Searched refs:username (Results 176 - 200 of 351) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_mschapv2.c290 const u8 *username, *user; local
343 username = sm->identity;
346 if (username[i] == '\\') {
348 username += i + 1;
368 username, username_len, challenge) == 0) {
370 username, username_len,
377 os_memcmp(username, user, username_len) != 0) {
380 "name", username, username_len);
388 username, username_len);
393 username, username_le
[all...]
H A Deap_sim_db.c32 char *permanent; /* permanent username */
33 char *pseudonym; /* pseudonym username */
847 * @username: Permanent username (prefix | IMSI)
868 const char *username, int max_chal,
878 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX ||
879 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) {
880 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username '
867 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
1334 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1429 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
[all...]
H A Deap_server_sim.c40 char permanent[20]; /* Permanent username */
421 char *username; local
453 username = sim_get_username(sm->identity, sm->identity_len);
454 if (username == NULL)
457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) {
458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'",
459 username);
461 sm->eap_sim_db_priv, username);
462 os_free(username);
478 if (username[
[all...]
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.0/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.0-rc1/MockFtpServer/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.0-rc1/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java362 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
367 * @param username - the username
371 protected boolean validateUserAccount(String username, Session session) { argument
372 UserAccount userAccount = serverConfiguration.getUserAccount(username);
374 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
375 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
381 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.0-rc3/MockFtpServer/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.0.1/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.0.2/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.1/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.2/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.3/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.4/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/mockftpserver/tags/2.5/src/main/java/org/mockftpserver/fake/command/
H A DAbstractFakeCommandHandler.java355 * Validate the UserAccount for the specified username. If valid, return true. If the UserAccount does
360 * @param username - the username
364 protected boolean validateUserAccount(String username, Session session) { argument
365 UserAccount userAccount = serverConfiguration.getUserAccount(username);
367 LOG.error("UserAccount missing or not valid for username [" + username + "]: " + userAccount);
368 sendReply(session, ReplyCodes.USER_ACCOUNT_NOT_VALID, "login.userAccountNotValid", list(username));
374 LOG.error("Home directory configured for username [" + username
[all...]
/external/jetty/src/java/org/eclipse/jetty/security/authentication/
H A DBasicAuthenticator.java87 String username = credentials.substring(0,i);
90 UserIdentity user = login (username, password, request);
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/
H A DWebPlatformUrlTestData.java39 String username = ""; field in class:WebPlatformUrlTestData
57 username = value;
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.c32 char *permanent; /* permanent username */
33 char *pseudonym; /* pseudonym username */
847 * @username: Permanent username (prefix | IMSI)
868 const char *username, int max_chal,
878 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX ||
879 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) {
880 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username '
867 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
1334 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1429 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
[all...]
H A Deap_server_sim.c40 char permanent[20]; /* Permanent username */
421 char *username; local
453 username = sim_get_username(sm->identity, sm->identity_len);
454 if (username == NULL)
457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) {
458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'",
459 username);
461 sm->eap_sim_db_priv, username);
462 os_free(username);
478 if (username[
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.c32 char *permanent; /* permanent username */
33 char *pseudonym; /* pseudonym username */
847 * @username: Permanent username (prefix | IMSI)
868 const char *username, int max_chal,
878 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX ||
879 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) {
880 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username '
867 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
1334 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1429 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
[all...]
H A Deap_server_sim.c40 char permanent[20]; /* Permanent username */
421 char *username; local
453 username = sim_get_username(sm->identity, sm->identity_len);
454 if (username == NULL)
457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) {
458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'",
459 username);
461 sm->eap_sim_db_priv, username);
462 os_free(username);
478 if (username[
[all...]
/external/jetty/src/java/org/eclipse/jetty/server/
H A DAuthentication.java84 * @param username
88 Authentication login(String username,Object password,ServletRequest request); argument
/external/lldb/test/pexpect-2.4/examples/
H A Dbd_serv.py8 --username : sets the user name to login with
140 optlist, args = getopt.getopt(sys.argv[1:], 'h?d', ['help','h','?', 'hostname=', 'username=', 'password=', 'port=', 'watch'])
153 username = os.getenv('USER')
166 if '--username' in options:
167 username = options['--username']
168 print "Login for %s@%s:%s" % (username, hostname, port)
183 child.login (hostname, username, password)
289 username:password@hostname:port. All fields are options expcet hostname. A
295 p = re.compile (r'(?P<username>[
[all...]
H A Dhive.py14 username: myusername
34 1. You will be asked for your username and password for each host.
38 2. You will be asked once for your username and password.
43 3. Give a username and password on the command-line:
47 You can use an extended host notation to specify username, password, and host
51 username:password@host
66 # TODO add feature to support username:password@host combination
156 # build up the list of connection information (hostname, username, password, port)
163 if len(hcd['username']) > 0:
164 username
[all...]
/external/ppp/pppd/
H A Dchap_ms.h103 u_char *rchallenge, char *username,

Completed in 734 milliseconds

1234567891011>>