Searched refs:auth (Results 251 - 275 of 409) sorted by relevance

<<11121314151617

/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius.h241 int auth);
/external/wpa_supplicant_8/src/eap_common/
H A Dikev2_common.h306 const u8 *auth; member in struct:ikev2_payloads
H A Deap_eke_common.c719 const struct wpabuf *msgs, u8 *auth)
727 wpabuf_head(msgs), wpabuf_len(msgs), auth);
718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_eke.c511 u8 *auth; local
595 auth = wpabuf_put(resp, data->sess.prf_len);
596 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) {
601 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_eke.c309 u8 *auth; local
349 auth = wpabuf_put(msg, data->sess.prf_len);
350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) {
355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
/external/wpa_supplicant_8/src/radius/
H A Dradius.h241 int auth);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dikev2_common.h306 const u8 *auth; member in struct:ikev2_payloads
H A Deap_eke_common.c719 const struct wpabuf *msgs, u8 *auth)
727 wpabuf_head(msgs), wpabuf_len(msgs), auth);
718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_eke.c511 u8 *auth; local
595 auth = wpabuf_put(resp, data->sess.prf_len);
596 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) {
601 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_eke.c309 u8 *auth; local
349 auth = wpabuf_put(msg, data->sess.prf_len);
350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) {
355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius.h241 int auth);
/external/chromium_org/chrome/browser/chromeos/login/easy_unlock/
H A Deasy_unlock_create_keys_operation.cc20 #include "chromeos/login/auth/key.h"
369 cryptohome::Authorization auth(auth_key->GetSecret(), auth_key->GetLabel());
372 auth,
/external/smack/src/org/jivesoftware/smack/
H A DSASLAuthentication.java.orig30 import org.apache.harmony.javax.security.auth.callback.CallbackHandler;
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.c719 const struct wpabuf *msgs, u8 *auth)
727 wpabuf_head(msgs), wpabuf_len(msgs), auth);
718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwps_supplicant.c1254 settings->ssid_hex, settings->auth,
1725 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local
1738 auth++;
1748 else if (auth)
1941 if (settings->ssid_hex == NULL || settings->auth == NULL ||
1958 if (os_strcmp(settings->auth, "OPEN") == 0)
1960 else if (os_strcmp(settings->auth, "WPAPSK") == 0)
1962 else if (os_strcmp(settings->auth, "WPA2PSK") == 0)
H A Dp2p_supplicant.h28 int auth, int go_intent, int freq, int persistent_id,
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
H A DX509V3CertificateGenerator.java19 import javax.security.auth.x500.X500Principal;
/external/chromium_org/third_party/libsrtp/srtp/
H A DMakefile82 crypto/hash/hmac.o crypto/hash/auth.o # crypto/hash/tmmhv2.o
/external/chromium_org/third_party/sqlite/src/tool/
H A Dmksqlite3c.tcl269 auth.c
/external/conscrypt/src/main/java/org/conscrypt/
H A DOpenSSLX509CRL.java45 import javax.security.auth.x500.X500Principal;
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/
H A DSslUtil.java54 import javax.security.auth.x500.X500Principal;
/external/iproute2/ip/
H A Dxfrm_state.c372 struct xfrm_algo_auth auth; member in union:__anon22406::__anon22407
440 invarg("\"auth\" trunc length is invalid",
442 alg.u.auth.alg_trunc_len = trunclen;
444 buf = alg.u.auth.alg_key;
445 len = sizeof(alg.u.auth);
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/
H A DDigestMD5SaslClient.java18 import org.apache.harmony.javax.security.auth.callback.*;
113 //only support qop equal to auth
114 if ((desiredQOP != null) && !"auth".equals(desiredQOP))
300 return "auth";
372 throw new SaslException("Could not validate response-auth " +
484 * @param qop qop-value: "", "auth", "auth-int"
498 String qop, /* qop-value: "", "auth", "auth-int" */
516 if ("auth
[all...]
/external/smack/src/com/novell/sasl/client/
H A DDigestMD5SaslClient.java18 import org.apache.harmony.javax.security.auth.callback.*;
113 //only support qop equal to auth
114 if ((desiredQOP != null) && !"auth".equals(desiredQOP))
300 return "auth";
372 throw new SaslException("Could not validate response-auth " +
484 * @param qop qop-value: "", "auth", "auth-int"
498 String qop, /* qop-value: "", "auth", "auth-int" */
516 if ("auth
[all...]
/external/chromium_org/chrome/browser/policy/test/
H A Dpolicy_testserver.py14 key "managed_users". It contains auth tokens for which the server will claim
277 logging.debug('gaia auth token -> ' +
331 """Extracts the auth token from the request and returns it. The token may
340 match = re.match('GoogleLogin auth=(\\w+)',
359 # Check the auth token and device ID.
360 auth = self.CheckGoogleLogin()
361 if not auth:
366 auth not in policy['managed_users']):
397 # Return the auth code from the config file if it's defined,
773 # know the user name belonging to the GAIA auth toke
[all...]

Completed in 4342 milliseconds

<<11121314151617