/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 512 u8 *auth; local 597 auth = wpabuf_put(resp, data->sess.prf_len); 598 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) { 603 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 309 u8 *auth; local 349 auth = wpabuf_put(msg, data->sess.prf_len); 350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) { 355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.h | 248 int auth);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.h | 306 const u8 *auth; member in struct:ikev2_payloads
|
H A D | eap_eke_common.c | 719 const struct wpabuf *msgs, u8 *auth) 727 wpabuf_head(msgs), wpabuf_len(msgs), auth); 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 512 u8 *auth; local 597 auth = wpabuf_put(resp, data->sess.prf_len); 598 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) { 603 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 309 u8 *auth; local 349 auth = wpabuf_put(msg, data->sess.prf_len); 350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) { 355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.h | 248 int auth);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.h | 306 const u8 *auth; member in struct:ikev2_payloads
|
H A D | eap_eke_common.c | 719 const struct wpabuf *msgs, u8 *auth) 727 wpabuf_head(msgs), wpabuf_len(msgs), auth); 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 512 u8 *auth; local 597 auth = wpabuf_put(resp, data->sess.prf_len); 598 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) { 603 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 309 u8 *auth; local 349 auth = wpabuf_put(msg, data->sess.prf_len); 350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) { 355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.h | 248 int auth);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 719 const struct wpabuf *msgs, u8 *auth) 727 wpabuf_head(msgs), wpabuf_len(msgs), auth); 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wps_supplicant.c | 1306 settings->ssid_hex, settings->auth, 1777 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local 1790 auth++; 1800 else if (auth) 1995 if (settings->ssid_hex == NULL || settings->auth == NULL || 2012 if (os_strcmp(settings->auth, "OPEN") == 0) 2014 else if (os_strcmp(settings->auth, "WPAPSK") == 0) 2016 else if (os_strcmp(settings->auth, "WPA2PSK") == 0)
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | X509V3CertificateGenerator.java | 19 import javax.security.auth.x500.X500Principal;
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLX509CRL.java | 45 import javax.security.auth.x500.X500Principal;
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
H A D | SslUtil.java | 55 import javax.security.auth.x500.X500Principal;
|
/external/iproute2/ip/ |
H A D | xfrm_state.c | 372 struct xfrm_algo_auth auth; member in union:__anon6189::__anon6190 440 invarg("\"auth\" trunc length is invalid", 442 alg.u.auth.alg_trunc_len = trunclen; 444 buf = alg.u.auth.alg_key; 445 len = sizeof(alg.u.auth);
|
/external/libvncserver/libvncserver/ |
H A D | Makefile | 99 auth.c sockets.c websockets.c rfbssl_none.c \ 130 am__objects_6 = main.lo rfbserver.lo rfbregion.lo auth.lo sockets.lo \ 355 LIB_SRCS = main.c rfbserver.c rfbregion.c auth.c sockets.c $(WEBSOCKETSSRCS) \ 439 include ./$(DEPDIR)/auth.Plo
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_old_handlers.c | 659 /***** auth alg */ 674 ((capa.auth & WPA_DRIVER_AUTH_OPEN) && 677 ((capa.auth & WPA_DRIVER_AUTH_SHARED) && 680 ((capa.auth & WPA_DRIVER_AUTH_LEAP) &&
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_ndis.c | 1721 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1726 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1744 "enc 0x%x auth 0x%x", 1745 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); 1781 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " 1785 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d", 1790 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1793 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1832 "enc 0x%x auth 0x%x", 1833 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_ndis.c | 1721 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1726 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1744 "enc 0x%x auth 0x%x", 1745 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); 1781 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " 1785 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d", 1790 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1793 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1832 "enc 0x%x auth 0x%x", 1833 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_ndis.c | 1721 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1726 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1744 "enc 0x%x auth 0x%x", 1745 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); 1781 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " 1785 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d", 1790 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1793 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1832 "enc 0x%x auth 0x%x", 1833 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | TrustAnchorTest.java | 32 import javax.security.auth.x500.X500Principal;
|