Searched refs:auth (Results 226 - 250 of 409) sorted by last modified time

1234567891011>>

/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.swt.gtk.linux.x86_3.6.1.v3657a.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.swt.win32.win32.x86_3.6.1.v3657a.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/dnsmasq/src/
H A Ddnsmasq.h832 void lease_set_hostname(struct dhcp_lease *lease, char *name, int auth);
H A Dlease.c160 lease_set_hostname(lease, name, 1); /* updates auth flag only */
436 void lease_set_hostname(struct dhcp_lease *lease, char *name, int auth) argument
443 lease->auth_name = auth;
483 if (lease_tmp->auth_name && !auth)
500 lease->auth_name = auth;
H A Drfc1035.c1141 int nxdomain = 0, auth = 1, trunc = 0; local
1280 auth = 0;
1290 auth = 0;
1418 auth = 0;
1434 auth = 0;
1588 header->aa = auth; /* authoritive - only hosts and DHCP derived names. */
/external/conscrypt/src/main/java/org/conscrypt/
H A DKeyManagerImpl.java37 import javax.security.auth.x500.X500Principal;
H A DNativeCrypto.java41 import javax.security.auth.x500.X500Principal;
1027 /** RSA auth */
1029 /** DSS auth */
1031 /** no auth (i.e. use ADH or AECDH) */
1033 /** Fixed DH auth (kDHd or kDHr) -- no such ciphersuites supported! */
1035 /** Fixed ECDH auth (kECDHe or kECDHr) */
1037 /** KRB5 auth */
1039 /** ECDSA auth*/
1041 /** PSK auth */
1043 /** GOST R 34.10-94 signature auth */
[all...]
H A DOpenSSLEngineImpl.java36 import javax.security.auth.x500.X500Principal;
H A DOpenSSLSocketImpl.java45 import javax.security.auth.x500.X500Principal;
H A DOpenSSLX509CRL.java45 import javax.security.auth.x500.X500Principal;
H A DOpenSSLX509Certificate.java50 import javax.security.auth.x500.X500Principal;
H A DSSLParametersImpl.java46 import javax.security.auth.x500.X500Principal;
571 // needing client auth takes priority...
582 // ... and we must disable verification if we don't want client auth.
977 + ", auth: 0x" + Long.toHexString(algorithm_auth & 0xffffffffL));
/external/conscrypt/src/platform/java/org/conscrypt/
H A DTrustedCertificateIndex.java28 import javax.security.auth.x500.X500Principal;
H A DTrustedCertificateStore.java36 import javax.security.auth.x500.X500Principal;
/external/conscrypt/src/test/java/org/conscrypt/
H A DNativeCryptoTest.java54 import javax.security.auth.x500.X500Principal;
H A DTrustedCertificateStoreTest.java41 import javax.security.auth.x500.X500Principal;
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
H A Dsctp_auth.c401 * shared key (if available). draft-ietf-tsvwg-auth specifies the specific
1565 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid)
1571 if ((stcb == NULL) || (auth == NULL))
1576 bzero(auth->hmac, SCTP_SIZE32(digestlen));
1606 auth->shared_key_id = htons(keyid);
1610 m, auth_offset, auth->hmac);
1653 sctp_handle_auth(struct sctp_tcb *stcb, struct sctp_auth_chunk *auth, argument
1664 /* auth is checked for NULL by caller */
1665 chunklen = ntohs(auth->ch.chunk_length);
1666 if (chunklen < sizeof(*auth)) {
1564 sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) argument
1782 struct sctp_authkey_event *auth; local
[all...]
H A Dsctp_auth.h198 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);
H A Dsctp_input.c175 /* auth parameter(s) error... send abort */
2265 struct sctp_auth_chunk *auth; local
2267 auth = (struct sctp_auth_chunk *)
2269 if ((auth == NULL) || sctp_handle_auth(stcb, auth, m, auth_offset)) {
2270 /* auth HMAC failed, dump the assoc and packet */
4630 /* now go back and verify any auth chunk to be sure */
4632 struct sctp_auth_chunk *auth; local
4634 auth = (struct sctp_auth_chunk *)
4639 if ((auth
[all...]
H A Dsctp_output.c4088 struct sctp_auth_chunk *auth,
4165 if ((auth != NULL) && (stcb != NULL)) {
4166 sctp_fill_hmac_digest_m(m, auth_offset, auth, stcb, auth_keyid);
6653 /* adjust for an AUTH chunk if DATA requires auth */
8235 struct sctp_auth_chunk *auth = NULL; local
8530 if ((auth == NULL) &&
8553 if ((auth == NULL) &&
8558 &auth,
8619 outchain, auth_offset, auth,
8671 auth
4082 sctp_lowlevel_chunk_output(struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets *net, struct sockaddr *to, struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, uint16_t auth_keyid, int nofragment_flag, int ecn_ok, int out_of_asoc_ok, uint16_t src_port, uint16_t dest_port, uint32_t v_tag, uint16_t port, union sctp_sockstore *over_addr, uint8_t use_mflowid, uint32_t mflowid, int so_locked SCTP_UNUSED ) argument
9871 struct sctp_auth_chunk *auth = NULL; local
11310 struct sctp_auth_chunk *auth = NULL; local
[all...]
/external/chromium_org/third_party/webrtc/base/
H A Dhttpcommon.cc215 // equal signs (like base64 tokens in Negotiate auth headers)
679 " qop=\"auth,auth-int\","
695 " qop=\"auth\","
724 NegotiateAuthContext(const std::string& auth, CredHandle c1, CtxtHandle c2) argument
725 : HttpAuthContext(auth), cred(c1), ctx(c2), steps(0),
821 qop = "auth";
H A Dhttpcommon.h426 HttpAuthContext(const std::string& auth) : auth_method(auth) { } argument
/external/chromium_org/third_party/libsrtp/
H A Dlibsrtp.target.darwin-arm.mk32 third_party/libsrtp/srtp/crypto/hash/auth.c \
H A Dlibsrtp.target.darwin-arm64.mk32 third_party/libsrtp/srtp/crypto/hash/auth.c \
H A Dlibsrtp.target.darwin-mips.mk32 third_party/libsrtp/srtp/crypto/hash/auth.c \

Completed in 298 milliseconds

1234567891011>>