HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 451 - 475 of 2231) sorted by null

<<11121314151617181920>>

  /system/core/adb/
adb_auth.h 27 /* AUTH packets first argument */
adb_trace.h 38 AUTH,
  /system/tpm/trunks/
mock_tpm.cc 139 const TPMT_SIGNATURE& auth,
143 policy_ref, expiration, auth, authorization_delegate,
155 const TPMT_SIGNATURE& auth,
160 cp_hash_a, policy_ref, expiration, auth, timeout,
  /test/vts/web/dashboard/src/main/webapp/WEB-INF/
web.xml 123 <auth-constraint>
125 </auth-constraint>
133 <auth-constraint>
135 </auth-constraint>
  /build/make/core/tasks/check_boot_jars/
package_whitelist.txt 54 javax\.security\.auth
55 javax\.security\.auth\.callback
56 javax\.security\.auth\.login
57 javax\.security\.auth\.x500
147 org\.apache\.http\.auth
148 org\.apache\.http\.auth\.params
165 org\.apache\.http\.impl\.auth
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/distutils/command/
register.py 106 2. send the data as a Basic auth'ed POST.
164 auth = urllib2.HTTPPasswordMgr()
166 auth.add_password(self.realm, host, username, password)
169 auth)
252 def post_to_server(self, data, auth=None):
286 # handle HTTP and include the Basic Auth handler
288 urllib2.HTTPBasicAuthHandler(password_mgr=auth)
  /external/tpm2/
Entity.c 143 // This function copies the authorization value of the entity to auth.
144 // Return value is the number of octets copied to auth.
149 AUTH_VALUE *auth // OUT: authValue of the entity
180 // vendor auth value
200 authValue = ((HASH_OBJECT *)object)->auth;
204 // Auth value is available only when the private portion of
232 MemoryCopy(auth, authValue.t.buffer, authValue.t.size, sizeof(TPMU_HA));
Object.c 411 TPM2B_AUTH *auth // IN: the authValue for the slot
420 pAssert(&((*object)->auth) == &objectHash->publicArea.authPolicy);
433 if(auth != NULL)
435 MemoryRemoveTrailingZeros(auth);
436 (*object)->auth = *auth;
439 (*object)->auth.t.size = 0;
457 TPM2B_AUTH *auth, // IN: authValue
464 if(!AllocateSequenceSlot(newHandle, &hmacObject, auth))
487 TPM2B_AUTH *auth, // IN: authValu
    [all...]
  /libcore/ojluni/src/main/java/sun/security/util/
Resources.java 30 * for javax.security.auth and sun.security.
37 // javax.security.auth.PrivateCredentialPermission
55 // javax.security.auth.x500
60 // javax.security.auth.Subject
80 // javax.security.auth.login.AppConfigurationEntry
83 // javax.security.auth.login.LoginContext
154 // javax.security.auth.Policy
  /prebuilts/gdb/darwin-x86/lib/python2.7/distutils/command/
register.py 105 2. send the data as a Basic auth'ed POST.
163 auth = urllib2.HTTPPasswordMgr()
165 auth.add_password(self.realm, host, username, password)
168 auth)
251 def post_to_server(self, data, auth=None):
294 # handle HTTP and include the Basic Auth handler
296 urllib2.HTTPBasicAuthHandler(password_mgr=auth)
  /prebuilts/gdb/linux-x86/lib/python2.7/distutils/command/
register.py 105 2. send the data as a Basic auth'ed POST.
163 auth = urllib2.HTTPPasswordMgr()
165 auth.add_password(self.realm, host, username, password)
168 auth)
251 def post_to_server(self, data, auth=None):
294 # handle HTTP and include the Basic Auth handler
296 urllib2.HTTPBasicAuthHandler(password_mgr=auth)
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/distutils/command/
register.py 105 2. send the data as a Basic auth'ed POST.
163 auth = urllib2.HTTPPasswordMgr()
165 auth.add_password(self.realm, host, username, password)
168 auth)
251 def post_to_server(self, data, auth=None):
294 # handle HTTP and include the Basic Auth handler
296 urllib2.HTTPBasicAuthHandler(password_mgr=auth)
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/distutils/command/
register.py 105 2. send the data as a Basic auth'ed POST.
163 auth = urllib2.HTTPPasswordMgr()
165 auth.add_password(self.realm, host, username, password)
168 auth)
251 def post_to_server(self, data, auth=None):
294 # handle HTTP and include the Basic Auth handler
296 urllib2.HTTPBasicAuthHandler(password_mgr=auth)
  /frameworks/base/core/java/android/accounts/
AccountManager.java 88 * the user's actual password. (Auth tokens are normally created with a
90 * can generate auth tokens for applications, so the application doesn't need to
91 * handle passwords directly. Auth tokens are normally reusable and cached by
93 * of applications to <em>invalidate</em> auth tokens when they stop working so
116 * of accounts returned by {@link #getAccountsByType}. Requesting an auth token
119 * <li>Request an auth token for the selected account(s) using one of the
123 * <li>Make the request using the auth token. The form of the auth token,
129 * it could be that a cached auth token is stale and no longer honored by
132 * invalidating the auth token, immediately go back to the "Request an aut
    [all...]
  /external/curl/docs/
FEATURES 100 - explicit "AUTH TLS" and "AUTH SSL" usage to "upgrade" plain ftp://
104 - both password and public key auth
107 - both password and public key auth
142 - mail auth support for trusted server-to-server relaying
  /external/openssh/
OVERVIEW 86 - Code for various authentication methods resides in auth-*.c
87 (auth-passwd.c, auth-rh-rsa.c, auth-rhosts.c, auth-rsa.c). This
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 590 u8 method, const u8 *auth, size_t auth_len)
598 /* TODO: validate AUTH */
604 u8 method, const u8 *auth,
624 wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data");
636 os_memcmp_const(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
657 if (auth == NULL) {
668 auth_method = auth[0];
669 auth += 4
    [all...]
  /packages/apps/Dialer/java/com/android/voicemail/impl/mail/store/imap/
DigestMd5Utils.java 80 qop = "auth"; // Other config not supported
94 /** Verify the response-auth returned by the server is correct. */
97 throw new MessagingException("response-auth expected");
102 throw new MessagingException("invalid response-auth return from the server.");
154 * @param isResponseAuth is the response the one the server is returning us. response-auth has
  /external/wpa_supplicant_8/wpa_supplicant/
sme.c 845 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
848 MAC2STR(data->auth.peer));
854 MAC2STR(data->auth.peer), data->auth.auth_type,
855 data->auth.auth_transaction, data->auth.status_code);
857 data->auth.ies, data->auth.ies_len);
862 if (data->auth.auth_type == WLAN_AUTH_SAE) {
864 res = sme_sae_auth(wpa_s, data->auth.auth_transaction
    [all...]
  /external/curl/lib/
smtp.c 324 "AUTH",
354 smtpc->sasl.authmechs = SASL_AUTH_NONE; /* No known auth. mechanism yet */
358 smtpc->auth_supported = FALSE; /* Clear the AUTH capability */
442 * Sends an AUTH command allowing the client to login with the given SASL
452 if(initresp) { /* AUTH <mech> ...<crlf> */
453 /* Send the AUTH command with the initial response */
454 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s %s", mech, initresp);
457 /* Send the AUTH command */
458 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s", mech);
552 char *auth = NULL local
    [all...]
  /system/security/keystore/
keymaster_enforcement.cpp 151 // If no auth is required or if auth is timeout-based, we have nothing to check.
359 ALOGE("Auth required but no matching auth token found");
476 ALOGE("Authentication required, but auth token not provided");
481 ALOGE("Bug: Auth token is the wrong size (%zu expected, %zu found)",
489 ALOGE("Bug: Auth token is the version %hhu (or is not an auth token). Expected %d",
495 ALOGE("Auth token signature invalid");
500 ALOGE("Auth token has the challenge %" PRIu64 ", need %" PRIu64, auth_token.challenge
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 522 u8 method, const u8 *auth, size_t auth_len)
530 /* TODO: validate AUTH */
536 u8 method, const u8 *auth,
556 wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data");
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
591 if (auth == NULL) {
602 auth_method = auth[0];
603 auth += 4
    [all...]
  /external/libmicrohttpd/src/microhttpd/
digestauth.c 138 * @param qop qop-value: "", "auth" or "auth-int"
141 * @param hentity H(entity body) if qop="auth-int"
165 if (0 == strcasecmp(qop, "auth-int"))
168 not support auth-int. */
393 * @param realm A string of characters that describes the realm of auth.
573 char qop[15]; /* auth,auth-int */
576 const char *hentity = NULL; /* "auth-int" is not supported */
643 "Failed to allocate memory for auth header processing\n")
    [all...]
  /external/ppp/pppd/plugins/radius/etc/
dictionary.ascend 95 ATTRIBUTE Ascend-Require-Auth 201 integer
125 ATTRIBUTE Ascend-Send-Auth 231 integer
193 VALUE Ascend-Send-Auth Send-Auth-None 0
194 VALUE Ascend-Send-Auth Send-Auth-PAP 1
195 VALUE Ascend-Send-Auth Send-Auth-CHAP 2
196 VALUE Ascend-Send-Auth Send-Auth-MS-CHAP
    [all...]
  /packages/apps/Dialer/java/com/android/contacts/common/model/
AccountTypeManager.java 319 for (AuthenticatorDescription auth : auths) {
320 if (accountType.equals(auth.type)) {
321 return auth;
436 final AuthenticatorDescription auth = findAuthenticator(auths, type); local
437 if (auth == null) {
444 accountType = new GoogleAccountType(mContext, auth.packageName);
446 accountType = new ExchangeAccountType(mContext, auth.packageName, type);
447 } else if (SamsungAccountType.isSamsungAccountType(mContext, type, auth.packageName)) {
448 accountType = new SamsungAccountType(mContext, auth.packageName, type);
451 TAG, "Registering external account type=" + type + ", packageName=" + auth.packageName)
    [all...]

Completed in 1574 milliseconds

<<11121314151617181920>>