/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 536 u8 method, const u8 *auth, 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 591 if (auth == NULL) { 602 auth_method = auth[0]; 603 auth += 4; 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 611 return ikev2_process_auth_cert(data, auth_method, auth, 521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 604 u8 method, const u8 *auth, 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 657 if (auth == NULL) { 668 auth_method = auth[0]; 669 auth += 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 677 return ikev2_process_auth_cert(data, auth_method, auth, 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 536 u8 method, const u8 *auth, 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 591 if (auth == NULL) { 602 auth_method = auth[0]; 603 auth += 4; 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 611 return ikev2_process_auth_cert(data, auth_method, auth, 521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 604 u8 method, const u8 *auth, 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 657 if (auth == NULL) { 668 auth_method = auth[0]; 669 auth += 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 677 return ikev2_process_auth_cert(data, auth_method, auth, 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 536 u8 method, const u8 *auth, 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 591 if (auth == NULL) { 602 auth_method = auth[0]; 603 auth += 4; 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 611 return ikev2_process_auth_cert(data, auth_method, auth, 521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 604 u8 method, const u8 *auth, 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 657 if (auth == NULL) { 668 auth_method = auth[0]; 669 auth += 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 677 return ikev2_process_auth_cert(data, auth_method, auth, 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 366 u8 auth[MD5_MAC_LEN]; local 369 os_memset(auth, 0, MD5_MAC_LEN); 372 auth, MD5_MAC_LEN); 396 u8 auth[MD5_MAC_LEN]; local 401 os_memset(auth, 0, MD5_MAC_LEN); 403 auth, MD5_MAC_LEN); 440 u8 auth[MD5_MAC_LEN]; local 443 os_memset(auth, 0, MD5_MAC_LEN); 445 auth, MD5_MAC_LEN); 544 u8 auth[MD5_MAC_LE local 789 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local 835 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.c | 366 u8 auth[MD5_MAC_LEN]; local 369 os_memset(auth, 0, MD5_MAC_LEN); 372 auth, MD5_MAC_LEN); 396 u8 auth[MD5_MAC_LEN]; local 401 os_memset(auth, 0, MD5_MAC_LEN); 403 auth, MD5_MAC_LEN); 440 u8 auth[MD5_MAC_LEN]; local 443 os_memset(auth, 0, MD5_MAC_LEN); 445 auth, MD5_MAC_LEN); 544 u8 auth[MD5_MAC_LE local 789 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local 835 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.c | 366 u8 auth[MD5_MAC_LEN]; local 369 os_memset(auth, 0, MD5_MAC_LEN); 372 auth, MD5_MAC_LEN); 396 u8 auth[MD5_MAC_LEN]; local 401 os_memset(auth, 0, MD5_MAC_LEN); 403 auth, MD5_MAC_LEN); 440 u8 auth[MD5_MAC_LEN]; local 443 os_memset(auth, 0, MD5_MAC_LEN); 445 auth, MD5_MAC_LEN); 544 u8 auth[MD5_MAC_LE local 789 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local 835 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11.c | 258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 270 reply->u.auth.auth_alg = host_to_le16(auth_alg); 271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); 272 reply->u.auth.status_code = host_to_le16(resp); 275 os_memcpy(reply->u.auth.variable, ies, ies_len); 720 pos = mgmt->u.auth.variable; 768 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable, 770 mgmt->u.auth.variable, &token, 811 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable, 813 mgmt->u.auth [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11.c | 258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 270 reply->u.auth.auth_alg = host_to_le16(auth_alg); 271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); 272 reply->u.auth.status_code = host_to_le16(resp); 275 os_memcpy(reply->u.auth.variable, ies, ies_len); 720 pos = mgmt->u.auth.variable; 768 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable, 770 mgmt->u.auth.variable, &token, 811 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable, 813 mgmt->u.auth [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | mesh_rsn.c | 166 rsn->auth = wpa_init(addr, &conf, &cb); 167 if (rsn->auth == NULL) { 174 wpa_deinit(rsn->auth); 193 wpa_deinit(rsn->auth); 215 bss->wpa_auth = mesh_rsn->auth; 217 ie = wpa_auth_get_wpa_ie(mesh_rsn->auth, &ie_len); 329 /* don't expect wpa auth to cache the pmkid for now */
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11.c | 258 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 270 reply->u.auth.auth_alg = host_to_le16(auth_alg); 271 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); 272 reply->u.auth.status_code = host_to_le16(resp); 275 os_memcpy(reply->u.auth.variable, ies, ies_len); 720 pos = mgmt->u.auth.variable; 768 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable, 770 mgmt->u.auth.variable, &token, 811 if (sae_check_confirm(sta->sae, mgmt->u.auth.variable, 813 mgmt->u.auth [all...] |
/external/apache-http/src/org/apache/http/impl/client/ |
H A D | DefaultHttpClient.java | 36 import org.apache.http.auth.AuthSchemeRegistry; 62 import org.apache.http.impl.auth.BasicSchemeFactory; 63 import org.apache.http.impl.auth.DigestSchemeFactory;
|
/external/apache-http/src/org/apache/http/auth/ |
H A D | NTCredentials.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/NTCredentials.java $ 31 package org.apache.http.auth;
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
H A D | TrustedCertificateIndex.java | 28 import javax.security.auth.x500.X500Principal;
|
/external/libvncserver/x11vnc/misc/ |
H A D | rx11vnc.pl | 46 -rfbauth <remote-auth-file> this option is passed to the remote
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.h | 112 const struct wpabuf *msgs, u8 *auth);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.h | 112 const struct wpabuf *msgs, u8 *auth);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.h | 112 const struct wpabuf *msgs, u8 *auth);
|
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/ |
H A D | cookie.py | 24 >>> from paste.auth.cookie import AuthCookieHandler 141 cookie is handled server-side in the auth() function. 157 def auth(self, cookie): member in class:AuthCookieSigner 185 An instance of this object, found at ``environ['paste.auth.cookie']`` 215 ``environ['paste.auth.cookie'].append('your.environ.variable')`` 249 environ_name = 'paste.auth.cookie' 269 content = self.signer.auth(jar[self.cookie_name].value) 284 "processing chain before paste.auth.cookie, if an " 344 ``environ['paste.auth.cookie'].append('your.environ.variable')``
|
H A D | digest.py | 17 >>> # from paste.auth.digest import digest_password, AuthDigestHandler 43 """ split a digest auth string into individual key=value strings """ 63 """ split a digest auth string into key, value pairs """ 97 parts = {'realm': self.realm, 'qop': 'auth', 141 (authmeth, auth) = authorization.split(" ", 1) 144 amap = dict(_auth_to_kv_pairs(auth)) 157 assert 'auth' == qop
|
/external/tcpdump/ |
H A D | print-zephyr.c | 46 int auth; member in struct:z_packet 173 PARSE_FIELD_INT(z.auth);
|
/external/javasqlite/src/main/java/SQLite/ |
H A D | Database.java | 570 * @param auth the authorizer function 573 public void set_authorizer(Authorizer auth) { argument 575 _set_authorizer(auth); 579 private native void _set_authorizer(Authorizer auth); argument
|
/external/jetty/src/java/org/eclipse/jetty/client/ |
H A D | AbstractHttpConnection.java | 207 Authentication auth = _destination.getProxyAuthentication(); 208 if (auth != null) 209 auth.setCredentials(_exchange);
|