Searched refs:auth (Results 101 - 125 of 283) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.c522 u8 method, const u8 *auth, size_t auth_len)
536 u8 method, const u8 *auth,
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
591 if (auth == NULL) {
602 auth_method = auth[0];
603 auth += 4;
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
611 return ikev2_process_auth_cert(data, auth_method, auth,
521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.c590 u8 method, const u8 *auth, size_t auth_len)
604 u8 method, const u8 *auth,
636 os_memcmp_const(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
657 if (auth == NULL) {
668 auth_method = auth[0];
669 auth += 4;
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
677 return ikev2_process_auth_cert(data, auth_method, auth,
589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.c522 u8 method, const u8 *auth, size_t auth_len)
536 u8 method, const u8 *auth,
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
591 if (auth == NULL) {
602 auth_method = auth[0];
603 auth += 4;
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
611 return ikev2_process_auth_cert(data, auth_method, auth,
521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.c590 u8 method, const u8 *auth, size_t auth_len)
604 u8 method, const u8 *auth,
636 os_memcmp_const(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
657 if (auth == NULL) {
668 auth_method = auth[0];
669 auth += 4;
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
677 return ikev2_process_auth_cert(data, auth_method, auth,
589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.c522 u8 method, const u8 *auth, size_t auth_len)
536 u8 method, const u8 *auth,
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
591 if (auth == NULL) {
602 auth_method = auth[0];
603 auth += 4;
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
611 return ikev2_process_auth_cert(data, auth_method, auth,
521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.c590 u8 method, const u8 *auth, size_t auth_len)
604 u8 method, const u8 *auth,
636 os_memcmp_const(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
657 if (auth == NULL) {
668 auth_method = auth[0];
669 auth += 4;
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
677 return ikev2_process_auth_cert(data, auth_method, auth,
589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius.c366 u8 auth[MD5_MAC_LEN]; local
369 os_memset(auth, 0, MD5_MAC_LEN);
372 auth, MD5_MAC_LEN);
396 u8 auth[MD5_MAC_LEN]; local
401 os_memset(auth, 0, MD5_MAC_LEN);
403 auth, MD5_MAC_LEN);
440 u8 auth[MD5_MAC_LEN]; local
443 os_memset(auth, 0, MD5_MAC_LEN);
445 auth, MD5_MAC_LEN);
544 u8 auth[MD5_MAC_LE local
789 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local
835 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
[all...]
/external/wpa_supplicant_8/src/radius/
H A Dradius.c366 u8 auth[MD5_MAC_LEN]; local
369 os_memset(auth, 0, MD5_MAC_LEN);
372 auth, MD5_MAC_LEN);
396 u8 auth[MD5_MAC_LEN]; local
401 os_memset(auth, 0, MD5_MAC_LEN);
403 auth, MD5_MAC_LEN);
440 u8 auth[MD5_MAC_LEN]; local
443 os_memset(auth, 0, MD5_MAC_LEN);
445 auth, MD5_MAC_LEN);
544 u8 auth[MD5_MAC_LE local
789 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local
835 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius.c366 u8 auth[MD5_MAC_LEN]; local
369 os_memset(auth, 0, MD5_MAC_LEN);
372 auth, MD5_MAC_LEN);
396 u8 auth[MD5_MAC_LEN]; local
401 os_memset(auth, 0, MD5_MAC_LEN);
403 auth, MD5_MAC_LEN);
440 u8 auth[MD5_MAC_LEN]; local
443 os_memset(auth, 0, MD5_MAC_LEN);
445 auth, MD5_MAC_LEN);
544 u8 auth[MD5_MAC_LE local
789 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local
835 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11.c258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
270 reply->u.auth.auth_alg = host_to_le16(auth_alg);
271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
272 reply->u.auth.status_code = host_to_le16(resp);
275 os_memcpy(reply->u.auth.variable, ies, ies_len);
720 pos = mgmt->u.auth.variable;
768 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
770 mgmt->u.auth.variable, &token,
811 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable,
813 mgmt->u.auth
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dieee802_11.c258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
270 reply->u.auth.auth_alg = host_to_le16(auth_alg);
271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
272 reply->u.auth.status_code = host_to_le16(resp);
275 os_memcpy(reply->u.auth.variable, ies, ies_len);
720 pos = mgmt->u.auth.variable;
768 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
770 mgmt->u.auth.variable, &token,
811 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable,
813 mgmt->u.auth
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dmesh_rsn.c166 rsn->auth = wpa_init(addr, &conf, &cb);
167 if (rsn->auth == NULL) {
174 wpa_deinit(rsn->auth);
193 wpa_deinit(rsn->auth);
215 bss->wpa_auth = mesh_rsn->auth;
217 ie = wpa_auth_get_wpa_ie(mesh_rsn->auth, &ie_len);
329 /* don't expect wpa auth to cache the pmkid for now */
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11.c258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
270 reply->u.auth.auth_alg = host_to_le16(auth_alg);
271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
272 reply->u.auth.status_code = host_to_le16(resp);
275 os_memcpy(reply->u.auth.variable, ies, ies_len);
720 pos = mgmt->u.auth.variable;
768 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
770 mgmt->u.auth.variable, &token,
811 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable,
813 mgmt->u.auth
[all...]
/external/apache-http/src/org/apache/http/impl/client/
H A DDefaultHttpClient.java36 import org.apache.http.auth.AuthSchemeRegistry;
62 import org.apache.http.impl.auth.BasicSchemeFactory;
63 import org.apache.http.impl.auth.DigestSchemeFactory;
/external/apache-http/src/org/apache/http/auth/
H A DNTCredentials.java2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/NTCredentials.java $
31 package org.apache.http.auth;
/external/conscrypt/src/platform/java/org/conscrypt/
H A DTrustedCertificateIndex.java28 import javax.security.auth.x500.X500Principal;
/external/libvncserver/x11vnc/misc/
H A Drx11vnc.pl46 -rfbauth <remote-auth-file> this option is passed to the remote
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.h112 const struct wpabuf *msgs, u8 *auth);
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.h112 const struct wpabuf *msgs, u8 *auth);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.h112 const struct wpabuf *msgs, u8 *auth);
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/
H A Dcookie.py24 >>> from paste.auth.cookie import AuthCookieHandler
141 cookie is handled server-side in the auth() function.
157 def auth(self, cookie): member in class:AuthCookieSigner
185 An instance of this object, found at ``environ['paste.auth.cookie']``
215 ``environ['paste.auth.cookie'].append('your.environ.variable')``
249 environ_name = 'paste.auth.cookie'
269 content = self.signer.auth(jar[self.cookie_name].value)
284 "processing chain before paste.auth.cookie, if an "
344 ``environ['paste.auth.cookie'].append('your.environ.variable')``
H A Ddigest.py17 >>> # from paste.auth.digest import digest_password, AuthDigestHandler
43 """ split a digest auth string into individual key=value strings """
63 """ split a digest auth string into key, value pairs """
97 parts = {'realm': self.realm, 'qop': 'auth',
141 (authmeth, auth) = authorization.split(" ", 1)
144 amap = dict(_auth_to_kv_pairs(auth))
157 assert 'auth' == qop
/external/tcpdump/
H A Dprint-zephyr.c46 int auth; member in struct:z_packet
173 PARSE_FIELD_INT(z.auth);
/external/javasqlite/src/main/java/SQLite/
H A DDatabase.java570 * @param auth the authorizer function
573 public void set_authorizer(Authorizer auth) { argument
575 _set_authorizer(auth);
579 private native void _set_authorizer(Authorizer auth); argument
/external/jetty/src/java/org/eclipse/jetty/client/
H A DAbstractHttpConnection.java207 Authentication auth = _destination.getProxyAuthentication();
208 if (auth != null)
209 auth.setCredentials(_exchange);

Completed in 853 milliseconds

1234567891011>>