HomeSort by relevance Sort by last modified time
    Searched full:auth (Results 476 - 500 of 2231) sorted by null

<<11121314151617181920>>

  /device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/
Tpm2Sequences.c 26 TPM2B_AUTH Auth;
120 Buffer = (UINT8 *)&Cmd.Auth;
122 // auth = nullAuth
211 // Add in Auth session
316 // Add in pcrHandle Auth session
437 // Add in Auth session
  /external/apache-http/android/src/android/net/http/
HttpAuthHeader.java 42 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth").
84 * value "auth" indicates authentication; the value "auth-int"
182 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth").
237 * DIGEST (only algorithm="md5", no qop or qop="auth).
248 (mQop == null || mQop.equals("auth"));
  /external/webrtc/webrtc/libjingle/xmpp/
xmppengine_unittest.cc 142 EXPECT_EQ("<auth xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\" "
144 "auth:allow-non-google-login=\"true\" "
145 "auth:client-uses-full-bind-result=\"true\" "
146 "xmlns:auth=\"http://www.google.com/talk/protocol/auth\""
147 ">AGRhdmlkAGRhdmlk</auth>",
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon37745
267 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
312 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
322 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Auth-Reject");
333 "Response/Auth-Reject");
349 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /system/nvram/client/
nvram_client.c 360 {"create_space", "<index> <size> <controls> <auth>", 4, &HandleCreateSpace},
361 {"delete_space", "<index> <auth>", 2, &HandleDeleteSpace},
363 {"write_space", "<index> <data> <auth>", 3, &HandleWriteSpace},
364 {"read_space", "<index> <auth>", 2, &HandleReadSpace},
365 {"enable_write_lock", "<index> <auth>", 2, &HandleEnableWriteLock},
366 {"enable_read_lock", "<index> <auth>", 2, &HandleEnableReadLock},
  /system/security/keystore/
key_store_service.h 198 * Get the auth token for this operation from the auth token table.
200 * Returns ::NO_ERROR if the auth token was set or none was required.
204 * KM_ERROR_KEY_USER_NOT_AUTHENTICATED if there is no valid auth
213 * Add the auth token for the operation to the param list if the operation
217 * Returns ::NO_ERROR if the auth token was added or not needed.
  /system/tpm/trunks/
mock_tpm.h 465 const TPM2B_AUTH& auth,
472 const TPM2B_AUTH& auth,
477 void(const TPM2B_AUTH& auth,
482 TPM_RC(const TPM2B_AUTH& auth,
    [all...]
  /external/tcpdump/tests/
vrrp-v.out 2 10.0.0.91 > 224.0.0.18: vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh"
8 10.0.0.91 > 224.0.0.18: vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh"
16 10.0.0.91 > 224.0.0.18: vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh"
24 10.0.0.92 > 224.0.0.18: vrrp 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 192, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh"
32 10.0.0.92 > 224.0.0.18: vrrp 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 192, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh"
40 10.0.0.92 > 224.0.0.18: vrrp 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 192, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh"
48 10.0.0.93 > 224.0.0.18: vrrp 10.0.0.93 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 193, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh"
56 10.0.0.93 > 224.0.0.18: vrrp 10.0.0.93 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 193, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh"
64 10.0.0.93 > 224.0.0.18: vrrp 10.0.0.93 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 193, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh"
74 10.0.0.93 > 224.0.0.18: vrrp 10.0.0.93 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 193, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh
    [all...]
  /external/wpa_supplicant_8/hostapd/
hlr_auc_gw.c 18 * SIM-REQ-AUTH <IMSI> <max_chal>
19 * SIM-RESP-AUTH <IMSI> Kc1:SRES1:RAND1 Kc2:SRES2:RAND2 [Kc3:SRES3:RAND3]
20 * SIM-RESP-AUTH <IMSI> FAILURE
21 * GSM-AUTH-REQ <IMSI> RAND1:RAND2[:RAND3]
22 * GSM-AUTH-RESP <IMSI> Kc1:SRES1:Kc2:SRES2[:Kc3:SRES3]
23 * GSM-AUTH-RESP <IMSI> FAILURE
26 * AKA-REQ-AUTH <IMSI>
27 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
28 * AKA-RESP-AUTH <IMSI> FAILURE
610 ret = snprintf(rpos, rend - rpos, "SIM-RESP-AUTH %s", imsi)
    [all...]
  /external/cros/system_api/dbus/shill/
dbus-constants.h 293 // Flimflam EAP phase 2 auth options.
294 const char kEapPhase2AuthPEAPMD5[] = "auth=MD5";
295 const char kEapPhase2AuthPEAPMSCHAPV2[] = "auth=MSCHAPV2";
296 const char kEapPhase2AuthPEAPGTC[] = "auth=GTC";
300 const char kEapPhase2AuthTTLSMSCHAPV2[] = "auth=MSCHAPV2";
301 const char kEapPhase2AuthTTLSMSCHAP[] = "auth=MSCHAP";
302 const char kEapPhase2AuthTTLSPAP[] = "auth=PAP";
303 const char kEapPhase2AuthTTLSCHAP[] = "auth=CHAP";
304 const char kEapPhase2AuthTTLSGTC[] = "auth=GTC";
353 const char kOpenVPNAuthProperty[] = "OpenVPN.Auth";
    [all...]
  /external/curl/lib/vauth/
digest.c 53 #define DIGEST_QOP_VALUE_STRING_AUTH "auth"
54 #define DIGEST_QOP_VALUE_STRING_AUTH_INT "auth-int"
55 #define DIGEST_QOP_VALUE_STRING_AUTH_CONF "auth-conf"
371 /* We only support auth quality-of-protection */
553 /* Tokenize the list and choose auth if possible, use a temporary
572 /* Select only auth or auth-int. Otherwise, ignore */
719 If the "qop" directive's value is "auth" or is unspecified, then A2 is:
723 If the "qop" value is "auth-int", then A2 is:
733 if(digest->qop && Curl_raw_equal(digest->qop, "auth-int"))
    [all...]
  /prebuilts/tools/common/http-client/src/
httpcomponents-client-4.1.1-src.zip 
  /prebuilts/sdk/4/
android.jar 
  /frameworks/base/services/core/java/com/android/server/
LockSettingsService.java 1565 AuthenticationToken auth = initializeSyntheticPasswordLocked( local
1857 AuthenticationToken auth = mSpManager.newSyntheticPasswordAndSid(getGateKeeperService(), local
1869 mSpManager.newSidForUser(getGateKeeperService(), auth, userId); local
1871 mSpManager.verifyChallenge(getGateKeeperService(), auth, 0L, userId); local
1982 mSpManager.verifyChallenge(getGateKeeperService(), auth, 0L, userId); local
1986 mSpManager.newSidForUser(getGateKeeperService(), auth, userId); local
1987 mSpManager.verifyChallenge(getGateKeeperService(), auth, 0L, userId); local
2031 AuthenticationToken auth = authResult.authToken; local
2064 AuthenticationToken auth = null; local
    [all...]
  /development/samples/ApiDemos/src/com/example/android/apis/content/
MediaContentJob.java 89 for (String auth : params.getTriggeredContentAuthorities()) {
95 sb.append(auth);
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/distutils/tests/
test_upload.py 124 auth = self.last_open.req.headers['Authorization']
125 self.assertFalse('\n' in auth)
  /device/linaro/bootloader/edk2/SecurityPkg/Include/Library/
Tcg2PhysicalPresenceLib.h 66 @param PlatformAuth platform auth value. NULL means no platform auth change.
Tcg2PpVendorLib.h 37 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
  /device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTrEEPhysicalPresenceLib/
DxeTrEEPhysicalPresenceLib.c 63 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
109 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
412 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
564 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
  /device/linaro/bootloader/edk2/SecurityPkg/Library/Tcg2PpVendorLibNull/
Tcg2PpVendorLibNull.c 27 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
  /device/linaro/bootloader/edk2/SecurityPkg/Library/TrEEPpVendorLibNull/
TrEEPpVendorLibNull.c 27 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
  /external/apache-http/src/org/apache/http/auth/
AuthenticationException.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthenticationException.java $
31 package org.apache.http.auth;
BasicUserPrincipal.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/BasicUserPrincipal.java $
31 package org.apache.http.auth;
Credentials.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/Credentials.java $
31 package org.apache.http.auth;
InvalidCredentialsException.java 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/InvalidCredentialsException.java $
31 package org.apache.http.auth;

Completed in 1316 milliseconds

<<11121314151617181920>>