/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius.c | 414 os_memcpy(msg->hdr->authenticator, req_authenticator, in radius_msg_finish_srv() 415 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv() 428 md5_vector(4, addr, len, msg->hdr->authenticator); in radius_msg_finish_srv() 457 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp() 466 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) in radius_msg_finish_das_resp() 485 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); in radius_msg_finish_acct() 490 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct() 506 os_memcpy(msg->hdr->authenticator, req_authenticator, MD5_MAC_LEN); in radius_msg_finish_acct_resp() 511 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct_resp() 538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() [all …]
|
D | radius_server.c | 972 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator, in radius_server_encapsulate_eap() 1144 hdr->authenticator) < 0) { in radius_server_encapsulate_eap() 1228 hdr->authenticator) < 0) { in radius_server_macacl() 1273 hdr->authenticator) < in radius_server_reject() 1392 radius_msg_get_hdr(msg)->authenticator, 16) == 0) { in radius_server_request() 1523 os_memcpy(sess->last_authenticator, hdr->authenticator, 16); in radius_server_request() 1894 hdr->authenticator); in radius_server_receive_acct()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius.c | 414 os_memcpy(msg->hdr->authenticator, req_authenticator, in radius_msg_finish_srv() 415 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv() 428 md5_vector(4, addr, len, msg->hdr->authenticator); in radius_msg_finish_srv() 457 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp() 466 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) in radius_msg_finish_das_resp() 485 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); in radius_msg_finish_acct() 490 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct() 506 os_memcpy(msg->hdr->authenticator, req_authenticator, MD5_MAC_LEN); in radius_msg_finish_acct_resp() 511 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct_resp() 538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() [all …]
|
D | radius_server.c | 1139 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator, in radius_server_encapsulate_eap() 1311 hdr->authenticator) < 0) { in radius_server_encapsulate_eap() 1395 hdr->authenticator) < 0) { in radius_server_macacl() 1440 hdr->authenticator) < in radius_server_reject() 1559 radius_msg_get_hdr(msg)->authenticator, 16) == 0) { in radius_server_request() 1690 os_memcpy(sess->last_authenticator, hdr->authenticator, 16); in radius_server_request() 2061 hdr->authenticator); in radius_server_receive_acct()
|
/third_party/jsframework/runtime/main/extend/systemplugin/ohos/ |
D | userIAMuserAuth.js | 206 authenticator: null, property 212 if (this.authenticator == null) { 213 this.authenticator = new Authenticator() 215 return this.authenticator;
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument 23 if (authenticator == NULL) { in wps_process_authenticator() 44 if (os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
|
D | wps_validate.c | 766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument 768 if (authenticator == NULL) { in wps_validate_authenticator() 1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2() 1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3() 1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4() 1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5() 1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6() 1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7() 1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
|
D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
|
D | wps_enrollee.c | 988 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m2() 1103 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m4() 1158 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m6() 1215 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m8()
|
D | wps_i.h | 186 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument 23 if (authenticator == NULL) { in wps_process_authenticator() 45 os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
|
D | wps_validate.c | 766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument 768 if (authenticator == NULL) { in wps_validate_authenticator() 1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2() 1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3() 1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4() 1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5() 1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6() 1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7() 1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
|
D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
|
D | wps_enrollee.c | 999 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m2() 1114 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m4() 1169 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m6() 1226 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m8()
|
D | wps_i.h | 186 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | hostapd.sim_db | 1 # Example GSM authentication triplet file for EAP-SIM authenticator
|
D | hostapd.eap_user | 36 # Multiple methods can be configured to make the authenticator try them one by 42 # authenticator advertises the highest supported version and select the version
|
D | hlr_auc_gw.txt | 1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | hostapd.sim_db | 1 # Example GSM authentication triplet file for EAP-SIM authenticator
|
D | hostapd.eap_user | 36 # Multiple methods can be configured to make the authenticator try them one by 42 # authenticator advertises the highest supported version and select the version
|
D | hlr_auc_gw.txt | 1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
|
/third_party/e2fsprogs/lib/et/test_cases/ |
D | simple.et | 13 "Can't decode authenticator"
|
D | heimdal.et | 31 ec RD_AP_UNDEC, "Kerberos error: Can't decode authenticator"
|
/third_party/lwip/src/netif/ppp/ |
D | chap_ms.c | 875 u_char authResponse[], int authenticator) { in ChapMS2() argument 877 LWIP_UNUSED_ARG(authenticator); in ChapMS2() 903 &response[MS_CHAP2_NTRESP], authenticator); in ChapMS2()
|
/third_party/node/deps/npm/docs/content/cli-commands/ |
D | npm-team.md | 33 …bled in `auth-and-writes` mode, then you can provide a code from your authenticator with `[--otp <…
|