/external/ltp/testcases/network/rpc/rpc-tirpc/tests_pack/rpc_suite/tirpc/tirpc_auth_authsys_create_default/ |
tirpc_authsys_create_default.c | 45 AUTH *authSys = NULL; 50 test_status = ((AUTH *) authSys != NULL) ? 0 : 1;
|
/external/openssh/ |
audit.h | 44 SSH_CONNECTION_CLOSE, /* closed after attempting auth or session */ 45 SSH_CONNECTION_ABANDON, /* closed without completing auth */
|
/external/tpm2/ |
ObjectChangeAuth.c | 37 // Can not change auth on sequence object 41 // Make sure that the auth value is consistent with the nameAlg
|
PolicySigned.c | 21 // TPM_RC_SCHEME the signing scheme of auth is not supported by the TPM 66 // hash() the hash associated with the signed auth 81 authHash.t.size = CryptStartHash(CryptGetSignHashAlg(&in->auth), 101 result = CryptVerifySignature(in->authObject, &authHash, &in->auth); 109 // Update policy with input policyRef and name of auth key 144 // auth ticket is null
|
/external/webrtc/webrtc/libjingle/xmpp/ |
saslmechanism.h | 34 // Should generate the initial "auth" request. Default is just <auth/>.
|
xmpppump.cc | 25 buzz::PreXmppAuth* auth) { 29 client_->Connect(xcs, "", socket, auth);
|
/libcore/ojluni/src/main/java/javax/security/auth/login/ |
LoginException.java | 26 package javax.security.auth.login; 31 * @see javax.security.auth.login.LoginContext
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/X11/extensions/ |
security.h | 44 void XSecurityFreeXauth(Xauth *auth); 46 /* type for returned auth ids */
|
/external/curl/tests/data/ |
test2023 | 6 HTTP Basic auth 12 <!-- First request has Basic auth, wrong password --> 23 <!-- Second request has Basic auth, right password --> 33 <!-- Third request has Basic auth, wrong password --> 44 <!-- Fourth request has Basic auth, wrong password --> 55 <!-- Fifth request has Basic auth, right password -->
|
test153 | 6 HTTP Digest auth 12 # reply back and ask for Digest auth 41 WWW-Authenticate: Digest realm="testrealm", algorithm=MD5, nonce="999999", stale=true, qop="auth"
102 Authorization: Digest username="testuser", realm="testrealm", nonce="999999", uri="/1530002", cnonce="MTA4MzIy", nc="00000001", qop="auth", response="25291c357671604a16c0242f56721c07", algorithm="MD5"
122 WWW-Authenticate: Digest realm="testrealm", algorithm=MD5, nonce="999999", stale=true, qop="auth"
|
/external/wpa_supplicant_8/hostapd/ |
eap_testing.txt | 59 EAP-FAST/GTC(auth) + - + - + 66 EAP-FAST/MSCHAPv2(auth) + - + - + 67 EAP-FAST/MD5(auth) + - + - - 68 EAP-FAST/TLS(auth) + - - - - 69 EAP-FAST/SIM(auth) + - - - - 70 EAP-FAST/AKA(auth) + - - - -
|
/prebuilts/go/darwin-x86/src/net/smtp/ |
smtp.go | 8 // AUTH RFC 2554 42 // supported auth mechanisms 43 auth []string 143 if mechs, ok := ext["AUTH"]; ok { 144 c.auth = strings.Split(mechs, " ") 189 // Auth authenticates a client using the provided authentication mechanism. 191 // Only servers that advertise the AUTH extension support this function. 192 func (c *Client) Auth(a Auth) error { 197 mech, resp, err := a.Start(&ServerInfo{c.serverName, c.tls, c.auth}) [all...] |
/prebuilts/go/linux-x86/src/net/smtp/ |
smtp.go | 8 // AUTH RFC 2554 42 // supported auth mechanisms 43 auth []string 143 if mechs, ok := ext["AUTH"]; ok { 144 c.auth = strings.Split(mechs, " ") 189 // Auth authenticates a client using the provided authentication mechanism. 191 // Only servers that advertise the AUTH extension support this function. 192 func (c *Client) Auth(a Auth) error { 197 mech, resp, err := a.Start(&ServerInfo{c.serverName, c.tls, c.auth}) [all...] |
/system/keymaster/ |
keymaster_enforcement.cpp | 155 // If no auth is required or if auth is timeout-based, we have nothing to check. 357 LOG_E("Auth required but no matching auth token found", 0); 451 LOG_E("Authentication required, but auth token not provided", 0); 456 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), 464 LOG_E("Bug: Auth token is the version %d (or is not an auth token). Expected %d", 470 LOG_E("Auth token signature invalid", 0); 475 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle) [all...] |
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/ |
org.apache.httpcomponents.httpclient_4.1.3.v201209201135.jar | |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.apache.httpcomponents.httpclient_4.1.3.v201209201135.jar | |
/device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
Tpm2Hierarchy.c | 128 @param[in] AuthSession Auth Session context
161 // Add in Auth session
216 @param[in] AuthSession Auth Session context
242 // Add in Auth session
303 @param[in] AuthSession Auth Session context
332 // Add in Auth session
398 @param[in] AuthSession Auth Session context
431 // Add in Auth session
506 @param[in] AuthSession Auth Session context
537 // Add in Auth session [all...] |
Tpm2NVStorage.c | 59 TPM2B_AUTH Auth;
269 @param[in] AuthSession Auth Session context
270 @param[in] Auth The authorization data.
282 IN TPM2B_AUTH *Auth,
304 // Add in Auth session
316 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(Auth->size));
318 CopyMem(Buffer, Auth->buffer, Auth->size);
319 Buffer += Auth->size;
407 @param[in] AuthSession Auth Session context [all...] |
/frameworks/base/wifi/tests/src/android/net/wifi/ |
WifiEnterpriseConfigTest.java | 253 assertEquals("\"auth=MSCHAPV2\"", getSupplicantPhase2Method()); 258 assertEquals("\"auth=MSCHAPV2\"", getSupplicantPhase2Method()); 272 assertEquals("\"auth=MSCHAPV2\"", getSupplicantPhase2Method()); 285 assertEquals("\"auth=GTC\"", getSupplicantPhase2Method()); 292 /** Verfies that the correct "auth" parameter is supplied for PEAP/GTC. */ 302 assertEquals("\"auth=GTC\"", getSupplicantPhase2Method()); 311 assertEquals("\"auth=SIM\"", getSupplicantPhase2Method()); 314 assertEquals("\"auth=AKA\"", getSupplicantPhase2Method()); 317 assertEquals("\"auth=AKA'\"", getSupplicantPhase2Method());
|
/libcore/ojluni/src/main/java/sun/net/spi/ |
DefaultProxySelector.java | 142 String auth = uri.getAuthority(); local 143 if (auth != null) { 145 i = auth.indexOf('@'); 147 auth = auth.substring(i+1); 149 i = auth.lastIndexOf(':'); 151 auth = auth.substring(0,i); 153 host = auth;
|
/external/chromium-trace/catapult/telemetry/third_party/websocket-client/websocket/ |
_url.py | 137 "http_proxy_auth" - http proxy auth information. 146 auth = proxy_auth 147 return proxy_host, port, auth 157 auth = (proxy.username, proxy.password) if proxy.username else None 158 return proxy.hostname, proxy.port, auth
|
/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 385 struct privsep_event_auth *auth; local 388 if (len < sizeof(*auth)) 390 auth = (struct privsep_event_auth *) buf; 391 if (len < sizeof(*auth) + auth->ies_len) 394 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); 395 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); 396 data.auth.auth_type = auth->auth_type [all...] |
/device/linaro/bootloader/edk2/NetworkPkg/Application/IpsecConfig/ |
IpSecConfig.c | 70 { L"--auth-algo", TypeValue },
94 // --auth-algo
99 { L"--auth-key", TypeValue },
108 { L"--auth-proto", TypeValue },
109 { L"--auth-method", TypeValue },
112 { L"--auth-data", TypeValue },
179 // --auth-algo
215 // --auth-proto
224 // --auth-method
280 { L"--auth-algo", 0, 0, BIT(2)|BIT(1), 0 }, [all...] |
/external/apache-http/src/org/apache/http/client/ |
AuthenticationHandler.java | 38 import org.apache.http.auth.AuthScheme; 39 import org.apache.http.auth.AuthenticationException; 40 import org.apache.http.auth.MalformedChallengeException;
|
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMEngineException.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/NTLMEngineException.java $ 31 package org.apache.http.impl.auth; 33 import org.apache.http.auth.AuthenticationException;
|