/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 313 payloads->auth = pdata;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 313 payloads->auth = pdata;
|
/external/mdnsresponder/mDNSPosix/ |
H A D | NetMonitor.c | 614 const mDNSu8 *auth = LocateAuthorities(msg, end); local 633 p2 = (mDNSu8 *)FindUpdate(m, msg, auth, end, &q, &pkt);
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver.h | 1124 unsigned int auth; member in struct:wpa_driver_capa 3543 * union wpa_event_data::auth. 4218 } auth; member in union:wpa_event_data
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_validate.c | 926 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) argument 928 if (auth == NULL) {
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver.h | 1124 unsigned int auth; member in struct:wpa_driver_capa 3543 * union wpa_event_data::auth. 4218 } auth; member in union:wpa_event_data
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_validate.c | 926 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) argument 928 if (auth == NULL) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver.h | 1124 unsigned int auth; member in struct:wpa_driver_capa 3543 * union wpa_event_data::auth. 4218 } auth; member in union:wpa_event_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_validate.c | 926 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) argument 928 if (auth == NULL) {
|
/external/robolectric/lib/main/ |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ... |
/external/ipsec-tools/src/libipsec/ |
H A D | pfkey.c | 2197 pfkey_setsadbsa(buf, lim, spi, wsize, auth, enc, flags) 2201 u_int wsize, auth, enc; 2218 p->sadb_sa_auth = auth;
|
/external/wpa_supplicant_8/hostapd/ |
H A D | ctrl_iface.c | 536 char *ssid, *auth, *encr = NULL, *key = NULL; local 544 auth = pos; 556 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key); 663 /* <STA MAC Addr> <Code(0/1)> <Re-auth-Delay(sec)> [URL] */
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 2543 /***** auth alg */ 2558 if (((capa.auth & WPA_DRIVER_AUTH_OPEN) && 2561 ((capa.auth & WPA_DRIVER_AUTH_SHARED) && 2564 ((capa.auth & WPA_DRIVER_AUTH_LEAP) &&
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
H A D | PKCS12KeyStoreSpi.java | 1598 AuthenticatedSafe auth = new AuthenticatedSafe(info); 1611 asn1Out.writeObject(auth);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface.c | 1474 ap.auth = new_auth; 1621 ap.auth = new_auth; 2022 MAC2STR(wpa_s->bssid), "(auth)", 3661 if (capa->auth & (WPA_DRIVER_AUTH_OPEN)) { 3669 if (capa->auth & (WPA_DRIVER_AUTH_SHARED)) { 3677 if (capa->auth & (WPA_DRIVER_AUTH_LEAP)) { 4791 int auth; local 4808 * [join] [auth] [go_intent=<0..15>] [freq=<in MHz>] [provdisc] 4834 auth = os_strstr(pos, " auth") ! [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
H A D | X509CertificateObject.java | 31 import javax.security.auth.x500.X500Principal;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 38 import javax.security.auth.x500.X500Principal;
|
H A D | X509CertificateObject.java | 33 import javax.security.auth.x500.X500Principal;
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | NativeCrypto.java | 42 import javax.security.auth.x500.X500Principal; 1172 * @param authMethod auth algorithm name
|
/external/conscrypt/src/test/java/org/conscrypt/ |
H A D | TrustedCertificateStoreTest.java | 47 import javax.security.auth.x500.X500Principal;
|
/external/dnsmasq/src/ |
H A D | dnsmasq.h | 832 void lease_set_hostname(struct dhcp_lease *lease, char *name, int auth);
|
/external/robolectric/src/main/java/com/xtremelabs/robolectric/tester/org/apache/http/impl/client/ |
H A D | DefaultRequestDirector.java | 35 import org.apache.http.auth.*; 99 * <li>{@link org.apache.http.auth.params.AuthPNames#CREDENTIAL_CHARSET}</li> 811 // Reset proxy auth scope 960 // Unset auth scope 964 // Invalidate auth states if redirecting to another host 1025 // Reset target auth scope 1055 // Reset proxy auth scope
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | ieee802_11_defs.h | 476 } STRUCT_PACKED auth; member in union:ieee80211_mgmt::__anon17140
|
/external/wpa_supplicant_8/src/common/ |
H A D | ieee802_11_defs.h | 476 } STRUCT_PACKED auth; member in union:ieee80211_mgmt::__anon17385
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | ieee802_11_defs.h | 476 } STRUCT_PACKED auth; member in union:ieee80211_mgmt::__anon17628
|