Searched refs:auth (Results 201 - 225 of 409) sorted by relevance

1234567891011>>

/external/ppp/pppd/
H A DMakefile.linux15 ecp.c ipxcp.c auth.c options.c sys-linux.c md4.c chap_ms.c \
24 ecp.o auth.o options.o demand.o utils.o sys-linux.o ipxcp.o tty.o \
H A Dauth.c2 * auth.c - PPP authentication and phase control.
71 #define RCSID "$Id: auth.c,v 1.101 2004/11/12 10:30:51 paulus Exp $"
206 * This is used to ensure that we don't start an auth-up/down
225 bool refuse_pap = 0; /* Don't wanna auth. ourselves with PAP */
226 bool refuse_chap = 0; /* Don't wanna auth. ourselves with CHAP */
227 bool refuse_eap = 0; /* Don't wanna auth. ourselves with EAP */
229 bool refuse_mschap = 0; /* Don't wanna auth. ourselves with MS-CHAP */
230 bool refuse_mschap_v2 = 0; /* Don't wanna auth. ourselves with MS-CHAPv2 */
232 bool refuse_mschap = 1; /* Don't wanna auth. ourselves with MS-CHAP */
233 bool refuse_mschap_v2 = 1; /* Don't wanna auth
705 int auth; local
[all...]
/external/smack/src/org/apache/harmony/javax/security/auth/callback/
H A DConfirmationCallback.java18 package org.apache.harmony.javax.security.auth.callback;
65 throw new IllegalArgumentException("auth.16"); //$NON-NLS-1$
71 throw new IllegalArgumentException("auth.17"); //$NON-NLS-1$
76 throw new IllegalArgumentException("auth.17"); //$NON-NLS-1$
81 throw new IllegalArgumentException("auth.17"); //$NON-NLS-1$
85 throw new IllegalArgumentException("auth.18"); //$NON-NLS-1$
95 throw new IllegalArgumentException("auth.16"); //$NON-NLS-1$
99 throw new IllegalArgumentException("auth.1A"); //$NON-NLS-1$
103 throw new IllegalArgumentException("auth.1A"); //$NON-NLS-1$
107 throw new IllegalArgumentException("auth
[all...]
/external/srtp/crypto/
H A DMakefile74 hash/hmac.o hash/auth.o
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sake.c23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33662
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sake.c23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33915
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_sake.c23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon34166
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwps_supplicant.h23 const char *auth; member in struct:wps_new_ap_settings
/external/openssl/ssl/
H A Dkssl.c59 /* ssl/kssl.c -- Routines to support (& debug) Kerberos5 auth for openssl
1504 printf("\tstart/auth/end times: %d / %d / %d\n",
2002 KRB5_AUTHENTBODY *auth = NULL; local
2113 if ((auth = (KRB5_AUTHENTBODY *) d2i_KRB5_AUTHENT(NULL, &p,
2123 if (k_gmtime(auth->ctime, &tm_time) &&
2136 if (auth && auth->ctime && auth->ctime->length && auth->ctime->data)
2137 printf("%.*s\n", auth
[all...]
/external/chromium_org/tools/telemetry/third_party/davclient/
H A Ddavclient.py105 auth = 'Basic %s' % base64.encodestring('%s:%s' % (username, password)).strip()
108 self.headers['Authorization'] = auth
/external/apache-http/src/org/apache/http/impl/client/
H A DDefaultRequestDirector.java54 import org.apache.http.auth.AuthScheme;
55 import org.apache.http.auth.AuthScope;
56 import org.apache.http.auth.AuthState;
57 import org.apache.http.auth.AuthenticationException;
58 import org.apache.http.auth.Credentials;
59 import org.apache.http.auth.MalformedChallengeException;
788 // Reset proxy auth scope
988 // Reset target auth scope
1016 // Reset proxy auth scope
/external/chromium_org/chromeos/network/onc/
H A Donc_validator.cc536 std::string auth; local
537 result->GetStringWithoutPathExpansion(kAuthentication, &auth);
538 if (auth == k8021X)
641 std::string auth; local
642 result->GetStringWithoutPathExpansion(kAuthenticationType, &auth);
645 if (auth == kCert) {
/external/nist-sip/java/gov/nist/javax/sip/header/
H A DHeaderFactoryImpl.java200 AuthenticationInfo auth = new AuthenticationInfo();
201 auth.setResponse(response);
203 return auth;
219 Authorization auth = new Authorization();
220 auth.setScheme(scheme);
222 return auth;
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_client.c236 int sock, int sock6, int auth);
959 int sock, int sock6, int auth)
975 auth ? "Authentication" : "Accounting",
990 if (auth)
1002 if ((auth && entry->msg_type != RADIUS_AUTH) ||
1003 (!auth && entry->msg_type != RADIUS_ACCT))
1106 if (auth)
956 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) argument
/external/wpa_supplicant_8/src/radius/
H A Dradius_client.c236 int sock, int sock6, int auth);
959 int sock, int sock6, int auth)
975 auth ? "Authentication" : "Accounting",
990 if (auth)
1002 if ((auth && entry->msg_type != RADIUS_AUTH) ||
1003 (!auth && entry->msg_type != RADIUS_ACCT))
1106 if (auth)
956 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) argument
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_client.c236 int sock, int sock6, int auth);
959 int sock, int sock6, int auth)
975 auth ? "Authentication" : "Accounting",
990 if (auth)
1002 if ((auth && entry->msg_type != RADIUS_AUTH) ||
1003 (!auth && entry->msg_type != RADIUS_ACCT))
1106 if (auth)
956 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) argument
/external/chromium_org/net/tools/testserver/
H A Dtestserver.py1119 if not self._ShouldHandleRequest("/auth-basic"):
1136 auth = self.headers.getheader('authorization')
1138 if not auth:
1139 raise Exception('no auth')
1140 b64str = re.findall(r'Basic (\S+)', auth)[0]
1156 self.wfile.write('auth=%s<p>' % auth)
1202 self.wfile.write('auth=%s<p>' % auth)
1233 if not self._ShouldHandleRequest("/auth
[all...]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_atheros.c856 if (len - IEEE80211_HDRLEN < sizeof(mgmt->u.auth))
859 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
860 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN);
861 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg);
862 event.auth.status_code =
863 le_to_host16(mgmt->u.auth.status_code);
864 event.auth.auth_transaction =
865 le_to_host16(mgmt->u.auth.auth_transaction);
866 event.auth
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_atheros.c856 if (len - IEEE80211_HDRLEN < sizeof(mgmt->u.auth))
859 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
860 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN);
861 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg);
862 event.auth.status_code =
863 le_to_host16(mgmt->u.auth.status_code);
864 event.auth.auth_transaction =
865 le_to_host16(mgmt->u.auth.auth_transaction);
866 event.auth
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_atheros.c856 if (len - IEEE80211_HDRLEN < sizeof(mgmt->u.auth))
859 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
860 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN);
861 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg);
862 event.auth.status_code =
863 le_to_host16(mgmt->u.auth.status_code);
864 event.auth.auth_transaction =
865 le_to_host16(mgmt->u.auth.auth_transaction);
866 event.auth
[all...]
/external/smack/src/org/jivesoftware/smack/
H A DXMPPConnection.java35 import org.apache.harmony.javax.security.auth.callback.Callback;
36 import org.apache.harmony.javax.security.auth.callback.CallbackHandler;
37 import org.apache.harmony.javax.security.auth.callback.PasswordCallback;
885 // System.err.println("Connection wants client auth");
888 // System.err.println("Connection needs client auth");
891 // System.err.println("Connection does not require client auth");
/external/dnsmasq/src/
H A Drfc1035.c1141 int nxdomain = 0, auth = 1, trunc = 0; local
1280 auth = 0;
1290 auth = 0;
1418 auth = 0;
1434 auth = 0;
1588 header->aa = auth; /* authoritive - only hosts and DHCP derived names. */
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c700 os_memcpy(buf, stk->u.auth.tx_mic_key, 8);
701 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8);
702 os_memcpy(stk->u.auth.rx_mic_key, buf, 8);
862 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8);
863 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c700 os_memcpy(buf, stk->u.auth.tx_mic_key, 8);
701 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8);
702 os_memcpy(stk->u.auth.rx_mic_key, buf, 8);
862 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8);
863 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c700 os_memcpy(buf, stk->u.auth.tx_mic_key, 8);
701 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8);
702 os_memcpy(stk->u.auth.rx_mic_key, buf, 8);
862 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8);
863 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);

Completed in 2740 milliseconds

1234567891011>>