/external/ppp/pppd/ |
upap.c | 71 "Set max number of transmissions for auth-reqs", OPT_PRIO }, 198 * upap_timeout - Retransmission timer for sending auth-reqs expired. 222 * upap_reqtimeout - Give up waiting for the peer to send an auth-req. 252 upap_sauthreq(u); /* send an auth-request */ 392 upap_sresp(u, UPAP_AUTHACK, id, "", 0); /* return auth-ack */ 396 upap_sresp(u, UPAP_AUTHNAK, id, "", 0); /* return auth-nak */
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 58 wpa_hexdump(MSG_MSGDUMP, "RX pre-auth", buf, len); 63 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from " 93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 104 "pre-auth EAPOL state machines"); 320 return; /* invalid state for new pre-auth */
|
/cts/tests/autofillservice/src/android/autofillservice/cts/ |
LoginActivityTest.java | [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
smtplib.py | 61 OLDSTYLE_AUTH = re.compile(r"auth=(.*)", re.I)
412 # we have to take the old-style auth advertisement into account,
415 # 2) There are some servers that only advertise the auth methods we
420 self.esmtp_features["auth"] = self.esmtp_features.get("auth", "") \
432 if feature == "auth":
566 if not self.has_extn("auth"):
567 raise SMTPException("SMTP AUTH extension not supported by server.")
570 authlist = self.esmtp_features["auth"].split()
585 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5) [all...] |
/device/linaro/bootloader/edk2/SecurityPkg/Library/AuthVariableLib/ |
AuthVariableLib.c | 123 @param[in] AuthVarLibContextIn Pointer to input auth variable lib context.
124 @param[out] AuthVarLibContextOut Pointer to output auth variable lib context.
282 // Clean up Certs to make certDB & Time based auth variable consistent
|
/external/boringssl/src/ssl/test/runner/ |
key_agreement.go | 430 auth keyAgreementAuthentication 479 return ka.auth.signParameters(config, cert, clientHello, hello, serverECDHParams) 514 return ka.auth.verifyParameters(config, clientHello, serverHello, cert, serverECDHParams, sig) 539 if auth, ok := ka.auth.(*signedKeyAgreement); ok { 540 return auth.peerSignatureAlgorithm 549 auth keyAgreementAuthentication 588 return ka.auth.signParameters(config, cert, clientHello, hello, serverDHParams) 654 return ka.auth.verifyParameters(config, clientHello, serverHello, cert, serverDHParams, sig) 680 if auth, ok := ka.auth.(*signedKeyAgreement); ok [all...] |
/external/openssh/ |
servconf.h | 73 int login_grace_time; /* Disconnect if no auth in this time 102 int hostbased_authentication; /* If true, permit ssh2 hostbased auth */ 174 int use_pam; /* Enable auth via PAM */
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
LockSettingsServiceTests.java | 110 // clear auth token and wait for verify challenge from primary user to re-generate it. 118 // Verify that we have a new auth token for the profile 165 // clear auth token and make sure verify challenge from primary user does not regenerate it.
|
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
smtplib.py | 61 OLDSTYLE_AUTH = re.compile(r"auth=(.*)", re.I) 422 # we have to take the old-style auth advertisement into account, 425 # 2) There are some servers that only advertise the auth methods we 430 self.esmtp_features["auth"] = self.esmtp_features.get("auth", "") \ 442 if feature == "auth": 576 if not self.has_extn("auth"): 577 raise SMTPException("SMTP AUTH extension not supported by server.") 580 authlist = self.esmtp_features["auth"].split() 595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5 [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/ |
smtplib.py | 61 OLDSTYLE_AUTH = re.compile(r"auth=(.*)", re.I) 422 # we have to take the old-style auth advertisement into account, 425 # 2) There are some servers that only advertise the auth methods we 430 self.esmtp_features["auth"] = self.esmtp_features.get("auth", "") \ 442 if feature == "auth": 576 if not self.has_extn("auth"): 577 raise SMTPException("SMTP AUTH extension not supported by server.") 580 authlist = self.esmtp_features["auth"].split() 595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5 [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
smtplib.py | 61 OLDSTYLE_AUTH = re.compile(r"auth=(.*)", re.I) 422 # we have to take the old-style auth advertisement into account, 425 # 2) There are some servers that only advertise the auth methods we 430 self.esmtp_features["auth"] = self.esmtp_features.get("auth", "") \ 442 if feature == "auth": 576 if not self.has_extn("auth"): 577 raise SMTPException("SMTP AUTH extension not supported by server.") 580 authlist = self.esmtp_features["auth"].split() 595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5 [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
smtplib.py | 61 OLDSTYLE_AUTH = re.compile(r"auth=(.*)", re.I) 422 # we have to take the old-style auth advertisement into account, 425 # 2) There are some servers that only advertise the auth methods we 430 self.esmtp_features["auth"] = self.esmtp_features.get("auth", "") \ 442 if feature == "auth": 576 if not self.has_extn("auth"): 577 raise SMTPException("SMTP AUTH extension not supported by server.") 580 authlist = self.esmtp_features["auth"].split() 595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5 [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.base/META-INF/ |
MANIFEST.MF | 119 org.apache.http.auth, 120 org.apache.http.auth.params, 139 org.apache.http.impl.auth,
|
/system/tpm/trunks/ |
hmac_authorization_delegate_test.cc | 106 std::string(), // Bind auth value. 121 std::string(), // Bind auth value. 224 std::string(), // Bind auth value.
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/ |
org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.300.v20130604-1622.jar | |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.300.v20130604-1622.jar | |
/bionic/tools/bionicbb/ |
gmail.py | 36 OAUTH_SCOPE = 'https://www.googleapis.com/auth/gmail.modify'
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/ |
AuthenticationBoundKeyTestActivity.java | 127 showToast("Test failed. Key accessible without auth."); 177 showToast("Test failed. Key accessible without auth."); 310 showToast("Test failed. Key not accessible after auth"); 357 showToast("Test failed. Key not accessible after auth");
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
FingerprintBoundKeysTest.java | 114 showToast("Test failed. Key accessible without auth."); 159 * create and init cipher; has to be done before we do auth 168 * has to be run after successful auth, in order to succeed 273 showToast("Test failed. Key not accessible after auth");
|
/cts/tests/tests/accounts/src/android/accounts/cts/ |
AbstractAuthenticatorTests.java | 87 // Validate that auth token was stripped from result. 124 // Validate no auth token in result. 201 // Assert returned result contains correct account name, account type and null auth token. 267 // Assert returned result contains correct account name, account type and null auth token.
|
/development/samples/SampleSyncAdapter/ |
_index.html | 13 account manager to obtain an auth token for the account. An authenticator (a
|
/device/google/marlin/overlay/frameworks/base/core/res/res/values-mcc302-mnc720/ |
config.xml | 25 "name,apn,proxy,port,username,password,server,mmsc,mmsproxy,mmsport,mcc,mnc,auth,type",
|
/device/linaro/bootloader/edk2/MdeModulePkg/Universal/Network/IScsiDxe/ |
IScsiCHAP.h | 66 // Auth-data to be sent out for mutual authentication
|
/device/linaro/bootloader/edk2/MdePkg/Include/Guid/ |
FmpCapsule.h | 85 /// therefore can be modified without changing the Auth data.
|
/device/linaro/bootloader/edk2/NetworkPkg/Application/IpsecConfig/ |
PolicyEntryOperation.c | 516 L"--auth-algo",
655 ValueStr = ShellCommandLineGetValue (ParamPackage, L"--auth-key");
797 L"--auth-algo",
813 ValueStr = ShellCommandLineGetValue (ParamPackage, L"--auth-key");
981 L"--auth-algo"
992 L"--auth-key"
1005 L"--encrypt-algo --auth-algo"
1027 L"--auth-key"
[all...] |