protocol ||
142 algorithm != auth->algorithm ||
143 rdm != auth->rdm)
148 auth->options & DHCPCD_AUTH_REQUIRE)
274 TAILQ_FOREACH(t, &auth->tokens, next) {
388 get_next_rdm_monotonic_counter(struct auth *auth
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/auth/
DestroyFailedExceptionTest.java 18 package org.apache.harmony.tests.javax.security.auth;
21 import javax.security.auth.DestroyFailedException;
37 * javax.security.auth.DestroyFailedException#DestroyFailedException()
47 * javax.security.auth.DestroyFailedException#DestroyFailedException(String msg)
60 * javax.security.auth.DestroyFailedException#DestroyFailedException(String msg)
LoginExceptionTest.java 18 package org.apache.harmony.tests.javax.security.auth;
22 import javax.security.auth.login.LoginException;
37 * javax.security.auth.login.LoginException#LoginException()
47 * javax.security.auth.login.LoginException#LoginException(String msg)
60 * javax.security.auth.login.LoginException#LoginException(String msg)
  /prebuilts/tools/common/google-api-java-client/1.20.0/
google-api-java-client-min-repackaged-1.20.0.jar 
  /external/wpa_supplicant_8/src/crypto/
aes-ccm.c 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth)
127 auth[i] = x[i] ^ tmp[i];
128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M);
132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t)
137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M);
142 t[i] = auth[i] ^ tmp[i];
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth)
169 aes_ccm_encr_auth(aes, M, x, a, auth);
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain)
196 aes_ccm_decr_auth(aes, M, a, auth, t)
    [all...]
  /external/ppp/pppd/plugins/radius/etc/
dictionary.microsoft 35 ATTRIBUTE MS-Acct-Auth-Type 23 integer Microsoft
67 # MS-Acct-Auth-Type Values
69 VALUE MS-Acct-Auth-Type PAP 1
70 VALUE MS-Acct-Auth-Type CHAP 2
71 VALUE MS-Acct-Auth-Type MS-CHAP-1 3
72 VALUE MS-Acct-Auth-Type MS-CHAP-2 4
73 VALUE MS-Acct-Auth-Type EAP 5
  /external/volley/src/main/java/com/android/volley/toolbox/
AndroidAuthenticator.java 30 * An Authenticator that uses {@link AccountManager} to get auth
45 * @param authTokenType Auth token type passed to AccountManager
55 * @param authTokenType Auth token type passed to AccountManager
56 * @param notifyAuthFailure Whether to raise a notification upon auth failure
80 * Returns the Auth Token Type used by this authenticator.
96 throw new AuthFailureError("Error while retrieving auth token", e);
107 throw new AuthFailureError("Got null auth token for type: " + mAuthTokenType);
  /external/webrtc/talk/session/media/
externalhmac.h 31 // External libsrtp HMAC auth module which implements methods defined in
33 // The default auth module will be replaced only when the ENABLE_EXTERNAL_AUTH
35 // as the default auth implementation doesn't provide access and avoids
42 // libsrtp also provides a mechanism to select different auth functions for
44 // the auth_type of srtp_policy_t. The application must first register auth
52 #include "auth.h" // NOLINT
54 #include "third_party/libsrtp/srtp/crypto/include/auth.h"
  /system/vold/
KeyStorage.cpp 107 static bool generateKeymasterKey(Keymaster& keymaster, const KeyAuthentication& auth,
115 if (auth.token.empty()) {
116 LOG(DEBUG) << "Creating key that doesn't need auth token";
119 LOG(DEBUG) << "Auth token required for key";
120 if (auth.token.size() != sizeof(hw_auth_token_t)) {
121 LOG(ERROR) << "Auth token should be " << sizeof(hw_auth_token_t) << " bytes, was "
122 << auth.token.size() << " bytes";
125 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data());
133 static AuthorizationSet beginParams(const KeyAuthentication& auth,
140 if (!auth.token.empty())
    [all...]
  /external/tcpdump/tests/
hsrp_1-v.out 2 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
4 192.168.0.20.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
6 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
8 192.168.0.20.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
10 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
12 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
14 192.168.0.20.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
18 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
20 192.168.0.20.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
22 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@
    [all...]
hsrp_2-v.out 2 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
4 192.168.0.30.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
6 192.168.0.20.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
8 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
12 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
16 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
18 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
22 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
28 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
30 192.168.0.10.1985 > 224.0.0.2.1985: HSRPv0-hello 20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@
    [all...]
  /external/ppp/pppd/plugins/radius/
sendserver.c 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth)
42 buf = auth->data;
107 vector = (char *)auth->vector;
143 memcpy ((char *) md5buf + secretlen, (char *) auth->vector,
200 AUTH_HDR *auth, *recv_auth; local
262 auth = (AUTH_HDR *) send_buffer;
263 auth->code = data->code;
264 auth->id = data->seq_nbr;
268 total_length = rc_pack_list(data->send_pairs, secret, auth) + AUTH_HDR_LEN;
270 auth->length = htons ((unsigned short) total_length)
    [all...]
  /external/libdrm/tests/
lock.c 88 struct drm_auth auth; local
91 /* Get a client magic number and pass it to the master for auth. */
92 ret = ioctl(drmfd, DRM_IOCTL_GET_MAGIC, &auth);
96 ret = write(commfd[0], &auth.magic, sizeof(auth.magic));
98 err(1, "Couldn't write auth data");
104 struct drm_auth auth; local
109 ret = read(commfd[1], &auth.magic, sizeof(auth.magic));
113 ret = ioctl(drmfd, DRM_IOCTL_AUTH_MAGIC, &auth);
    [all...]
  /external/autotest/client/common_lib/cros/fake_device_server/client_lib/
client_lib_test.py 14 auth code. To get an auth code, run this script with the argument URL
15 which will print out a link for you to visit and get your auth code.
17 Then re-run the test with that auth code like so:
44 help=('Either your auth code or "URL" to return the'
76 # TODO(sosa): Do better. Change this to use fake auth server when it exists.

Completed in 3771 milliseconds

1 2 3 4 5 67 8 91011>>