/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CRLSelectorTest.java | 38 import javax.security.auth.x500.X500Principal;
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | TestCertUtils.java | 44 import javax.security.auth.x500.X500Principal;
|
/external/apache-http/src/org/apache/http/impl/client/ |
H A D | AbstractHttpClient.java | 48 import org.apache.http.auth.AuthSchemeRegistry;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | X509Util.java | 21 import javax.security.auth.x500.X500Principal;
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLX509Certificate.java | 50 import javax.security.auth.x500.X500Principal;
|
H A D | OpenSSLEngineImpl.java | 36 import javax.security.auth.x500.X500Principal;
|
H A D | OpenSSLSocketImpl.java | 46 import javax.security.auth.x500.X500Principal;
|
H A D | SSLParametersImpl.java | 47 import javax.security.auth.x500.X500Principal; 554 // needing client auth takes priority... 565 // ... and we must disable verification if we don't want client auth.
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
H A D | TrustedCertificateStore.java | 36 import javax.security.auth.x500.X500Principal;
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ecf.provider.filetransfer.httpclient_4.0.0.v20100529-0735.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/kernel-headers/original/uapi/drm/ |
H A D | drm.h | 227 int auth; /**< Is client authenticated? */ member in struct:drm_client
|
/external/libdrm/include/drm/ |
H A D | drm.h | 228 int auth; /**< Is client authenticated? */ member in struct:drm_client
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wps_hostapd.c | 1621 const char *auth, const char *encr, const char *key) 1634 if (os_strncmp(auth, "OPEN", 4) == 0) 1636 else if (os_strncmp(auth, "WPAPSK", 6) == 0) 1638 else if (os_strncmp(auth, "WPA2PSK", 7) == 0) 1620 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wps_hostapd.c | 1621 const char *auth, const char *encr, const char *key) 1634 if (os_strncmp(auth, "OPEN", 4) == 0) 1636 else if (os_strncmp(auth, "WPAPSK", 6) == 0) 1638 else if (os_strncmp(auth, "WPA2PSK", 7) == 0) 1620 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | p2p_supplicant.h | 29 int auth, int go_intent, int freq, int persistent_id,
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wps_hostapd.c | 1621 const char *auth, const char *encr, const char *key) 1634 if (os_strncmp(auth, "OPEN", 4) == 0) 1636 else if (os_strncmp(auth, "WPAPSK", 6) == 0) 1638 else if (os_strncmp(auth, "WPA2PSK", 7) == 0) 1620 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
|
/external/ipsec-tools/src/racoon/ |
H A D | ipsec_doi.c | 314 plog(LLV_DEBUG, LOCATION, NULL, "agreed on %s auth.\n", 2160 "auth method %s isn't supported.\n", 2165 "invalid auth method %d.\n", 2342 "auth algorithm %u conflicts " 2375 "auth algorithm %u isn't supported.\n", 2380 "invalid auth algorithm=%u.\n", 3259 ipsecdoi_checkalgtypes(proto_id, enc, auth, comp) 3260 int proto_id, enc, auth, comp; 3268 "ESP enc=%s auth=%s comp=%s.\n", 3270 TMPALGTYPE2STR(auth), [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | TrustAnchor_ImplTest.java | 32 import javax.security.auth.x500.X500Principal;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
H A D | X509CRLObject.java | 25 import javax.security.auth.x500.X500Principal;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/ |
H A D | PKCS10CertificationRequest.java | 21 import javax.security.auth.x500.X500Principal;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | X509CRLObject.java | 25 import javax.security.auth.x500.X500Principal;
|
/external/libdrm/ |
H A D | xf86drm.h | 568 extern int drmGetClient(int fd, int idx, int *auth, int *pid,
|
/external/openssh/contrib/redhat/ |
H A D | openssh.spec | 119 Requires: /etc/pam.d/system-auth 515 - pull cvs patch to not cut off challengeresponse auth needlessly 578 limit users to pubkey and rsa auth (#34378) 651 - Extract patch from CVS to handle auth banners (in the client).
|
/external/valgrind/include/vki/ |
H A D | vki-linux-drm.h | 111 int auth; /**< Is client authenticated? */ member in struct:vki_drm_client
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 313 payloads->auth = pdata;
|