/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sake.c | 22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33695 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.h | 112 const struct wpabuf *msgs, u8 *auth);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sake.c | 22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33948 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.h | 112 const struct wpabuf *msgs, u8 *auth);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sake.c | 22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon34199 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11.c | 269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 281 reply->u.auth.auth_alg = host_to_le16(auth_alg); 282 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); 283 reply->u.auth.status_code = host_to_le16(resp); 286 os_memcpy(reply->u.auth.variable, ies, ies_len); 465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable, 467 mgmt->u.auth.variable, &token, 504 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable, 506 mgmt->u.auth.variable) < 0) { 560 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) { [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11.c | 269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 281 reply->u.auth.auth_alg = host_to_le16(auth_alg); 282 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); 283 reply->u.auth.status_code = host_to_le16(resp); 286 os_memcpy(reply->u.auth.variable, ies, ies_len); 465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable, 467 mgmt->u.auth.variable, &token, 504 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable, 506 mgmt->u.auth.variable) < 0) { 560 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11.c | 269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 281 reply->u.auth.auth_alg = host_to_le16(auth_alg); 282 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); 283 reply->u.auth.status_code = host_to_le16(resp); 286 os_memcpy(reply->u.auth.variable, ies, ies_len); 465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable, 467 mgmt->u.auth.variable, &token, 504 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable, 506 mgmt->u.auth.variable) < 0) { 560 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) { [all...] |
/external/chromium_org/chrome/browser/chromeos/login/auth/ |
H A D | online_attempt_unittest.cc | 13 #include "chromeos/login/auth/auth_attempt_state.h" 14 #include "chromeos/login/auth/mock_auth_attempt_state_resolver.h" 15 #include "chromeos/login/auth/mock_url_fetchers.h" 16 #include "chromeos/login/auth/online_attempt.h" 17 #include "chromeos/login/auth/test_attempt_state.h" 18 #include "chromeos/login/auth/user_context.h" 83 void CancelLogin(OnlineAttempt* auth) { argument 86 auth->weak_factory_.GetWeakPtr()));
|
H A D | cryptohome_authenticator_unittest.cc | 5 #include "chrome/browser/chromeos/login/auth/chrome_cryptohome_authenticator.h" 40 #include "chromeos/login/auth/key.h" 41 #include "chromeos/login/auth/mock_auth_status_consumer.h" 42 #include "chromeos/login/auth/mock_url_fetchers.h" 43 #include "chromeos/login/auth/test_attempt_state.h" 44 #include "chromeos/login/auth/user_context.h" 307 void RunResolve(CryptohomeAuthenticator* auth) { argument 308 auth->Resolve(); 312 void SetAttemptState(CryptohomeAuthenticator* auth, TestAttemptState* state) { argument 313 auth 316 SetAndResolveState( CryptohomeAuthenticator* auth, TestAttemptState* state) argument [all...] |
/external/tcpdump/ |
H A D | print-zephyr.c | 46 int auth; member in struct:z_packet 173 PARSE_FIELD_INT(z.auth);
|
/external/qemu/ui/ |
H A D | vnc-android.c | 109 switch (vd->auth) { 201 monitor_printf(mon, " auth: %s\n", vnc_auth_name(vnc_display)); 1895 vnc_write_u32(vs, 1); /* Reject auth */ 1919 vnc_write_u32(vs, 1); /* Reject auth */ 1929 vnc_write_u32(vs, 0); /* Accept auth */ 1950 /* We only advertise 1 auth scheme at a time, so client 1952 if (data[0] != vs->vd->auth) { /* Reject auth */ 1953 VNC_DEBUG("Reject auth %d because it didn't match advertized\n", (int)data[0]); 1961 } else { /* Accept requested auth */ [all...] |
H A D | vnc.c | 101 switch (vd->auth) { 193 monitor_printf(mon, " auth: %s\n", vnc_auth_name(vnc_display)); 1888 vnc_write_u32(vs, 1); /* Reject auth */ 1912 vnc_write_u32(vs, 1); /* Reject auth */ 1922 vnc_write_u32(vs, 0); /* Accept auth */ 1943 /* We only advertise 1 auth scheme at a time, so client 1945 if (data[0] != vs->vd->auth) { /* Reject auth */ 1946 VNC_DEBUG("Reject auth %d because it didn't match advertized\n", (int)data[0]); 1954 } else { /* Accept requested auth */ [all...] |
/external/chromium_org/chrome/browser/chromeos/net/ |
H A D | onc_utils.cc | 342 std::string auth; local 344 &auth); 345 if (auth == ::onc::ethernet::kAuthenticationNone)
|
/external/javasqlite/src/main/java/SQLite/ |
H A D | Database.java | 570 * @param auth the authorizer function 573 public void set_authorizer(Authorizer auth) { argument 575 _set_authorizer(auth); 579 private native void _set_authorizer(Authorizer auth); argument
|
/external/ppp/pppd/plugins/radius/ |
H A D | avpair.c | 152 VALUE_PAIR *rc_avpair_gen (AUTH_HDR *auth) argument 170 ptr = auth->data; 171 length = ntohs ((unsigned short) auth->length) - AUTH_HDR_LEN;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | X509CRLTest.java | 39 import javax.security.auth.x500.X500Principal;
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CertificateTest.java | 35 import javax.security.auth.x500.X500Principal;
|
/external/apache-http/src/org/apache/http/auth/ |
H A D | AuthScope.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/AuthScope.java $ 31 package org.apache.http.auth;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | AttributeCertificateIssuer.java | 11 import javax.security.auth.x500.X500Principal;
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/ |
H A D | Makefile | 81 hash/hmac.o hash/auth.o
|
/external/dnsmasq/src/ |
H A D | lease.c | 160 lease_set_hostname(lease, name, 1); /* updates auth flag only */ 436 void lease_set_hostname(struct dhcp_lease *lease, char *name, int auth) argument 443 lease->auth_name = auth; 483 if (lease_tmp->auth_name && !auth) 500 lease->auth_name = auth;
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
H A D | SslContextBuilder.java | 36 import javax.security.auth.x500.X500Principal;
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
H A D | OkHostnameVerifier.java | 32 import javax.security.auth.x500.X500Principal;
|
/external/openssl/android.testssl/ |
H A D | testssl | 180 echo test tls1 with SRP auth 183 echo test tls1 with SRP auth via BIO pair
|