/external/ppp/pppd/ |
H A D | auth.c | 2 * auth.c - PPP authentication and phase control. 71 #define RCSID "$Id: auth.c,v 1.117 2008/07/01 12:27:56 paulus Exp $" 206 * This is used to ensure that we don't start an auth-up/down 224 bool refuse_pap = 0; /* Don't wanna auth. ourselves with PAP */ 225 bool refuse_chap = 0; /* Don't wanna auth. ourselves with CHAP */ 226 bool refuse_eap = 0; /* Don't wanna auth. ourselves with EAP */ 228 bool refuse_mschap = 0; /* Don't wanna auth. ourselves with MS-CHAP */ 229 bool refuse_mschap_v2 = 0; /* Don't wanna auth. ourselves with MS-CHAPv2 */ 231 bool refuse_mschap = 1; /* Don't wanna auth. ourselves with MS-CHAP */ 232 bool refuse_mschap_v2 = 1; /* Don't wanna auth 729 int auth; local [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_atheros.c | 895 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) 898 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 899 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN); 900 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 901 event.auth.status_code = 902 le_to_host16(mgmt->u.auth.status_code); 903 event.auth.auth_transaction = 904 le_to_host16(mgmt->u.auth.auth_transaction); 905 event.auth [all...] |
H A D | driver_nl80211_event.c | 154 "nl80211: Ignore auth event when using driver SME"); 160 if (len < 24 + sizeof(mgmt->u.auth)) { 169 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 170 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 171 event.auth.auth_transaction = 172 le_to_host16(mgmt->u.auth.auth_transaction); 173 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); 174 if (len > 24 + sizeof(mgmt->u.auth)) { [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_atheros.c | 895 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) 898 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 899 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN); 900 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 901 event.auth.status_code = 902 le_to_host16(mgmt->u.auth.status_code); 903 event.auth.auth_transaction = 904 le_to_host16(mgmt->u.auth.auth_transaction); 905 event.auth [all...] |
H A D | driver_nl80211_event.c | 154 "nl80211: Ignore auth event when using driver SME"); 160 if (len < 24 + sizeof(mgmt->u.auth)) { 169 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 170 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 171 event.auth.auth_transaction = 172 le_to_host16(mgmt->u.auth.auth_transaction); 173 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); 174 if (len > 24 + sizeof(mgmt->u.auth)) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_atheros.c | 895 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) 898 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 899 os_memcpy(event.auth.bssid, mgmt->bssid, ETH_ALEN); 900 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 901 event.auth.status_code = 902 le_to_host16(mgmt->u.auth.status_code); 903 event.auth.auth_transaction = 904 le_to_host16(mgmt->u.auth.auth_transaction); 905 event.auth [all...] |
H A D | driver_nl80211_event.c | 154 "nl80211: Ignore auth event when using driver SME"); 160 if (len < 24 + sizeof(mgmt->u.auth)) { 169 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 170 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 171 event.auth.auth_transaction = 172 le_to_host16(mgmt->u.auth.auth_transaction); 173 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); 174 if (len > 24 + sizeof(mgmt->u.auth)) { [all...] |
/external/libdrm/ |
H A D | xf86drm.c | 895 drm_auth_t auth; local 898 if (drmIoctl(fd, DRM_IOCTL_GET_MAGIC, &auth)) 900 *magic = auth.magic; 906 drm_auth_t auth; local 908 auth.magic = magic; 909 if (drmIoctl(fd, DRM_IOCTL_AUTH_MAGIC, &auth)) 2161 int drmGetClient(int fd, int idx, int *auth, int *pid, int *uid, argument 2169 *auth = client.auth;
|
/external/chromium-trace/trace-viewer/third_party/Paste/paste/ |
H A D | httpheaders.py | 1014 auth = AbstractDigestAuthHandler() 1015 auth.add_password(realm, path, username, password) 1041 retval = "Digest %s" % auth.get_authorization(FakeRequest(), chal)
|
/external/jetty/src/java/org/eclipse/jetty/client/ |
H A D | HttpDestination.java | 547 Authentication auth = (Authentication)_authorizations.match(ex.getRequestURI()); 548 if (auth != null) 549 (auth).setCredentials(ex);
|
/external/dnsmasq/src/ |
H A D | rfc1035.c | 1141 int nxdomain = 0, auth = 1, trunc = 0; local 1280 auth = 0; 1290 auth = 0; 1418 auth = 0; 1434 auth = 0; 1588 header->aa = auth; /* authoritive - only hosts and DHCP derived names. */
|
/external/tcpdump/ |
H A D | print-radius.c | 150 u_int8_t auth[16]; /* Authenticator */ member in struct:radius_hdr 928 printf("%02x", rad->auth[auth_idx] );
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
H A D | PKIXCertPath.java | 23 import javax.security.auth.x500.X500Principal;
|
H A D | X509CRLEntryObject.java | 12 import javax.security.auth.x500.X500Principal;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | X509CRLEntryObject.java | 12 import javax.security.auth.x500.X500Principal;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | AttributeCertificateHolder.java | 15 import javax.security.auth.x500.X500Principal;
|
H A D | X509V1CertificateGenerator.java | 20 import javax.security.auth.x500.X500Principal;
|
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/ |
H A D | open_id.py | 20 ``Note``: paste.auth.openid requires installation of the Python-OpenID 34 from paste.auth import open_id 48 Your login code should then be configured to retrieve 'paste.auth.open_id' for 273 request['environ']['paste.auth.open_id'] = openid_url 410 from paste.auth import auth_tkt
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | KeyManagerImpl.java | 37 import javax.security.auth.x500.X500Principal;
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
H A D | MappedLoginService.java | 29 import javax.security.auth.Subject;
|
H A D | PropertyUserStore.java | 34 import javax.security.auth.Subject;
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
H A D | DistinguishedNameParser.java | 20 import javax.security.auth.x500.X500Principal;
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
H A D | HostnameVerifierTest.java | 26 import javax.security.auth.x500.X500Principal;
|
/external/srtp/ |
H A D | Makefile | 80 crypto/hash/hmac.o crypto/hash/auth.o # crypto/hash/tmmhv2.o
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.h | 306 const u8 *auth; member in struct:ikev2_payloads
|