/system/core/adb/ |
adb_auth.h | 27 /* AUTH packets first argument */
|
adb_trace.h | 38 AUTH,
|
/system/tpm/trunks/ |
mock_tpm.cc | 139 const TPMT_SIGNATURE& auth, 143 policy_ref, expiration, auth, authorization_delegate, 155 const TPMT_SIGNATURE& auth, 160 cp_hash_a, policy_ref, expiration, auth, timeout,
|
/test/vts/web/dashboard/src/main/webapp/WEB-INF/ |
web.xml | 123 <auth-constraint> 125 </auth-constraint> 133 <auth-constraint> 135 </auth-constraint>
|
/build/make/core/tasks/check_boot_jars/ |
package_whitelist.txt | 54 javax\.security\.auth 55 javax\.security\.auth\.callback 56 javax\.security\.auth\.login 57 javax\.security\.auth\.x500 147 org\.apache\.http\.auth 148 org\.apache\.http\.auth\.params 165 org\.apache\.http\.impl\.auth
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/distutils/command/ |
register.py | 106 2. send the data as a Basic auth'ed POST.
164 auth = urllib2.HTTPPasswordMgr()
166 auth.add_password(self.realm, host, username, password)
169 auth)
252 def post_to_server(self, data, auth=None):
286 # handle HTTP and include the Basic Auth handler
288 urllib2.HTTPBasicAuthHandler(password_mgr=auth)
|
/external/tpm2/ |
Entity.c | 143 // This function copies the authorization value of the entity to auth. 144 // Return value is the number of octets copied to auth. 149 AUTH_VALUE *auth // OUT: authValue of the entity 180 // vendor auth value 200 authValue = ((HASH_OBJECT *)object)->auth; 204 // Auth value is available only when the private portion of 232 MemoryCopy(auth, authValue.t.buffer, authValue.t.size, sizeof(TPMU_HA));
|
Object.c | 411 TPM2B_AUTH *auth // IN: the authValue for the slot 420 pAssert(&((*object)->auth) == &objectHash->publicArea.authPolicy); 433 if(auth != NULL) 435 MemoryRemoveTrailingZeros(auth); 436 (*object)->auth = *auth; 439 (*object)->auth.t.size = 0; 457 TPM2B_AUTH *auth, // IN: authValue 464 if(!AllocateSequenceSlot(newHandle, &hmacObject, auth)) 487 TPM2B_AUTH *auth, // IN: authValu [all...] |
/libcore/ojluni/src/main/java/sun/security/util/ |
Resources.java | 30 * for javax.security.auth and sun.security. 37 // javax.security.auth.PrivateCredentialPermission 55 // javax.security.auth.x500 60 // javax.security.auth.Subject 80 // javax.security.auth.login.AppConfigurationEntry 83 // javax.security.auth.login.LoginContext 154 // javax.security.auth.Policy
|
/prebuilts/gdb/darwin-x86/lib/python2.7/distutils/command/ |
register.py | 105 2. send the data as a Basic auth'ed POST. 163 auth = urllib2.HTTPPasswordMgr() 165 auth.add_password(self.realm, host, username, password) 168 auth) 251 def post_to_server(self, data, auth=None): 294 # handle HTTP and include the Basic Auth handler 296 urllib2.HTTPBasicAuthHandler(password_mgr=auth)
|
/prebuilts/gdb/linux-x86/lib/python2.7/distutils/command/ |
register.py | 105 2. send the data as a Basic auth'ed POST. 163 auth = urllib2.HTTPPasswordMgr() 165 auth.add_password(self.realm, host, username, password) 168 auth) 251 def post_to_server(self, data, auth=None): 294 # handle HTTP and include the Basic Auth handler 296 urllib2.HTTPBasicAuthHandler(password_mgr=auth)
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/distutils/command/ |
register.py | 105 2. send the data as a Basic auth'ed POST. 163 auth = urllib2.HTTPPasswordMgr() 165 auth.add_password(self.realm, host, username, password) 168 auth) 251 def post_to_server(self, data, auth=None): 294 # handle HTTP and include the Basic Auth handler 296 urllib2.HTTPBasicAuthHandler(password_mgr=auth)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/distutils/command/ |
register.py | 105 2. send the data as a Basic auth'ed POST. 163 auth = urllib2.HTTPPasswordMgr() 165 auth.add_password(self.realm, host, username, password) 168 auth) 251 def post_to_server(self, data, auth=None): 294 # handle HTTP and include the Basic Auth handler 296 urllib2.HTTPBasicAuthHandler(password_mgr=auth)
|
/frameworks/base/core/java/android/accounts/ |
AccountManager.java | 88 * the user's actual password. (Auth tokens are normally created with a 90 * can generate auth tokens for applications, so the application doesn't need to 91 * handle passwords directly. Auth tokens are normally reusable and cached by 93 * of applications to <em>invalidate</em> auth tokens when they stop working so 116 * of accounts returned by {@link #getAccountsByType}. Requesting an auth token 119 * <li>Request an auth token for the selected account(s) using one of the 123 * <li>Make the request using the auth token. The form of the auth token, 129 * it could be that a cached auth token is stale and no longer honored by 132 * invalidating the auth token, immediately go back to the "Request an aut [all...] |
/external/curl/docs/ |
FEATURES | 100 - explicit "AUTH TLS" and "AUTH SSL" usage to "upgrade" plain ftp:// 104 - both password and public key auth 107 - both password and public key auth 142 - mail auth support for trusted server-to-server relaying
|
/external/openssh/ |
OVERVIEW | 86 - Code for various authentication methods resides in auth-*.c 87 (auth-passwd.c, auth-rh-rsa.c, auth-rhosts.c, auth-rsa.c). This
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 598 /* TODO: validate AUTH */ 604 u8 method, const u8 *auth, 624 wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data"); 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 657 if (auth == NULL) { 668 auth_method = auth[0]; 669 auth += 4 [all...] |
/packages/apps/Dialer/java/com/android/voicemail/impl/mail/store/imap/ |
DigestMd5Utils.java | 80 qop = "auth"; // Other config not supported 94 /** Verify the response-auth returned by the server is correct. */ 97 throw new MessagingException("response-auth expected"); 102 throw new MessagingException("invalid response-auth return from the server."); 154 * @param isResponseAuth is the response the one the server is returning us. response-auth has
|
/external/wpa_supplicant_8/wpa_supplicant/ |
sme.c | 845 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { 848 MAC2STR(data->auth.peer)); 854 MAC2STR(data->auth.peer), data->auth.auth_type, 855 data->auth.auth_transaction, data->auth.status_code); 857 data->auth.ies, data->auth.ies_len); 862 if (data->auth.auth_type == WLAN_AUTH_SAE) { 864 res = sme_sae_auth(wpa_s, data->auth.auth_transaction [all...] |
/external/curl/lib/ |
smtp.c | 324 "AUTH", 354 smtpc->sasl.authmechs = SASL_AUTH_NONE; /* No known auth. mechanism yet */ 358 smtpc->auth_supported = FALSE; /* Clear the AUTH capability */ 442 * Sends an AUTH command allowing the client to login with the given SASL 452 if(initresp) { /* AUTH <mech> ...<crlf> */ 453 /* Send the AUTH command with the initial response */ 454 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s %s", mech, initresp); 457 /* Send the AUTH command */ 458 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s", mech); 552 char *auth = NULL local [all...] |
/system/security/keystore/ |
keymaster_enforcement.cpp | 151 // If no auth is required or if auth is timeout-based, we have nothing to check. 359 ALOGE("Auth required but no matching auth token found"); 476 ALOGE("Authentication required, but auth token not provided"); 481 ALOGE("Bug: Auth token is the wrong size (%zu expected, %zu found)", 489 ALOGE("Bug: Auth token is the version %hhu (or is not an auth token). Expected %d", 495 ALOGE("Auth token signature invalid"); 500 ALOGE("Auth token has the challenge %" PRIu64 ", need %" PRIu64, auth_token.challenge [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 530 /* TODO: validate AUTH */ 536 u8 method, const u8 *auth, 556 wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data"); 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 591 if (auth == NULL) { 602 auth_method = auth[0]; 603 auth += 4 [all...] |
/external/libmicrohttpd/src/microhttpd/ |
digestauth.c | 138 * @param qop qop-value: "", "auth" or "auth-int" 141 * @param hentity H(entity body) if qop="auth-int" 165 if (0 == strcasecmp(qop, "auth-int")) 168 not support auth-int. */ 393 * @param realm A string of characters that describes the realm of auth. 573 char qop[15]; /* auth,auth-int */ 576 const char *hentity = NULL; /* "auth-int" is not supported */ 643 "Failed to allocate memory for auth header processing\n") [all...] |
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.ascend | 95 ATTRIBUTE Ascend-Require-Auth 201 integer 125 ATTRIBUTE Ascend-Send-Auth 231 integer 193 VALUE Ascend-Send-Auth Send-Auth-None 0 194 VALUE Ascend-Send-Auth Send-Auth-PAP 1 195 VALUE Ascend-Send-Auth Send-Auth-CHAP 2 196 VALUE Ascend-Send-Auth Send-Auth-MS-CHAP [all...] |
/packages/apps/Dialer/java/com/android/contacts/common/model/ |
AccountTypeManager.java | 319 for (AuthenticatorDescription auth : auths) { 320 if (accountType.equals(auth.type)) { 321 return auth; 436 final AuthenticatorDescription auth = findAuthenticator(auths, type); local 437 if (auth == null) { 444 accountType = new GoogleAccountType(mContext, auth.packageName); 446 accountType = new ExchangeAccountType(mContext, auth.packageName, type); 447 } else if (SamsungAccountType.isSamsungAccountType(mContext, type, auth.packageName)) { 448 accountType = new SamsungAccountType(mContext, auth.packageName, type); 451 TAG, "Registering external account type=" + type + ", packageName=" + auth.packageName) [all...] |