Searched refs:auth (Results 176 - 200 of 409) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sake.c22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33695
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.h112 const struct wpabuf *msgs, u8 *auth);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sake.c22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33948
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.h112 const struct wpabuf *msgs, u8 *auth);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_sake.c22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon34199
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11.c269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
281 reply->u.auth.auth_alg = host_to_le16(auth_alg);
282 reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
283 reply->u.auth.status_code = host_to_le16(resp);
286 os_memcpy(reply->u.auth.variable, ies, ies_len);
465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
467 mgmt->u.auth.variable, &token,
504 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable,
506 mgmt->u.auth.variable) < 0) {
560 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) {
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dieee802_11.c269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
281 reply->u.auth.auth_alg = host_to_le16(auth_alg);
282 reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
283 reply->u.auth.status_code = host_to_le16(resp);
286 os_memcpy(reply->u.auth.variable, ies, ies_len);
465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
467 mgmt->u.auth.variable, &token,
504 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable,
506 mgmt->u.auth.variable) < 0) {
560 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) {
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11.c269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
281 reply->u.auth.auth_alg = host_to_le16(auth_alg);
282 reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
283 reply->u.auth.status_code = host_to_le16(resp);
286 os_memcpy(reply->u.auth.variable, ies, ies_len);
465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
467 mgmt->u.auth.variable, &token,
504 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable,
506 mgmt->u.auth.variable) < 0) {
560 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) {
[all...]
/external/chromium_org/chrome/browser/chromeos/login/auth/
H A Donline_attempt_unittest.cc13 #include "chromeos/login/auth/auth_attempt_state.h"
14 #include "chromeos/login/auth/mock_auth_attempt_state_resolver.h"
15 #include "chromeos/login/auth/mock_url_fetchers.h"
16 #include "chromeos/login/auth/online_attempt.h"
17 #include "chromeos/login/auth/test_attempt_state.h"
18 #include "chromeos/login/auth/user_context.h"
83 void CancelLogin(OnlineAttempt* auth) { argument
86 auth->weak_factory_.GetWeakPtr()));
H A Dcryptohome_authenticator_unittest.cc5 #include "chrome/browser/chromeos/login/auth/chrome_cryptohome_authenticator.h"
40 #include "chromeos/login/auth/key.h"
41 #include "chromeos/login/auth/mock_auth_status_consumer.h"
42 #include "chromeos/login/auth/mock_url_fetchers.h"
43 #include "chromeos/login/auth/test_attempt_state.h"
44 #include "chromeos/login/auth/user_context.h"
307 void RunResolve(CryptohomeAuthenticator* auth) { argument
308 auth->Resolve();
312 void SetAttemptState(CryptohomeAuthenticator* auth, TestAttemptState* state) { argument
313 auth
316 SetAndResolveState( CryptohomeAuthenticator* auth, TestAttemptState* state) argument
[all...]
/external/tcpdump/
H A Dprint-zephyr.c46 int auth; member in struct:z_packet
173 PARSE_FIELD_INT(z.auth);
/external/qemu/ui/
H A Dvnc-android.c109 switch (vd->auth) {
201 monitor_printf(mon, " auth: %s\n", vnc_auth_name(vnc_display));
1895 vnc_write_u32(vs, 1); /* Reject auth */
1919 vnc_write_u32(vs, 1); /* Reject auth */
1929 vnc_write_u32(vs, 0); /* Accept auth */
1950 /* We only advertise 1 auth scheme at a time, so client
1952 if (data[0] != vs->vd->auth) { /* Reject auth */
1953 VNC_DEBUG("Reject auth %d because it didn't match advertized\n", (int)data[0]);
1961 } else { /* Accept requested auth */
[all...]
H A Dvnc.c101 switch (vd->auth) {
193 monitor_printf(mon, " auth: %s\n", vnc_auth_name(vnc_display));
1888 vnc_write_u32(vs, 1); /* Reject auth */
1912 vnc_write_u32(vs, 1); /* Reject auth */
1922 vnc_write_u32(vs, 0); /* Accept auth */
1943 /* We only advertise 1 auth scheme at a time, so client
1945 if (data[0] != vs->vd->auth) { /* Reject auth */
1946 VNC_DEBUG("Reject auth %d because it didn't match advertized\n", (int)data[0]);
1954 } else { /* Accept requested auth */
[all...]
/external/chromium_org/chrome/browser/chromeos/net/
H A Donc_utils.cc342 std::string auth; local
344 &auth);
345 if (auth == ::onc::ethernet::kAuthenticationNone)
/external/javasqlite/src/main/java/SQLite/
H A DDatabase.java570 * @param auth the authorizer function
573 public void set_authorizer(Authorizer auth) { argument
575 _set_authorizer(auth);
579 private native void _set_authorizer(Authorizer auth); argument
/external/ppp/pppd/plugins/radius/
H A Davpair.c152 VALUE_PAIR *rc_avpair_gen (AUTH_HDR *auth) argument
170 ptr = auth->data;
171 length = ntohs ((unsigned short) auth->length) - AUTH_HDR_LEN;
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
H A DX509CRLTest.java39 import javax.security.auth.x500.X500Principal;
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/
H A DX509CertificateTest.java35 import javax.security.auth.x500.X500Principal;
/external/apache-http/src/org/apache/http/auth/
H A DAuthScope.java2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthScope.java $
31 package org.apache.http.auth;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
H A DAttributeCertificateIssuer.java11 import javax.security.auth.x500.X500Principal;
/external/chromium_org/third_party/libsrtp/srtp/crypto/
H A DMakefile81 hash/hmac.o hash/auth.o
/external/dnsmasq/src/
H A Dlease.c160 lease_set_hostname(lease, name, 1); /* updates auth flag only */
436 void lease_set_hostname(struct dhcp_lease *lease, char *name, int auth) argument
443 lease->auth_name = auth;
483 if (lease_tmp->auth_name && !auth)
500 lease->auth_name = auth;
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
H A DSslContextBuilder.java36 import javax.security.auth.x500.X500Principal;
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
H A DOkHostnameVerifier.java32 import javax.security.auth.x500.X500Principal;
/external/openssl/android.testssl/
H A Dtestssl180 echo test tls1 with SRP auth
183 echo test tls1 with SRP auth via BIO pair

Completed in 1167 milliseconds

1234567891011>>