Searched refs:auth (Results 201 - 225 of 283) sorted by relevance

1234567891011>>

/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/
H A DX509CRLSelectorTest.java38 import javax.security.auth.x500.X500Principal;
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
H A DTestCertUtils.java44 import javax.security.auth.x500.X500Principal;
/external/apache-http/src/org/apache/http/impl/client/
H A DAbstractHttpClient.java48 import org.apache.http.auth.AuthSchemeRegistry;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
H A DX509Util.java21 import javax.security.auth.x500.X500Principal;
/external/conscrypt/src/main/java/org/conscrypt/
H A DOpenSSLX509Certificate.java50 import javax.security.auth.x500.X500Principal;
H A DOpenSSLEngineImpl.java36 import javax.security.auth.x500.X500Principal;
H A DOpenSSLSocketImpl.java46 import javax.security.auth.x500.X500Principal;
H A DSSLParametersImpl.java47 import javax.security.auth.x500.X500Principal;
554 // needing client auth takes priority...
565 // ... and we must disable verification if we don't want client auth.
/external/conscrypt/src/platform/java/org/conscrypt/
H A DTrustedCertificateStore.java36 import javax.security.auth.x500.X500Principal;
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.ecf.provider.filetransfer.httpclient_4.0.0.v20100529-0735.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/kernel-headers/original/uapi/drm/
H A Ddrm.h227 int auth; /**< Is client authenticated? */ member in struct:drm_client
/external/libdrm/include/drm/
H A Ddrm.h228 int auth; /**< Is client authenticated? */ member in struct:drm_client
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwps_hostapd.c1621 const char *auth, const char *encr, const char *key)
1634 if (os_strncmp(auth, "OPEN", 4) == 0)
1636 else if (os_strncmp(auth, "WPAPSK", 6) == 0)
1638 else if (os_strncmp(auth, "WPA2PSK", 7) == 0)
1620 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
/external/wpa_supplicant_8/src/ap/
H A Dwps_hostapd.c1621 const char *auth, const char *encr, const char *key)
1634 if (os_strncmp(auth, "OPEN", 4) == 0)
1636 else if (os_strncmp(auth, "WPAPSK", 6) == 0)
1638 else if (os_strncmp(auth, "WPA2PSK", 7) == 0)
1620 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dp2p_supplicant.h29 int auth, int go_intent, int freq, int persistent_id,
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwps_hostapd.c1621 const char *auth, const char *encr, const char *key)
1634 if (os_strncmp(auth, "OPEN", 4) == 0)
1636 else if (os_strncmp(auth, "WPAPSK", 6) == 0)
1638 else if (os_strncmp(auth, "WPA2PSK", 7) == 0)
1620 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
/external/ipsec-tools/src/racoon/
H A Dipsec_doi.c314 plog(LLV_DEBUG, LOCATION, NULL, "agreed on %s auth.\n",
2160 "auth method %s isn't supported.\n",
2165 "invalid auth method %d.\n",
2342 "auth algorithm %u conflicts "
2375 "auth algorithm %u isn't supported.\n",
2380 "invalid auth algorithm=%u.\n",
3259 ipsecdoi_checkalgtypes(proto_id, enc, auth, comp)
3260 int proto_id, enc, auth, comp;
3268 "ESP enc=%s auth=%s comp=%s.\n",
3270 TMPALGTYPE2STR(auth),
[all...]
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/
H A DTrustAnchor_ImplTest.java32 import javax.security.auth.x500.X500Principal;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
H A DX509CRLObject.java25 import javax.security.auth.x500.X500Principal;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/
H A DPKCS10CertificationRequest.java21 import javax.security.auth.x500.X500Principal;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DX509CRLObject.java25 import javax.security.auth.x500.X500Principal;
/external/libdrm/
H A Dxf86drm.h568 extern int drmGetClient(int fd, int idx, int *auth, int *pid,
/external/openssh/contrib/redhat/
H A Dopenssh.spec119 Requires: /etc/pam.d/system-auth
515 - pull cvs patch to not cut off challengeresponse auth needlessly
578 limit users to pubkey and rsa auth (#34378)
651 - Extract patch from CVS to handle auth banners (in the client).
/external/valgrind/include/vki/
H A Dvki-linux-drm.h111 int auth; /**< Is client authenticated? */ member in struct:vki_drm_client
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dikev2_common.c313 payloads->auth = pdata;

Completed in 632 milliseconds

1234567891011>>