/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_client.c | 236 int sock, int sock6, int auth); 959 int sock, int sock6, int auth) 975 auth ? "Authentication" : "Accounting", 990 if (auth) 1002 if ((auth && entry->msg_type != RADIUS_AUTH) || 1003 (!auth && entry->msg_type != RADIUS_ACCT)) 1106 if (auth) 956 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 700 os_memcpy(buf, stk->u.auth.tx_mic_key, 8); 701 os_memcpy(stk->u.auth.tx_mic_key, stk->u.auth.rx_mic_key, 8); 702 os_memcpy(stk->u.auth.rx_mic_key, buf, 8); 862 os_memcpy(key_buf + 16, peerkey->stk.u.auth.rx_mic_key, 8); 863 os_memcpy(key_buf + 24, peerkey->stk.u.auth.tx_mic_key, 8);
|
H A D | wpa.c | 442 os_memcpy(buf, ptk->u.auth.tx_mic_key, 8); 443 os_memcpy(ptk->u.auth.tx_mic_key, ptk->u.auth.rx_mic_key, 8); 444 os_memcpy(ptk->u.auth.rx_mic_key, buf, 8); 2313 * @bridge_ifname: Optional bridge interface name (for pre-auth)
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_registrar.c | 2319 static int wps_process_auth_type_flags(struct wps_data *wps, const u8 *auth) argument 2323 if (auth == NULL) { 2329 auth_types = WPA_GET_BE16(auth);
|
H A D | wps_validate.c | 924 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) argument 926 if (auth == NULL) {
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 36 struct wpa_state_machine *auth; member in struct:wpa 64 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol, 297 wpa->auth = wpa_auth_sta_init(wpa->auth_group, wpa->supp_addr, NULL); 298 if (wpa->auth == NULL) { 303 if (wpa_validate_wpa_ie(wpa->auth_group, wpa->auth, wpa->supp_ie, 309 wpa_auth_sm_event(wpa->auth, WPA_ASSOC); 311 wpa_auth_sta_associated(wpa->auth_group, wpa->auth); 319 wpa_auth_sta_deinit(wpa->auth);
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.cpp | 71 int auth, encr = 0; local 73 auth = AUTH_WPA2_EAP; 75 auth = AUTH_WPA_EAP; 77 auth = AUTH_WPA2_PSK; 79 auth = AUTH_WPA_PSK; 81 auth = AUTH_NONE_OPEN; 89 if (auth == AUTH_NONE_OPEN) 90 auth = AUTH_NONE_WEP; 94 authSelect->setCurrentIndex(auth); 95 authChanged(auth); 190 int auth = authSelect->currentIndex(); local 533 int auth = AUTH_NONE_OPEN, encr = 0; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wps_supplicant.c | 1254 settings->ssid_hex, settings->auth, 1725 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local 1738 auth++; 1748 else if (auth) 1941 if (settings->ssid_hex == NULL || settings->auth == NULL || 1958 if (os_strcmp(settings->auth, "OPEN") == 0) 1960 else if (os_strcmp(settings->auth, "WPAPSK") == 0) 1962 else if (os_strcmp(settings->auth, "WPA2PSK") == 0)
|
H A D | wps_supplicant.h | 23 const char *auth; member in struct:wps_new_ap_settings
|
/external/valgrind/main/include/vki/ |
H A D | vki-linux-drm.h | 111 int auth; /**< Is client authenticated? */ member in struct:vki_drm_client
|
/external/tcpdump/ |
H A D | print-radius.c | 150 u_int8_t auth[16]; /* Authenticator */ member in struct:radius_hdr 928 printf("%02x", rad->auth[auth_idx] );
|
H A D | print-zephyr.c | 46 int auth; member in struct:z_packet 173 PARSE_FIELD_INT(z.auth);
|
/external/sqlite/dist/orig/ |
H A D | sqlite3.c | 10499 void *pAuthArg; /* 1st argument to the access auth function */ 77447 int auth; /* Authorization to use the function */ local [all...] |
/external/sqlite/dist/ |
H A D | sqlite3.c | 10499 void *pAuthArg; /* 1st argument to the access auth function */ 77467 int auth; /* Authorization to use the function */ local [all...] |
/external/srtp/ |
H A D | Android.mk | 17 crypto/hash/auth.c \
|
H A D | Makefile | 80 crypto/hash/hmac.o crypto/hash/auth.o # crypto/hash/tmmhv2.o
|
/external/srtp/crypto/ |
H A D | Makefile | 74 hash/hmac.o hash/auth.o
|
/external/smack/asmack-master/lib/ |
H A D | httpclient-4.1.3.jar | ... http/conn/params/ org/apache/http/annotation/ org/apache/http/auth/ org/apache/http/auth/params/ org/apache/http/client/ org ... |
/external/smack/asmack-master/patch/ |
H A D | 10-remove-unused-harmony.sh | 5 rm -rf org/apache/harmony/auth 6 rm -rf org/apache/harmony/javax/security/auth/kerberos/ 7 rm -rf org/apache/harmony/javax/security/auth/x500/ 9 rm org/apache/harmony/javax/security/auth/Policy.java
|
/external/smack/asmack-master/static-src/custom/de/measite/smack/ |
H A D | Sasl.java | 23 import org.apache.harmony.javax.security.auth.callback.CallbackHandler; 80 throw new NullPointerException("auth.33"); //$NON-NLS-1$
|
H A D | SaslClientFactory.java | 23 import org.apache.harmony.javax.security.auth.callback.CallbackHandler;
|
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/ |
H A D | DigestMD5SaslClient.java | 18 import org.apache.harmony.javax.security.auth.callback.*; 113 //only support qop equal to auth 114 if ((desiredQOP != null) && !"auth".equals(desiredQOP)) 300 return "auth"; 372 throw new SaslException("Could not validate response-auth " + 484 * @param qop qop-value: "", "auth", "auth-int" 498 String qop, /* qop-value: "", "auth", "auth-int" */ 516 if ("auth [all...] |
/external/smack/src/com/novell/sasl/client/ |
H A D | DigestMD5SaslClient.java | 18 import org.apache.harmony.javax.security.auth.callback.*; 113 //only support qop equal to auth 114 if ((desiredQOP != null) && !"auth".equals(desiredQOP)) 300 return "auth"; 372 throw new SaslException("Could not validate response-auth " + 484 * @param qop qop-value: "", "auth", "auth-int" 498 String qop, /* qop-value: "", "auth", "auth-int" */ 516 if ("auth [all...] |
/external/smack/src/de/measite/smack/ |
H A D | Sasl.java | 23 import org.apache.harmony.javax.security.auth.callback.CallbackHandler; 80 throw new NullPointerException("auth.33"); //$NON-NLS-1$
|
H A D | SaslClientFactory.java | 23 import org.apache.harmony.javax.security.auth.callback.CallbackHandler;
|