/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_mschapv2.c | 290 const u8 *username, *user; local 343 username = sm->identity; 346 if (username[i] == '\\') { 348 username += i + 1; 368 username, username_len, challenge) == 0) { 370 username, username_len, 377 os_memcmp(username, user, username_len) != 0) { 380 "name", username, username_len); 388 username, username_len); 393 username, username_le [all...] |
H A D | eap_sim_db.c | 32 char *permanent; /* permanent username */ 33 char *pseudonym; /* pseudonym username */ 847 * @username: Permanent username (prefix | IMSI) 868 const char *username, int max_chal, 878 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX || 879 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) { 880 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username ' 867 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1334 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1429 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument [all...] |
H A D | eap_server_sim.c | 40 char permanent[20]; /* Permanent username */ 421 char *username; local 453 username = sim_get_username(sm->identity, sm->identity_len); 454 if (username == NULL) 457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) { 458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'", 459 username); 461 sm->eap_sim_db_priv, username); 462 os_free(username); 478 if (username[ [all...] |
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.0/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.0-rc1/MockFtpServer/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.0-rc1/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 362 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
367 * @param username - the username
371 protected boolean validateUserAccount(String username, Session session) {
argument 372 UserAccount userAccount = serverConfiguration.getUserAccount(username);
374 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
375 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
381 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.0-rc3/MockFtpServer/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.0.1/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.0.2/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.1/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.2/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.3/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.4/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/mockftpserver/tags/2.5/src/main/java/org/mockftpserver/fake/command/ |
H A D | AbstractFakeCommandHandler.java | 355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) {
argument 365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username [all...] |
/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
H A D | BasicAuthenticator.java | 87 String username = credentials.substring(0,i); 90 UserIdentity user = login (username, password, request);
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
H A D | WebPlatformUrlTestData.java | 39 String username = ""; field in class:WebPlatformUrlTestData 57 username = value;
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.c | 32 char *permanent; /* permanent username */ 33 char *pseudonym; /* pseudonym username */ 847 * @username: Permanent username (prefix | IMSI) 868 const char *username, int max_chal, 878 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX || 879 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) { 880 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username ' 867 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1334 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1429 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument [all...] |
H A D | eap_server_sim.c | 40 char permanent[20]; /* Permanent username */ 421 char *username; local 453 username = sim_get_username(sm->identity, sm->identity_len); 454 if (username == NULL) 457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) { 458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'", 459 username); 461 sm->eap_sim_db_priv, username); 462 os_free(username); 478 if (username[ [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.c | 32 char *permanent; /* permanent username */ 33 char *pseudonym; /* pseudonym username */ 847 * @username: Permanent username (prefix | IMSI) 868 const char *username, int max_chal, 878 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX || 879 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) { 880 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username ' 867 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1334 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1429 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument [all...] |
H A D | eap_server_sim.c | 40 char permanent[20]; /* Permanent username */ 421 char *username; local 453 username = sim_get_username(sm->identity, sm->identity_len); 454 if (username == NULL) 457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) { 458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'", 459 username); 461 sm->eap_sim_db_priv, username); 462 os_free(username); 478 if (username[ [all...] |
/external/jetty/src/java/org/eclipse/jetty/server/ |
H A D | Authentication.java | 84 * @param username 88 Authentication login(String username,Object password,ServletRequest request); argument
|
/external/lldb/test/pexpect-2.4/examples/ |
H A D | bd_serv.py | 8 --username : sets the user name to login with 140 optlist, args = getopt.getopt(sys.argv[1:], 'h?d', ['help','h','?', 'hostname=', 'username=', 'password=', 'port=', 'watch']) 153 username = os.getenv('USER') 166 if '--username' in options: 167 username = options['--username'] 168 print "Login for %s@%s:%s" % (username, hostname, port) 183 child.login (hostname, username, password) 289 username:password@hostname:port. All fields are options expcet hostname. A 295 p = re.compile (r'(?P<username>[ [all...] |
H A D | hive.py | 14 username: myusername 34 1. You will be asked for your username and password for each host. 38 2. You will be asked once for your username and password. 43 3. Give a username and password on the command-line: 47 You can use an extended host notation to specify username, password, and host 51 username:password@host 66 # TODO add feature to support username:password@host combination 156 # build up the list of connection information (hostname, username, password, port) 163 if len(hcd['username']) > 0: 164 username [all...] |
/external/ppp/pppd/ |
H A D | chap_ms.h | 103 u_char *rchallenge, char *username,
|