Searched refs:auth (Results 101 - 125 of 409) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_client.c236 int sock, int sock6, int auth);
959 int sock, int sock6, int auth)
975 auth ? "Authentication" : "Accounting",
990 if (auth)
1002 if ((auth && entry->msg_type != RADIUS_AUTH) ||
1003 (!auth && entry->msg_type != RADIUS_ACCT))
1106 if (auth)
956 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c700 os_memcpy(buf, stk->u.auth.tx_mic_key, 8);
701 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8);
702 os_memcpy(stk->u.auth.rx_mic_key, buf, 8);
862 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8);
863 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);
H A Dwpa.c442 os_memcpy(buf, ptk->u.auth.tx_mic_key, 8);
443 os_memcpy(ptk->u.auth.tx_mic_key, ptk->u.auth.rx_mic_key, 8);
444 os_memcpy(ptk->u.auth.rx_mic_key, buf, 8);
2313 * @bridge_ifname: Optional bridge interface name (for pre-auth)
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_registrar.c2319 static int wps_process_auth_type_flags(struct wps_data *wps, const u8 *auth) argument
2323 if (auth == NULL) {
2329 auth_types = WPA_GET_BE16(auth);
H A Dwps_validate.c924 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) argument
926 if (auth == NULL) {
/external/wpa_supplicant_8/wpa_supplicant/tests/
H A Dtest_wpa.c36 struct wpa_state_machine *auth; member in struct:wpa
64 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol,
297 wpa->auth = wpa_auth_sta_init(wpa->auth_group, wpa->supp_addr, NULL);
298 if (wpa->auth == NULL) {
303 if (wpa_validate_wpa_ie(wpa->auth_group, wpa->auth, wpa->supp_ie,
309 wpa_auth_sm_event(wpa->auth, WPA_ASSOC);
311 wpa_auth_sta_associated(wpa->auth_group, wpa->auth);
319 wpa_auth_sta_deinit(wpa->auth);
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.cpp71 int auth, encr = 0; local
73 auth = AUTH_WPA2_EAP;
75 auth = AUTH_WPA_EAP;
77 auth = AUTH_WPA2_PSK;
79 auth = AUTH_WPA_PSK;
81 auth = AUTH_NONE_OPEN;
89 if (auth == AUTH_NONE_OPEN)
90 auth = AUTH_NONE_WEP;
94 authSelect->setCurrentIndex(auth);
95 authChanged(auth);
190 int auth = authSelect->currentIndex(); local
533 int auth = AUTH_NONE_OPEN, encr = 0; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwps_supplicant.c1254 settings->ssid_hex, settings->auth,
1725 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local
1738 auth++;
1748 else if (auth)
1941 if (settings->ssid_hex == NULL || settings->auth == NULL ||
1958 if (os_strcmp(settings->auth, "OPEN") == 0)
1960 else if (os_strcmp(settings->auth, "WPAPSK") == 0)
1962 else if (os_strcmp(settings->auth, "WPA2PSK") == 0)
H A Dwps_supplicant.h23 const char *auth; member in struct:wps_new_ap_settings
/external/valgrind/main/include/vki/
H A Dvki-linux-drm.h111 int auth; /**< Is client authenticated? */ member in struct:vki_drm_client
/external/tcpdump/
H A Dprint-radius.c150 u_int8_t auth[16]; /* Authenticator */ member in struct:radius_hdr
928 printf("%02x", rad->auth[auth_idx] );
H A Dprint-zephyr.c46 int auth; member in struct:z_packet
173 PARSE_FIELD_INT(z.auth);
/external/sqlite/dist/orig/
H A Dsqlite3.c10499 void *pAuthArg; /* 1st argument to the access auth function */
77447 int auth; /* Authorization to use the function */ local
[all...]
/external/sqlite/dist/
H A Dsqlite3.c10499 void *pAuthArg; /* 1st argument to the access auth function */
77467 int auth; /* Authorization to use the function */ local
[all...]
/external/srtp/
H A DAndroid.mk17 crypto/hash/auth.c \
H A DMakefile80 crypto/hash/hmac.o crypto/hash/auth.o # crypto/hash/tmmhv2.o
/external/srtp/crypto/
H A DMakefile74 hash/hmac.o hash/auth.o
/external/smack/asmack-master/lib/
H A Dhttpclient-4.1.3.jar ... http/conn/params/ org/apache/http/annotation/ org/apache/http/auth/ org/apache/http/auth/params/ org/apache/http/client/ org ...
/external/smack/asmack-master/patch/
H A D10-remove-unused-harmony.sh5 rm -rf org/apache/harmony/auth
6 rm -rf org/apache/harmony/javax/security/auth/kerberos/
7 rm -rf org/apache/harmony/javax/security/auth/x500/
9 rm org/apache/harmony/javax/security/auth/Policy.java
/external/smack/asmack-master/static-src/custom/de/measite/smack/
H A DSasl.java23 import org.apache.harmony.javax.security.auth.callback.CallbackHandler;
80 throw new NullPointerException("auth.33"); //$NON-NLS-1$
H A DSaslClientFactory.java23 import org.apache.harmony.javax.security.auth.callback.CallbackHandler;
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/
H A DDigestMD5SaslClient.java18 import org.apache.harmony.javax.security.auth.callback.*;
113 //only support qop equal to auth
114 if ((desiredQOP != null) && !"auth".equals(desiredQOP))
300 return "auth";
372 throw new SaslException("Could not validate response-auth " +
484 * @param qop qop-value: "", "auth", "auth-int"
498 String qop, /* qop-value: "", "auth", "auth-int" */
516 if ("auth
[all...]
/external/smack/src/com/novell/sasl/client/
H A DDigestMD5SaslClient.java18 import org.apache.harmony.javax.security.auth.callback.*;
113 //only support qop equal to auth
114 if ((desiredQOP != null) && !"auth".equals(desiredQOP))
300 return "auth";
372 throw new SaslException("Could not validate response-auth " +
484 * @param qop qop-value: "", "auth", "auth-int"
498 String qop, /* qop-value: "", "auth", "auth-int" */
516 if ("auth
[all...]
/external/smack/src/de/measite/smack/
H A DSasl.java23 import org.apache.harmony.javax.security.auth.callback.CallbackHandler;
80 throw new NullPointerException("auth.33"); //$NON-NLS-1$
H A DSaslClientFactory.java23 import org.apache.harmony.javax.security.auth.callback.CallbackHandler;

Completed in 729 milliseconds

1234567891011>>