/external/ipsec-tools/ |
setup.c | 314 int auth, int hash, int encryption, int length) 321 p->authmethod = auth; 421 int auth; local 464 auth = OAKLEY_ATTR_AUTH_METHOD_PSKEY; 470 auth = OAKLEY_ATTR_AUTH_METHOD_RSASIG; 478 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I; 482 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_RSASIG_I; 486 auth = OAKLEY_ATTR_AUTH_METHOD_HYBRID_RSA_I; 507 add_proposal(remoteconf, auth, 509 add_proposal(remoteconf, auth, [all...] |
/external/tpm2/ |
NV_spt.c | 47 // If Owner provided auth then ONWERWRITE must be SET 53 // If Platform provided auth then PPWRITE must be SET 57 // If neither Owner nor Platform provided auth, make sure that it was 105 // If Owner provided auth then ONWERWRITE must be SET 111 // If Platform provided auth then PPWRITE must be SET 115 // If neither Owner nor Platform provided auth, make sure that it was
|
/frameworks/base/packages/SystemUI/src/com/android/keyguard/ |
KeyguardSecurityView.java | 27 * Strong auth is required because the device has just booted. 32 * Strong auth is required because the user hasn't used strong auth since a while. 37 * Strong auth is required because a device admin requested it. 42 * Some auth is required because the user force locked. 47 * Some auth is required because too many wrong credentials led to a lockout.
|
/external/autotest/client/common_lib/cros/fake_device_server/client_lib/ |
oauth_helpers.py | 13 DEFAULT_SCOPE = 'https://www.googleapis.com/auth/clouddevices' 20 auth_url = '%s/%s' % (OAUTH_URL, 'auth') 29 """Returns the oauth2 token for a user given the auth code."""
|
/external/autotest/frontend/afe/ |
management.py | 4 from django.contrib import auth 22 admin_group, created = auth.models.Group.objects.get_or_create( 25 PermissionModel = auth.models.Permission
|
/external/chromium-trace/catapult/telemetry/third_party/websocket-client/websocket/ |
_http.py | 49 self.auth = options.get("http_proxy_auth", None) 53 self.auth = None 63 addrinfo_list, need_tunnel, auth = _get_addrinfo_list( 73 sock = _tunnel(sock, hostname, port, auth) 90 hostname, is_secure, proxy.host, proxy.port, proxy.auth, proxy.no_proxy) 190 def _tunnel(sock, host, port, auth): 193 # TODO: support digest auth. 194 if auth and auth[0]: 195 auth_str = auth[0 [all...] |
/external/openssh/ |
Android.mk | 217 auth-bsdauth.c \ 218 auth-chall.c \ 219 auth-krb5.c \ 220 auth-options.c \ 221 auth-pam.c \ 222 auth-rh-rsa.c \ 223 auth-rhosts.c \ 224 auth-rsa.c \ 225 auth-shadow.c \ 226 auth-sia.c [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSCallbackHandlerProtectionTest.java | 28 import javax.security.auth.callback.Callback; 29 import javax.security.auth.callback.CallbackHandler; 30 import javax.security.auth.callback.UnsupportedCallbackException;
|
/libcore/ojluni/src/main/java/java/security/ |
AuthProvider.java | 28 import javax.security.auth.Subject; 29 import javax.security.auth.login.LoginException; 30 import javax.security.auth.callback.CallbackHandler;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/jcajce/ |
JcaRespID.java | 5 import javax.security.auth.x500.X500Principal;
|
/external/cros/system_api/dbus/authpolicy/ |
dbus-constants.h | 30 // Auth failed because of bad user name. 32 // Auth failed because of bad password. 34 // Auth failed because of expired password. 36 // Auth failed because of bad realm or network.
|
/external/curl/tests/data/ |
test1075 | 6 HTTP Basic auth 21 WWW-Authenticate: X-bogus-auth realm="gimme all yer s3cr3ts"
31 WWW-Authenticate: X-bogus-auth realm="gimme all yer s3cr3ts"
39 WWW-Authenticate: X-bogus-auth realm="gimme all yer s3cr3ts"
|
test1237 | 5 HTTP Basic auth
|
test167 | 7 HTTP proxy Basic auth 8 HTTP Digest auth 25 Nice auth sir! 36 Nice auth sir!
|
test206 | 9 HTTP proxy Digest auth 21 # this is returned first since we get no proxy-auth 42 # then this is returned when we get proxy-auth 78 HTTP proxy CONNECT auth Digest
|
test940 | 20 SMTP with username and password but no AUTH capability
|
test2026 | 6 HTTP Basic auth 7 HTTP Digest auth 16 <!-- First request has Digest auth, wrong password --> 18 HTTP/1.1 401 Need Basic or Digest auth
39 <!-- Second request has Basic auth, right password --> 49 <!-- Third request has Digest auth, wrong password --> 51 HTTP/1.1 401 Need Basic or Digest auth (2)
72 <!-- Fourth request has Basic auth, wrong password --> 84 <!-- Fifth request has Basic auth, right password --> 95 HTTP/1.1 401 Need Basic or Digest auth
[all...] |
/external/libcups/cups/ |
testoptions.c | 54 "auth-info=user,pass\\\\,word\\\\\\\\", 0, &options); 92 else if ((value = cupsGetOption("auth-info", num_options, options)) == NULL || 95 printf("FAIL (auth-info=\"%s\", expected \"user,pass\\,word\\\\\")\n", value); 132 else if ((attr = ippFindAttribute(request, "auth-info", IPP_TAG_ZERO)) == NULL) 134 puts("FAIL (Unable to find attribute \"auth-info\")"); 139 printf("FAIL (\"auth-info\" of type %s, expected text)\n", ippTagString(ippGetValueTag(attr))); 144 printf("FAIL (\"auth-info\" has %d values, expected 2)\n", (int)ippGetCount(attr)); 149 printf("FAIL (\"auth-info\"[0] has value \"%s\", expected \"user\")\n", ippGetString(attr, 0, NULL)); 154 printf("FAIL (\"auth-info\"[1] has value \"%s\", expected \"pass,word\\\")\n", ippGetString(attr, 1, NULL));
|
/prebuilts/go/darwin-x86/src/net/smtp/ |
example_test.go | 60 auth := smtp.PlainAuth("", "user@example.com", "password", hostname) 62 err := smtp.SendMail(hostname+":25", auth, from, recipients, msg) 70 auth := smtp.PlainAuth("", "user@example.com", "password", "mail.example.com") 79 err := smtp.SendMail("mail.example.com:25", auth, "sender@example.org", to, msg)
|
/prebuilts/go/linux-x86/src/net/smtp/ |
example_test.go | 60 auth := smtp.PlainAuth("", "user@example.com", "password", hostname) 62 err := smtp.SendMail(hostname+":25", auth, from, recipients, msg) 70 auth := smtp.PlainAuth("", "user@example.com", "password", "mail.example.com") 79 err := smtp.SendMail("mail.example.com:25", auth, "sender@example.org", to, msg)
|
/system/sepolicy/public/ |
fingerprintd.te | 18 # Need to add auth tokens to KeyStore
|
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/DigestScheme.java $ 31 package org.apache.http.impl.auth; 40 import org.apache.http.auth.AuthenticationException; 41 import org.apache.http.auth.Credentials; 42 import org.apache.http.auth.AUTH; 43 import org.apache.http.auth.MalformedChallengeException; 44 import org.apache.http.auth.params.AuthParams; 55 * Currently only qop=auth or no qop is supported. qop=auth-in [all...] |
BasicScheme.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/BasicScheme.java $ 31 package org.apache.http.impl.auth; 36 import org.apache.http.auth.AuthenticationException; 37 import org.apache.http.auth.Credentials; 38 import org.apache.http.auth.AUTH; 39 import org.apache.http.auth.MalformedChallengeException; 40 import org.apache.http.auth.params.AuthParams; 128 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials 180 buffer.append(AUTH.PROXY_AUTH_RESP) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_priv.c | 245 struct privsep_cmd_authenticate *auth; local 251 if (len < sizeof(*auth)) { 256 auth = buf; 257 if (sizeof(*auth) + auth->ie_len + auth->auth_data_len > len) { 263 params.freq = auth->freq; 264 params.bssid = auth->bssid; 265 params.ssid = auth->ssid; 266 if (auth->ssid_len > SSID_MAX_LEN 887 struct privsep_event_auth *auth; local [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/auth/ |
SubjectTest.java | 18 package org.apache.harmony.tests.javax.security.auth; 21 import javax.security.auth.Subject; 22 import javax.security.auth.x500.X500Principal; 43 * javax.security.auth.Subject#Subject() 81 * javax.security.auth.Subject#doAs(Subject subject, PrivilegedAction action) 108 * javax.security.auth.Subject#doAs(Subject subject, PrivilegedExceptionAction action) 147 * javax.security.auth.Subject#doAsPrivileged(Subject subject, 177 * javax.security.auth.Subject#doAsPrivileged(Subject subject, 219 * javax.security.auth.Subject#getSubject(AccessControlContext acc) 233 * javax.security.auth.Subject#toString( [all...] |