/external/ppp/pppd/ |
H A D | Makefile.linux | 15 ecp.c ipxcp.c auth.c options.c sys-linux.c md4.c chap_ms.c \ 24 ecp.o auth.o options.o demand.o utils.o sys-linux.o ipxcp.o tty.o \
|
H A D | auth.c | 2 * auth.c - PPP authentication and phase control. 71 #define RCSID "$Id: auth.c,v 1.101 2004/11/12 10:30:51 paulus Exp $" 206 * This is used to ensure that we don't start an auth-up/down 225 bool refuse_pap = 0; /* Don't wanna auth. ourselves with PAP */ 226 bool refuse_chap = 0; /* Don't wanna auth. ourselves with CHAP */ 227 bool refuse_eap = 0; /* Don't wanna auth. ourselves with EAP */ 229 bool refuse_mschap = 0; /* Don't wanna auth. ourselves with MS-CHAP */ 230 bool refuse_mschap_v2 = 0; /* Don't wanna auth. ourselves with MS-CHAPv2 */ 232 bool refuse_mschap = 1; /* Don't wanna auth. ourselves with MS-CHAP */ 233 bool refuse_mschap_v2 = 1; /* Don't wanna auth 705 int auth; local [all...] |
/external/smack/src/org/apache/harmony/javax/security/auth/callback/ |
H A D | ConfirmationCallback.java | 18 package org.apache.harmony.javax.security.auth.callback; 65 throw new IllegalArgumentException("auth.16"); //$NON-NLS-1$ 71 throw new IllegalArgumentException("auth.17"); //$NON-NLS-1$ 76 throw new IllegalArgumentException("auth.17"); //$NON-NLS-1$ 81 throw new IllegalArgumentException("auth.17"); //$NON-NLS-1$ 85 throw new IllegalArgumentException("auth.18"); //$NON-NLS-1$ 95 throw new IllegalArgumentException("auth.16"); //$NON-NLS-1$ 99 throw new IllegalArgumentException("auth.1A"); //$NON-NLS-1$ 103 throw new IllegalArgumentException("auth.1A"); //$NON-NLS-1$ 107 throw new IllegalArgumentException("auth [all...] |
/external/srtp/crypto/ |
H A D | Makefile | 74 hash/hmac.o hash/auth.o
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sake.c | 23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33662 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sake.c | 23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon33915 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon34166 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wps_supplicant.h | 23 const char *auth; member in struct:wps_new_ap_settings
|
/external/openssl/ssl/ |
H A D | kssl.c | 59 /* ssl/kssl.c -- Routines to support (& debug) Kerberos5 auth for openssl 1504 printf("\tstart/auth/end times: %d / %d / %d\n", 2002 KRB5_AUTHENTBODY *auth = NULL; local 2113 if ((auth = (KRB5_AUTHENTBODY *) d2i_KRB5_AUTHENT(NULL, &p, 2123 if (k_gmtime(auth->ctime, &tm_time) && 2136 if (auth && auth->ctime && auth->ctime->length && auth->ctime->data) 2137 printf("%.*s\n", auth [all...] |
/external/chromium_org/tools/telemetry/third_party/davclient/ |
H A D | davclient.py | 105 auth = 'Basic %s' % base64.encodestring('%s:%s' % (username, password)).strip() 108 self.headers['Authorization'] = auth
|
/external/apache-http/src/org/apache/http/impl/client/ |
H A D | DefaultRequestDirector.java | 54 import org.apache.http.auth.AuthScheme; 55 import org.apache.http.auth.AuthScope; 56 import org.apache.http.auth.AuthState; 57 import org.apache.http.auth.AuthenticationException; 58 import org.apache.http.auth.Credentials; 59 import org.apache.http.auth.MalformedChallengeException; 788 // Reset proxy auth scope 988 // Reset target auth scope 1016 // Reset proxy auth scope
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_validator.cc | 536 std::string auth; local 537 result->GetStringWithoutPathExpansion(kAuthentication, &auth); 538 if (auth == k8021X) 641 std::string auth; local 642 result->GetStringWithoutPathExpansion(kAuthenticationType, &auth); 645 if (auth == kCert) {
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
H A D | HeaderFactoryImpl.java | 200 AuthenticationInfo auth = new AuthenticationInfo(); 201 auth.setResponse(response); 203 return auth; 219 Authorization auth = new Authorization(); 220 auth.setScheme(scheme); 222 return auth;
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_client.c | 236 int sock, int sock6, int auth); 959 int sock, int sock6, int auth) 975 auth ? "Authentication" : "Accounting", 990 if (auth) 1002 if ((auth && entry->msg_type != RADIUS_AUTH) || 1003 (!auth && entry->msg_type != RADIUS_ACCT)) 1106 if (auth) 956 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) argument
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_client.c | 236 int sock, int sock6, int auth); 959 int sock, int sock6, int auth) 975 auth ? "Authentication" : "Accounting", 990 if (auth) 1002 if ((auth && entry->msg_type != RADIUS_AUTH) || 1003 (!auth && entry->msg_type != RADIUS_ACCT)) 1106 if (auth) 956 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_client.c | 236 int sock, int sock6, int auth); 959 int sock, int sock6, int auth) 975 auth ? "Authentication" : "Accounting", 990 if (auth) 1002 if ((auth && entry->msg_type != RADIUS_AUTH) || 1003 (!auth && entry->msg_type != RADIUS_ACCT)) 1106 if (auth) 956 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) argument
|
/external/chromium_org/net/tools/testserver/ |
H A D | testserver.py | 1119 if not self._ShouldHandleRequest("/auth-basic"): 1136 auth = self.headers.getheader('authorization') 1138 if not auth: 1139 raise Exception('no auth') 1140 b64str = re.findall(r'Basic (\S+)', auth)[0] 1156 self.wfile.write('auth=%s<p>' % auth) 1202 self.wfile.write('auth=%s<p>' % auth) 1233 if not self._ShouldHandleRequest("/auth [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_atheros.c | 856 if (len - IEEE80211_HDRLEN < sizeof(mgmt->u.auth)) 859 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 860 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN); 861 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 862 event.auth.status_code = 863 le_to_host16(mgmt->u.auth.status_code); 864 event.auth.auth_transaction = 865 le_to_host16(mgmt->u.auth.auth_transaction); 866 event.auth [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_atheros.c | 856 if (len - IEEE80211_HDRLEN < sizeof(mgmt->u.auth)) 859 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 860 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN); 861 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 862 event.auth.status_code = 863 le_to_host16(mgmt->u.auth.status_code); 864 event.auth.auth_transaction = 865 le_to_host16(mgmt->u.auth.auth_transaction); 866 event.auth [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_atheros.c | 856 if (len - IEEE80211_HDRLEN < sizeof(mgmt->u.auth)) 859 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 860 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN); 861 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 862 event.auth.status_code = 863 le_to_host16(mgmt->u.auth.status_code); 864 event.auth.auth_transaction = 865 le_to_host16(mgmt->u.auth.auth_transaction); 866 event.auth [all...] |
/external/smack/src/org/jivesoftware/smack/ |
H A D | XMPPConnection.java | 35 import org.apache.harmony.javax.security.auth.callback.Callback; 36 import org.apache.harmony.javax.security.auth.callback.CallbackHandler; 37 import org.apache.harmony.javax.security.auth.callback.PasswordCallback; 885 // System.err.println("Connection wants client auth"); 888 // System.err.println("Connection needs client auth"); 891 // System.err.println("Connection does not require client auth");
|
/external/dnsmasq/src/ |
H A D | rfc1035.c | 1141 int nxdomain = 0, auth = 1, trunc = 0; local 1280 auth = 0; 1290 auth = 0; 1418 auth = 0; 1434 auth = 0; 1588 header->aa = auth; /* authoritive - only hosts and DHCP derived names. */
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 700 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); 701 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); 702 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); 862 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8); 863 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 700 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); 701 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); 702 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); 862 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8); 863 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 700 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); 701 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); 702 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); 862 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8); 863 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);
|