Home
last modified time | relevance | path

Searched refs:authenticator (Results 1 – 25 of 55) sorted by relevance

123

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
Dradius.c414 os_memcpy(msg->hdr->authenticator, req_authenticator, in radius_msg_finish_srv()
415 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv()
428 md5_vector(4, addr, len, msg->hdr->authenticator); in radius_msg_finish_srv()
457 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp()
466 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) in radius_msg_finish_das_resp()
485 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); in radius_msg_finish_acct()
490 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct()
506 os_memcpy(msg->hdr->authenticator, req_authenticator, MD5_MAC_LEN); in radius_msg_finish_acct_resp()
511 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct_resp()
538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req()
[all …]
Dradius_server.c972 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator, in radius_server_encapsulate_eap()
1144 hdr->authenticator) < 0) { in radius_server_encapsulate_eap()
1228 hdr->authenticator) < 0) { in radius_server_macacl()
1273 hdr->authenticator) < in radius_server_reject()
1392 radius_msg_get_hdr(msg)->authenticator, 16) == 0) { in radius_server_request()
1523 os_memcpy(sess->last_authenticator, hdr->authenticator, 16); in radius_server_request()
1894 hdr->authenticator); in radius_server_receive_acct()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
Dradius.c414 os_memcpy(msg->hdr->authenticator, req_authenticator, in radius_msg_finish_srv()
415 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv()
428 md5_vector(4, addr, len, msg->hdr->authenticator); in radius_msg_finish_srv()
457 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp()
466 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) in radius_msg_finish_das_resp()
485 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); in radius_msg_finish_acct()
490 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct()
506 os_memcpy(msg->hdr->authenticator, req_authenticator, MD5_MAC_LEN); in radius_msg_finish_acct_resp()
511 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct_resp()
538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req()
[all …]
Dradius_server.c1139 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator, in radius_server_encapsulate_eap()
1311 hdr->authenticator) < 0) { in radius_server_encapsulate_eap()
1395 hdr->authenticator) < 0) { in radius_server_macacl()
1440 hdr->authenticator) < in radius_server_reject()
1559 radius_msg_get_hdr(msg)->authenticator, 16) == 0) { in radius_server_request()
1690 os_memcpy(sess->last_authenticator, hdr->authenticator, 16); in radius_server_request()
2061 hdr->authenticator); in radius_server_receive_acct()
/third_party/jsframework/runtime/main/extend/systemplugin/ohos/
DuserIAMuserAuth.js206 authenticator: null, property
212 if (this.authenticator == null) {
213 this.authenticator = new Authenticator()
215 return this.authenticator;
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/
Dwps_attr_process.c16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument
23 if (authenticator == NULL) { in wps_process_authenticator()
44 if (os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
Dwps_validate.c766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument
768 if (authenticator == NULL) { in wps_validate_authenticator()
1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2()
1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3()
1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4()
1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5()
1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6()
1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7()
1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
Dwps_attr_parse.h35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
Dwps_enrollee.c988 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m2()
1103 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m4()
1158 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m6()
1215 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m8()
Dwps_i.h186 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/
Dwps_attr_process.c16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument
23 if (authenticator == NULL) { in wps_process_authenticator()
45 os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
Dwps_validate.c766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument
768 if (authenticator == NULL) { in wps_validate_authenticator()
1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2()
1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3()
1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4()
1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5()
1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6()
1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7()
1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
Dwps_attr_parse.h35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
Dwps_enrollee.c999 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m2()
1114 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m4()
1169 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m6()
1226 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m8()
Dwps_i.h186 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
Dhostapd.sim_db1 # Example GSM authentication triplet file for EAP-SIM authenticator
Dhostapd.eap_user36 # Multiple methods can be configured to make the authenticator try them one by
42 # authenticator advertises the highest supported version and select the version
Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
Dhostapd.sim_db1 # Example GSM authentication triplet file for EAP-SIM authenticator
Dhostapd.eap_user36 # Multiple methods can be configured to make the authenticator try them one by
42 # authenticator advertises the highest supported version and select the version
Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
/third_party/e2fsprogs/lib/et/test_cases/
Dsimple.et13 "Can't decode authenticator"
Dheimdal.et31 ec RD_AP_UNDEC, "Kerberos error: Can't decode authenticator"
/third_party/lwip/src/netif/ppp/
Dchap_ms.c875 u_char authResponse[], int authenticator) { in ChapMS2() argument
877 LWIP_UNUSED_ARG(authenticator); in ChapMS2()
903 &response[MS_CHAP2_NTRESP], authenticator); in ChapMS2()
/third_party/node/deps/npm/docs/content/cli-commands/
Dnpm-team.md33 …bled in `auth-and-writes` mode, then you can provide a code from your authenticator with `[--otp <…

123