HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 301 - 325 of 2231) sorted by null

<<11121314151617181920>>

  /external/ltp/testcases/network/rpc/rpc-tirpc/tests_pack/rpc_suite/tirpc/tirpc_auth_authsys_create_default/
tirpc_authsys_create_default.c 45 AUTH *authSys = NULL;
50 test_status = ((AUTH *) authSys != NULL) ? 0 : 1;
  /external/openssh/
audit.h 44 SSH_CONNECTION_CLOSE, /* closed after attempting auth or session */
45 SSH_CONNECTION_ABANDON, /* closed without completing auth */
  /external/tpm2/
ObjectChangeAuth.c 37 // Can not change auth on sequence object
41 // Make sure that the auth value is consistent with the nameAlg
PolicySigned.c 21 // TPM_RC_SCHEME the signing scheme of auth is not supported by the TPM
66 // hash() the hash associated with the signed auth
81 authHash.t.size = CryptStartHash(CryptGetSignHashAlg(&in->auth),
101 result = CryptVerifySignature(in->authObject, &authHash, &in->auth);
109 // Update policy with input policyRef and name of auth key
144 // auth ticket is null
  /external/webrtc/webrtc/libjingle/xmpp/
saslmechanism.h 34 // Should generate the initial "auth" request. Default is just <auth/>.
xmpppump.cc 25 buzz::PreXmppAuth* auth) {
29 client_->Connect(xcs, "", socket, auth);
  /libcore/ojluni/src/main/java/javax/security/auth/login/
LoginException.java 26 package javax.security.auth.login;
31 * @see javax.security.auth.login.LoginContext
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/X11/extensions/
security.h 44 void XSecurityFreeXauth(Xauth *auth);
46 /* type for returned auth ids */
  /external/curl/tests/data/
test2023 6 HTTP Basic auth
12 <!-- First request has Basic auth, wrong password -->
23 <!-- Second request has Basic auth, right password -->
33 <!-- Third request has Basic auth, wrong password -->
44 <!-- Fourth request has Basic auth, wrong password -->
55 <!-- Fifth request has Basic auth, right password -->
test153 6 HTTP Digest auth
12 # reply back and ask for Digest auth
41 WWW-Authenticate: Digest realm="testrealm", algorithm=MD5, nonce="999999", stale=true, qop="auth"
102 Authorization: Digest username="testuser", realm="testrealm", nonce="999999", uri="/1530002", cnonce="MTA4MzIy", nc="00000001", qop="auth", response="25291c357671604a16c0242f56721c07", algorithm="MD5"
122 WWW-Authenticate: Digest realm="testrealm", algorithm=MD5, nonce="999999", stale=true, qop="auth"
  /external/wpa_supplicant_8/hostapd/
eap_testing.txt 59 EAP-FAST/GTC(auth) + - + - +
66 EAP-FAST/MSCHAPv2(auth) + - + - +
67 EAP-FAST/MD5(auth) + - + - -
68 EAP-FAST/TLS(auth) + - - - -
69 EAP-FAST/SIM(auth) + - - - -
70 EAP-FAST/AKA(auth) + - - - -
  /prebuilts/go/darwin-x86/src/net/smtp/
smtp.go 8 // AUTH RFC 2554
42 // supported auth mechanisms
43 auth []string
143 if mechs, ok := ext["AUTH"]; ok {
144 c.auth = strings.Split(mechs, " ")
189 // Auth authenticates a client using the provided authentication mechanism.
191 // Only servers that advertise the AUTH extension support this function.
192 func (c *Client) Auth(a Auth) error {
197 mech, resp, err := a.Start(&ServerInfo{c.serverName, c.tls, c.auth})
    [all...]
  /prebuilts/go/linux-x86/src/net/smtp/
smtp.go 8 // AUTH RFC 2554
42 // supported auth mechanisms
43 auth []string
143 if mechs, ok := ext["AUTH"]; ok {
144 c.auth = strings.Split(mechs, " ")
189 // Auth authenticates a client using the provided authentication mechanism.
191 // Only servers that advertise the AUTH extension support this function.
192 func (c *Client) Auth(a Auth) error {
197 mech, resp, err := a.Start(&ServerInfo{c.serverName, c.tls, c.auth})
    [all...]
  /system/keymaster/
keymaster_enforcement.cpp 155 // If no auth is required or if auth is timeout-based, we have nothing to check.
357 LOG_E("Auth required but no matching auth token found", 0);
451 LOG_E("Authentication required, but auth token not provided", 0);
456 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t),
464 LOG_E("Bug: Auth token is the version %d (or is not an auth token). Expected %d",
470 LOG_E("Auth token signature invalid", 0);
475 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle)
    [all...]
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/
org.apache.httpcomponents.httpclient_4.1.3.v201209201135.jar 
  /prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/
org.apache.httpcomponents.httpclient_4.1.3.v201209201135.jar 
  /device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/
Tpm2Hierarchy.c 128 @param[in] AuthSession Auth Session context
161 // Add in Auth session
216 @param[in] AuthSession Auth Session context
242 // Add in Auth session
303 @param[in] AuthSession Auth Session context
332 // Add in Auth session
398 @param[in] AuthSession Auth Session context
431 // Add in Auth session
506 @param[in] AuthSession Auth Session context
537 // Add in Auth session
    [all...]
Tpm2NVStorage.c 59 TPM2B_AUTH Auth;
269 @param[in] AuthSession Auth Session context
270 @param[in] Auth The authorization data.
282 IN TPM2B_AUTH *Auth,
304 // Add in Auth session
316 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(Auth->size));
318 CopyMem(Buffer, Auth->buffer, Auth->size);
319 Buffer += Auth->size;
407 @param[in] AuthSession Auth Session context
    [all...]
  /frameworks/base/wifi/tests/src/android/net/wifi/
WifiEnterpriseConfigTest.java 253 assertEquals("\"auth=MSCHAPV2\"", getSupplicantPhase2Method());
258 assertEquals("\"auth=MSCHAPV2\"", getSupplicantPhase2Method());
272 assertEquals("\"auth=MSCHAPV2\"", getSupplicantPhase2Method());
285 assertEquals("\"auth=GTC\"", getSupplicantPhase2Method());
292 /** Verfies that the correct "auth" parameter is supplied for PEAP/GTC. */
302 assertEquals("\"auth=GTC\"", getSupplicantPhase2Method());
311 assertEquals("\"auth=SIM\"", getSupplicantPhase2Method());
314 assertEquals("\"auth=AKA\"", getSupplicantPhase2Method());
317 assertEquals("\"auth=AKA'\"", getSupplicantPhase2Method());
  /libcore/ojluni/src/main/java/sun/net/spi/
DefaultProxySelector.java 142 String auth = uri.getAuthority(); local
143 if (auth != null) {
145 i = auth.indexOf('@');
147 auth = auth.substring(i+1);
149 i = auth.lastIndexOf(':');
151 auth = auth.substring(0,i);
153 host = auth;
  /external/chromium-trace/catapult/telemetry/third_party/websocket-client/websocket/
_url.py 137 "http_proxy_auth" - http proxy auth information.
146 auth = proxy_auth
147 return proxy_host, port, auth
157 auth = (proxy.username, proxy.password) if proxy.username else None
158 return proxy.hostname, proxy.port, auth
  /external/wpa_supplicant_8/src/drivers/
driver_privsep.c 385 struct privsep_event_auth *auth; local
388 if (len < sizeof(*auth))
390 auth = (struct privsep_event_auth *) buf;
391 if (len < sizeof(*auth) + auth->ies_len)
394 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN);
395 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN);
396 data.auth.auth_type = auth->auth_type
    [all...]
  /device/linaro/bootloader/edk2/NetworkPkg/Application/IpsecConfig/
IpSecConfig.c 70 { L"--auth-algo", TypeValue },
94 // --auth-algo
99 { L"--auth-key", TypeValue },
108 { L"--auth-proto", TypeValue },
109 { L"--auth-method", TypeValue },
112 { L"--auth-data", TypeValue },
179 // --auth-algo
215 // --auth-proto
224 // --auth-method
280 { L"--auth-algo", 0, 0, BIT(2)|BIT(1), 0 },
    [all...]
  /external/apache-http/src/org/apache/http/client/
AuthenticationHandler.java 38 import org.apache.http.auth.AuthScheme;
39 import org.apache.http.auth.AuthenticationException;
40 import org.apache.http.auth.MalformedChallengeException;
  /external/apache-http/src/org/apache/http/impl/auth/
NTLMEngineException.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/impl/auth/NTLMEngineException.java $
31 package org.apache.http.impl.auth;
33 import org.apache.http.auth.AuthenticationException;

Completed in 2192 milliseconds

<<11121314151617181920>>