/external/chromium/chrome/common/net/gaia/ |
H A D | gaia_authenticator.h | 72 const GaiaAuthenticator* authenticator; member in struct:gaia::GaiaAuthEvent 161 GaiaAuthenticator* authenticator; member in struct:gaia::GaiaAuthenticator::AuthParams 192 // currently directly being used in sync/engine/authenticator.cc, which is
|
/external/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 129 ** authenticator[4] EncryptedData 141 KRB5_ENCDATA *authenticator; member in struct:krb5_ap_req_st 193 /* -- Unencrypted authenticator 195 ** authenticator-vno[0] INTEGER,
|
/external/openssl/include/openssl/ |
H A D | krb5_asn.h | 129 ** authenticator[4] EncryptedData 141 KRB5_ENCDATA *authenticator; member in struct:krb5_ap_req_st 193 /* -- Unencrypted authenticator 195 ** authenticator-vno[0] INTEGER,
|
/external/webkit/Tools/QtTestBrowser/ |
H A D | webpage.cpp | 133 void WebPage::authenticationRequired(QNetworkReply* reply, QAuthenticator* authenticator) argument 168 authenticator->setUser(userInput->text()); 169 authenticator->setPassword(passInput->text());
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, argument 23 if (authenticator == NULL) { 31 "validating authenticator"); 44 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) {
|
H A D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member in struct:wps_parse_attr
|
H A D | wps_validate.c | 764 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) argument 766 if (authenticator == NULL) { 1380 wps_validate_authenticator(attr.authenticator, 1)) { 1468 wps_validate_authenticator(attr.authenticator, 1)) { 1506 wps_validate_authenticator(attr.authenticator, 1)) { 1573 wps_validate_authenticator(attr.authenticator, 1)) { 1640 wps_validate_authenticator(attr.authenticator, 1)) { 1708 wps_validate_authenticator(attr.authenticator, 1)) { 1782 wps_validate_authenticator(attr.authenticator, 1)) {
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, argument 23 if (authenticator == NULL) { 31 "validating authenticator"); 44 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) {
|
H A D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member in struct:wps_parse_attr
|
H A D | wps_validate.c | 764 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) argument 766 if (authenticator == NULL) { 1380 wps_validate_authenticator(attr.authenticator, 1)) { 1468 wps_validate_authenticator(attr.authenticator, 1)) { 1506 wps_validate_authenticator(attr.authenticator, 1)) { 1573 wps_validate_authenticator(attr.authenticator, 1)) { 1640 wps_validate_authenticator(attr.authenticator, 1)) { 1708 wps_validate_authenticator(attr.authenticator, 1)) { 1782 wps_validate_authenticator(attr.authenticator, 1)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, argument 23 if (authenticator == NULL) { 31 "validating authenticator"); 44 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) {
|
H A D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member in struct:wps_parse_attr
|
H A D | wps_validate.c | 764 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) argument 766 if (authenticator == NULL) { 1380 wps_validate_authenticator(attr.authenticator, 1)) { 1468 wps_validate_authenticator(attr.authenticator, 1)) { 1506 wps_validate_authenticator(attr.authenticator, 1)) { 1573 wps_validate_authenticator(attr.authenticator, 1)) { 1640 wps_validate_authenticator(attr.authenticator, 1)) { 1708 wps_validate_authenticator(attr.authenticator, 1)) { 1782 wps_validate_authenticator(attr.authenticator, 1)) {
|
/external/openssl/ssl/ |
H A D | d1_clnt.c | 1051 krb5_data authenticator, *authp = NULL; local 1069 if (KRB5SENDAUTH) authp = &authenticator; 1110 ** optional authenticator omitted. 1133 s2n(0,p);/* null authenticator length */
|
H A D | s3_clnt.c | 2391 krb5_data authenticator, *authp = NULL; local 2409 if (KRB5SENDAUTH) authp = &authenticator; 2450 ** optional authenticator omitted. 2473 s2n(0,p);/* null authenticator length */
|
H A D | s3_srvr.c | 2363 krb5_data authenticator; local 2393 authenticator.length = i; 2395 if (n < (long)(enc_ticket.length + authenticator.length + 6)) 2402 authenticator.data = (char *)p; 2403 p+=authenticator.length; 2420 if (n != (long)(enc_ticket.length + authenticator.length + 2442 /* Note: no authenticator is not considered an error, 2445 if ((krb5rc = kssl_check_authent(kssl_ctx, &authenticator,
|
/external/ppp/pppd/ |
H A D | chap_ms.c | 858 u_char authResponse[], int authenticator) 884 SetMasterKeys(secret, secret_len, response->NTResp, authenticator); 856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.h | 22 u8 authenticator[16]; member in struct:radius_hdr
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.h | 22 u8 authenticator[16]; member in struct:radius_hdr
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.h | 22 u8 authenticator[16]; member in struct:radius_hdr
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | screen_locker.cc | 28 #include "chrome/browser/chromeos/login/authenticator.h" 1085 void ScreenLocker::SetAuthenticator(Authenticator* authenticator) { argument 1086 authenticator_ = authenticator;
|
/external/kernel-headers/original/linux/ |
H A D | wanrouter.h | 29 * Added 'authenticator' to 'wan_ppp_conf_t' 174 char authenticator; /* AUTHENTICATOR or not */ member in struct:wan_ppp_conf
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.mortbay.jetty.server_6.1.23.v201004211559.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |