/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.swt.gtk.linux.x86_3.6.1.v3657a.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.swt.win32.win32.x86_3.6.1.v3657a.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/dnsmasq/src/ |
H A D | dnsmasq.h | 832 void lease_set_hostname(struct dhcp_lease *lease, char *name, int auth);
|
H A D | lease.c | 160 lease_set_hostname(lease, name, 1); /* updates auth flag only */ 436 void lease_set_hostname(struct dhcp_lease *lease, char *name, int auth) argument 443 lease->auth_name = auth; 483 if (lease_tmp->auth_name && !auth) 500 lease->auth_name = auth;
|
H A D | rfc1035.c | 1141 int nxdomain = 0, auth = 1, trunc = 0; local 1280 auth = 0; 1290 auth = 0; 1418 auth = 0; 1434 auth = 0; 1588 header->aa = auth; /* authoritive - only hosts and DHCP derived names. */
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | KeyManagerImpl.java | 37 import javax.security.auth.x500.X500Principal;
|
H A D | NativeCrypto.java | 41 import javax.security.auth.x500.X500Principal; 1027 /** RSA auth */ 1029 /** DSS auth */ 1031 /** no auth (i.e. use ADH or AECDH) */ 1033 /** Fixed DH auth (kDHd or kDHr) -- no such ciphersuites supported! */ 1035 /** Fixed ECDH auth (kECDHe or kECDHr) */ 1037 /** KRB5 auth */ 1039 /** ECDSA auth*/ 1041 /** PSK auth */ 1043 /** GOST R 34.10-94 signature auth */ [all...] |
H A D | OpenSSLEngineImpl.java | 36 import javax.security.auth.x500.X500Principal;
|
H A D | OpenSSLSocketImpl.java | 45 import javax.security.auth.x500.X500Principal;
|
H A D | OpenSSLX509CRL.java | 45 import javax.security.auth.x500.X500Principal;
|
H A D | OpenSSLX509Certificate.java | 50 import javax.security.auth.x500.X500Principal;
|
H A D | SSLParametersImpl.java | 46 import javax.security.auth.x500.X500Principal; 571 // needing client auth takes priority... 582 // ... and we must disable verification if we don't want client auth. 977 + ", auth: 0x" + Long.toHexString(algorithm_auth & 0xffffffffL));
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
H A D | TrustedCertificateIndex.java | 28 import javax.security.auth.x500.X500Principal;
|
H A D | TrustedCertificateStore.java | 36 import javax.security.auth.x500.X500Principal;
|
/external/conscrypt/src/test/java/org/conscrypt/ |
H A D | NativeCryptoTest.java | 54 import javax.security.auth.x500.X500Principal;
|
H A D | TrustedCertificateStoreTest.java | 41 import javax.security.auth.x500.X500Principal;
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_auth.c | 401 * shared key (if available). draft-ietf-tsvwg-auth specifies the specific 1565 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) 1571 if ((stcb == NULL) || (auth == NULL)) 1576 bzero(auth->hmac, SCTP_SIZE32(digestlen)); 1606 auth->shared_key_id = htons(keyid); 1610 m, auth_offset, auth->hmac); 1653 sctp_handle_auth(struct sctp_tcb *stcb, struct sctp_auth_chunk *auth, argument 1664 /* auth is checked for NULL by caller */ 1665 chunklen = ntohs(auth->ch.chunk_length); 1666 if (chunklen < sizeof(*auth)) { 1564 sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) argument 1782 struct sctp_authkey_event *auth; local [all...] |
H A D | sctp_auth.h | 198 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);
|
H A D | sctp_input.c | 175 /* auth parameter(s) error... send abort */ 2265 struct sctp_auth_chunk *auth; local 2267 auth = (struct sctp_auth_chunk *) 2269 if ((auth == NULL) || sctp_handle_auth(stcb, auth, m, auth_offset)) { 2270 /* auth HMAC failed, dump the assoc and packet */ 4630 /* now go back and verify any auth chunk to be sure */ 4632 struct sctp_auth_chunk *auth; local 4634 auth = (struct sctp_auth_chunk *) 4639 if ((auth [all...] |
H A D | sctp_output.c | 4088 struct sctp_auth_chunk *auth, 4165 if ((auth != NULL) && (stcb != NULL)) { 4166 sctp_fill_hmac_digest_m(m, auth_offset, auth, stcb, auth_keyid); 6653 /* adjust for an AUTH chunk if DATA requires auth */ 8235 struct sctp_auth_chunk *auth = NULL; local 8530 if ((auth == NULL) && 8553 if ((auth == NULL) && 8558 &auth, 8619 outchain, auth_offset, auth, 8671 auth 4082 sctp_lowlevel_chunk_output(struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets *net, struct sockaddr *to, struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, uint16_t auth_keyid, int nofragment_flag, int ecn_ok, int out_of_asoc_ok, uint16_t src_port, uint16_t dest_port, uint32_t v_tag, uint16_t port, union sctp_sockstore *over_addr, uint8_t use_mflowid, uint32_t mflowid, int so_locked SCTP_UNUSED ) argument 9871 struct sctp_auth_chunk *auth = NULL; local 11310 struct sctp_auth_chunk *auth = NULL; local [all...] |
/external/chromium_org/third_party/webrtc/base/ |
H A D | httpcommon.cc | 215 // equal signs (like base64 tokens in Negotiate auth headers) 679 " qop=\"auth,auth-int\"," 695 " qop=\"auth\"," 724 NegotiateAuthContext(const std::string& auth, CredHandle c1, CtxtHandle c2) argument 725 : HttpAuthContext(auth), cred(c1), ctx(c2), steps(0), 821 qop = "auth";
|
H A D | httpcommon.h | 426 HttpAuthContext(const std::string& auth) : auth_method(auth) { } argument
|
/external/chromium_org/third_party/libsrtp/ |
H A D | libsrtp.target.darwin-arm.mk | 32 third_party/libsrtp/srtp/crypto/hash/auth.c \
|
H A D | libsrtp.target.darwin-arm64.mk | 32 third_party/libsrtp/srtp/crypto/hash/auth.c \
|
H A D | libsrtp.target.darwin-mips.mk | 32 third_party/libsrtp/srtp/crypto/hash/auth.c \
|