/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.h | 241 int auth);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.h | 306 const u8 *auth; member in struct:ikev2_payloads
|
H A D | eap_eke_common.c | 719 const struct wpabuf *msgs, u8 *auth) 727 wpabuf_head(msgs), wpabuf_len(msgs), auth); 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 511 u8 *auth; local 595 auth = wpabuf_put(resp, data->sess.prf_len); 596 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) { 601 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 309 u8 *auth; local 349 auth = wpabuf_put(msg, data->sess.prf_len); 350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) { 355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.h | 241 int auth);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.h | 306 const u8 *auth; member in struct:ikev2_payloads
|
H A D | eap_eke_common.c | 719 const struct wpabuf *msgs, u8 *auth) 727 wpabuf_head(msgs), wpabuf_len(msgs), auth); 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 511 u8 *auth; local 595 auth = wpabuf_put(resp, data->sess.prf_len); 596 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) { 601 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 309 u8 *auth; local 349 auth = wpabuf_put(msg, data->sess.prf_len); 350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) { 355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.h | 241 int auth);
|
/external/chromium_org/chrome/browser/chromeos/login/easy_unlock/ |
H A D | easy_unlock_create_keys_operation.cc | 20 #include "chromeos/login/auth/key.h" 369 cryptohome::Authorization auth(auth_key->GetSecret(), auth_key->GetLabel()); 372 auth,
|
/external/smack/src/org/jivesoftware/smack/ |
H A D | SASLAuthentication.java.orig | 30 import org.apache.harmony.javax.security.auth.callback.CallbackHandler;
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 719 const struct wpabuf *msgs, u8 *auth) 727 wpabuf_head(msgs), wpabuf_len(msgs), auth); 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wps_supplicant.c | 1254 settings->ssid_hex, settings->auth, 1725 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local 1738 auth++; 1748 else if (auth) 1941 if (settings->ssid_hex == NULL || settings->auth == NULL || 1958 if (os_strcmp(settings->auth, "OPEN") == 0) 1960 else if (os_strcmp(settings->auth, "WPAPSK") == 0) 1962 else if (os_strcmp(settings->auth, "WPA2PSK") == 0)
|
H A D | p2p_supplicant.h | 28 int auth, int go_intent, int freq, int persistent_id,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | X509V3CertificateGenerator.java | 19 import javax.security.auth.x500.X500Principal;
|
/external/chromium_org/third_party/libsrtp/srtp/ |
H A D | Makefile | 82 crypto/hash/hmac.o crypto/hash/auth.o # crypto/hash/tmmhv2.o
|
/external/chromium_org/third_party/sqlite/src/tool/ |
H A D | mksqlite3c.tcl | 269 auth.c
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLX509CRL.java | 45 import javax.security.auth.x500.X500Principal;
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
H A D | SslUtil.java | 54 import javax.security.auth.x500.X500Principal;
|
/external/iproute2/ip/ |
H A D | xfrm_state.c | 372 struct xfrm_algo_auth auth; member in union:__anon22406::__anon22407 440 invarg("\"auth\" trunc length is invalid", 442 alg.u.auth.alg_trunc_len = trunclen; 444 buf = alg.u.auth.alg_key; 445 len = sizeof(alg.u.auth);
|
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/ |
H A D | DigestMD5SaslClient.java | 18 import org.apache.harmony.javax.security.auth.callback.*; 113 //only support qop equal to auth 114 if ((desiredQOP != null) && !"auth".equals(desiredQOP)) 300 return "auth"; 372 throw new SaslException("Could not validate response-auth " + 484 * @param qop qop-value: "", "auth", "auth-int" 498 String qop, /* qop-value: "", "auth", "auth-int" */ 516 if ("auth [all...] |
/external/smack/src/com/novell/sasl/client/ |
H A D | DigestMD5SaslClient.java | 18 import org.apache.harmony.javax.security.auth.callback.*; 113 //only support qop equal to auth 114 if ((desiredQOP != null) && !"auth".equals(desiredQOP)) 300 return "auth"; 372 throw new SaslException("Could not validate response-auth " + 484 * @param qop qop-value: "", "auth", "auth-int" 498 String qop, /* qop-value: "", "auth", "auth-int" */ 516 if ("auth [all...] |
/external/chromium_org/chrome/browser/policy/test/ |
H A D | policy_testserver.py | 14 key "managed_users". It contains auth tokens for which the server will claim 277 logging.debug('gaia auth token -> ' + 331 """Extracts the auth token from the request and returns it. The token may 340 match = re.match('GoogleLogin auth=(\\w+)', 359 # Check the auth token and device ID. 360 auth = self.CheckGoogleLogin() 361 if not auth: 366 auth not in policy['managed_users']): 397 # Return the auth code from the config file if it's defined, 773 # know the user name belonging to the GAIA auth toke [all...] |