/device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
Tpm2Sequences.c | 26 TPM2B_AUTH Auth;
120 Buffer = (UINT8 *)&Cmd.Auth;
122 // auth = nullAuth
211 // Add in Auth session
316 // Add in pcrHandle Auth session
437 // Add in Auth session
|
/external/apache-http/android/src/android/net/http/ |
HttpAuthHeader.java | 42 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth"). 84 * value "auth" indicates authentication; the value "auth-int" 182 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth"). 237 * DIGEST (only algorithm="md5", no qop or qop="auth). 248 (mQop == null || mQop.equals("auth"));
|
/external/webrtc/webrtc/libjingle/xmpp/ |
xmppengine_unittest.cc | 142 EXPECT_EQ("<auth xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\" " 144 "auth:allow-non-google-login=\"true\" " 145 "auth:client-uses-full-bind-result=\"true\" " 146 "xmlns:auth=\"http://www.google.com/talk/protocol/auth\"" 147 ">AGRhdmlkAGRhdmlk</auth>",
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon37745 267 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 312 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 322 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Auth-Reject"); 333 "Response/Auth-Reject"); 349 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/system/nvram/client/ |
nvram_client.c | 360 {"create_space", "<index> <size> <controls> <auth>", 4, &HandleCreateSpace}, 361 {"delete_space", "<index> <auth>", 2, &HandleDeleteSpace}, 363 {"write_space", "<index> <data> <auth>", 3, &HandleWriteSpace}, 364 {"read_space", "<index> <auth>", 2, &HandleReadSpace}, 365 {"enable_write_lock", "<index> <auth>", 2, &HandleEnableWriteLock}, 366 {"enable_read_lock", "<index> <auth>", 2, &HandleEnableReadLock},
|
/system/security/keystore/ |
key_store_service.h | 198 * Get the auth token for this operation from the auth token table. 200 * Returns ::NO_ERROR if the auth token was set or none was required. 204 * KM_ERROR_KEY_USER_NOT_AUTHENTICATED if there is no valid auth 213 * Add the auth token for the operation to the param list if the operation 217 * Returns ::NO_ERROR if the auth token was added or not needed.
|
/system/tpm/trunks/ |
mock_tpm.h | 465 const TPM2B_AUTH& auth, 472 const TPM2B_AUTH& auth, 477 void(const TPM2B_AUTH& auth, 482 TPM_RC(const TPM2B_AUTH& auth, [all...] |
/external/tcpdump/tests/ |
vrrp-v.out | 2 10.0.0.91 > 224.0.0.18: vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh" 8 10.0.0.91 > 224.0.0.18: vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh" 16 10.0.0.91 > 224.0.0.18: vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh" 24 10.0.0.92 > 224.0.0.18: vrrp 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 192, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh" 32 10.0.0.92 > 224.0.0.18: vrrp 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 192, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh" 40 10.0.0.92 > 224.0.0.18: vrrp 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 192, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh" 48 10.0.0.93 > 224.0.0.18: vrrp 10.0.0.93 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 193, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh" 56 10.0.0.93 > 224.0.0.18: vrrp 10.0.0.93 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 193, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh" 64 10.0.0.93 > 224.0.0.18: vrrp 10.0.0.93 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 193, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh" 74 10.0.0.93 > 224.0.0.18: vrrp 10.0.0.93 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 193, authtype simple, intvl 10s, length 28, addrs(3): 10.4.42.1,10.4.42.2,10.4.42.3 auth "abcdefgh [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 18 * SIM-REQ-AUTH <IMSI> <max_chal> 19 * SIM-RESP-AUTH <IMSI> Kc1:SRES1:RAND1 Kc2:SRES2:RAND2 [Kc3:SRES3:RAND3] 20 * SIM-RESP-AUTH <IMSI> FAILURE 21 * GSM-AUTH-REQ <IMSI> RAND1:RAND2[:RAND3] 22 * GSM-AUTH-RESP <IMSI> Kc1:SRES1:Kc2:SRES2[:Kc3:SRES3] 23 * GSM-AUTH-RESP <IMSI> FAILURE 26 * AKA-REQ-AUTH <IMSI> 27 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 28 * AKA-RESP-AUTH <IMSI> FAILURE 610 ret = snprintf(rpos, rend - rpos, "SIM-RESP-AUTH %s", imsi) [all...] |
/external/cros/system_api/dbus/shill/ |
dbus-constants.h | 293 // Flimflam EAP phase 2 auth options. 294 const char kEapPhase2AuthPEAPMD5[] = "auth=MD5"; 295 const char kEapPhase2AuthPEAPMSCHAPV2[] = "auth=MSCHAPV2"; 296 const char kEapPhase2AuthPEAPGTC[] = "auth=GTC"; 300 const char kEapPhase2AuthTTLSMSCHAPV2[] = "auth=MSCHAPV2"; 301 const char kEapPhase2AuthTTLSMSCHAP[] = "auth=MSCHAP"; 302 const char kEapPhase2AuthTTLSPAP[] = "auth=PAP"; 303 const char kEapPhase2AuthTTLSCHAP[] = "auth=CHAP"; 304 const char kEapPhase2AuthTTLSGTC[] = "auth=GTC"; 353 const char kOpenVPNAuthProperty[] = "OpenVPN.Auth"; [all...] |
/external/curl/lib/vauth/ |
digest.c | 53 #define DIGEST_QOP_VALUE_STRING_AUTH "auth" 54 #define DIGEST_QOP_VALUE_STRING_AUTH_INT "auth-int" 55 #define DIGEST_QOP_VALUE_STRING_AUTH_CONF "auth-conf" 371 /* We only support auth quality-of-protection */ 553 /* Tokenize the list and choose auth if possible, use a temporary 572 /* Select only auth or auth-int. Otherwise, ignore */ 719 If the "qop" directive's value is "auth" or is unspecified, then A2 is: 723 If the "qop" value is "auth-int", then A2 is: 733 if(digest->qop && Curl_raw_equal(digest->qop, "auth-int")) [all...] |
/prebuilts/tools/common/http-client/src/ |
httpcomponents-client-4.1.1-src.zip | |
/prebuilts/sdk/4/ |
android.jar | |
/frameworks/base/services/core/java/com/android/server/ |
LockSettingsService.java | 1565 AuthenticationToken auth = initializeSyntheticPasswordLocked( local 1857 AuthenticationToken auth = mSpManager.newSyntheticPasswordAndSid(getGateKeeperService(), local 1869 mSpManager.newSidForUser(getGateKeeperService(), auth, userId); local 1871 mSpManager.verifyChallenge(getGateKeeperService(), auth, 0L, userId); local 1982 mSpManager.verifyChallenge(getGateKeeperService(), auth, 0L, userId); local 1986 mSpManager.newSidForUser(getGateKeeperService(), auth, userId); local 1987 mSpManager.verifyChallenge(getGateKeeperService(), auth, 0L, userId); local 2031 AuthenticationToken auth = authResult.authToken; local 2064 AuthenticationToken auth = null; local [all...] |
/development/samples/ApiDemos/src/com/example/android/apis/content/ |
MediaContentJob.java | 89 for (String auth : params.getTriggeredContentAuthorities()) { 95 sb.append(auth);
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/distutils/tests/ |
test_upload.py | 124 auth = self.last_open.req.headers['Authorization']
125 self.assertFalse('\n' in auth)
|
/device/linaro/bootloader/edk2/SecurityPkg/Include/Library/ |
Tcg2PhysicalPresenceLib.h | 66 @param PlatformAuth platform auth value. NULL means no platform auth change.
|
Tcg2PpVendorLib.h | 37 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTrEEPhysicalPresenceLib/ |
DxeTrEEPhysicalPresenceLib.c | 63 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
109 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
412 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
564 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/Tcg2PpVendorLibNull/ |
Tcg2PpVendorLibNull.c | 27 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/TrEEPpVendorLibNull/ |
TrEEPpVendorLibNull.c | 27 @param[in] PlatformAuth platform auth value. NULL means no platform auth change.
|
/external/apache-http/src/org/apache/http/auth/ |
AuthenticationException.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthenticationException.java $ 31 package org.apache.http.auth;
|
BasicUserPrincipal.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/BasicUserPrincipal.java $ 31 package org.apache.http.auth;
|
Credentials.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/Credentials.java $ 31 package org.apache.http.auth;
|
InvalidCredentialsException.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/InvalidCredentialsException.java $ 31 package org.apache.http.auth;
|