/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
D | Address.java | 42 final Authenticator authenticator; field in Address 53 CertificatePinner certificatePinner, Authenticator authenticator, Proxy proxy, in Address() argument 67 if (authenticator == null) throw new IllegalArgumentException("authenticator == null"); in Address() 68 this.authenticator = authenticator; in Address() 126 return authenticator; in getAuthenticator() 177 && this.authenticator.equals(that.authenticator) in equals() 193 result = 31 * result + authenticator.hashCode(); in hashCode()
|
D | OkHttpClient.java | 138 private Authenticator authenticator; field in OkHttpClient 169 this.authenticator = okHttpClient.authenticator; in OkHttpClient() 390 public OkHttpClient setAuthenticator(Authenticator authenticator) { in setAuthenticator() argument 391 this.authenticator = authenticator; in setAuthenticator() 396 return authenticator; in getAuthenticator() 599 if (result.authenticator == null) { in copyWithDefaults() 600 result.authenticator = AuthenticatorAdapter.INSTANCE; in copyWithDefaults()
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.c | 412 os_memcpy(msg->hdr->authenticator, req_authenticator, in radius_msg_finish_srv() 413 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv() 426 md5_vector(4, addr, len, msg->hdr->authenticator); in radius_msg_finish_srv() 455 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp() 464 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) in radius_msg_finish_das_resp() 483 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); in radius_msg_finish_acct() 488 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct() 504 os_memcpy(msg->hdr->authenticator, req_authenticator, MD5_MAC_LEN); in radius_msg_finish_acct_resp() 509 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct_resp() 536 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() [all …]
|
D | radius_server.c | 787 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator, in radius_server_encapsulate_eap() 846 hdr->authenticator) < 0) { in radius_server_encapsulate_eap() 927 hdr->authenticator) < 0) { in radius_server_macacl() 972 hdr->authenticator) < in radius_server_reject() 1046 radius_msg_get_hdr(msg)->authenticator, 16) == 0) { in radius_server_request() 1172 os_memcpy(sess->last_authenticator, hdr->authenticator, 16); in radius_server_request() 1413 hdr->authenticator); in radius_server_receive_acct()
|
D | radius.h | 22 u8 authenticator[16]; member
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
D | AddressTest.java | 31 private Authenticator authenticator = AuthenticatorAdapter.INSTANCE; field in AddressTest 38 authenticator, null, protocols, connectionSpecs, proxySelector); in equalsAndHashcode() 40 authenticator, null, protocols, connectionSpecs, proxySelector); in equalsAndHashcode() 47 authenticator, null, protocols, connectionSpecs, new RecordingProxySelector()); in differentProxySelectorsAreDifferent() 49 authenticator, null, protocols, connectionSpecs, new RecordingProxySelector()); in differentProxySelectorsAreDifferent()
|
D | OkHttpClientTest.java | 115 Authenticator authenticator = new RecordingAuthenticator(); in copyWithDefaultsWhenDefaultIsGlobal() local 122 Authenticator.setDefault(authenticator); in copyWithDefaultsWhenDefaultIsGlobal()
|
D | URLConnectionTest.java | 1520 RecordingAuthenticator authenticator = new RecordingAuthenticator(null); 1521 Authenticator.setDefault(authenticator); 1536 return authenticator.calls; 2888 RecordingOkAuthenticator authenticator = new RecordingOkAuthenticator(credential); 2889 client.client().setAuthenticator(authenticator); 2895 assertEquals(Proxy.NO_PROXY, authenticator.onlyProxy()); 2896 Response response = authenticator.onlyResponse(); 2908 RecordingOkAuthenticator authenticator = new RecordingOkAuthenticator("oauthed abc123"); 2909 client.client().setAuthenticator(authenticator); 2915 Response response = authenticator.onlyResponse(); [all …]
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument 23 if (authenticator == NULL) { in wps_process_authenticator() 44 if (os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
|
D | wps_validate.c | 766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument 768 if (authenticator == NULL) { in wps_validate_authenticator() 1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2() 1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3() 1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4() 1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5() 1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6() 1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7() 1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
|
D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
|
D | wps_enrollee.c | 984 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m2() 1099 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m4() 1154 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m6() 1211 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m8()
|
D | wps_i.h | 183 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator,
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
D | RouteSelectorTest.java | 70 private final Authenticator authenticator = AuthenticatorAdapter.INSTANCE; field in RouteSelectorTest 118 authenticator, proxyA, protocols, connectionSpecs, proxySelector); in explicitProxyTriesThatProxysAddressesOnly() 133 authenticator, NO_PROXY, protocols, connectionSpecs, proxySelector); in explicitDirectProxy() 342 return new Address(uriHost, uriPort, dns, socketFactory, null, null, null, authenticator, null, in httpAddress() 348 hostnameVerifier, null, authenticator, null, protocols, connectionSpecs, proxySelector); in httpsAddress()
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
D | OkHeaders.java | 284 public static Request processAuthHeader(Authenticator authenticator, Response response, in processAuthHeader() argument 287 ? authenticator.authenticateProxy(proxy, response) in processAuthHeader() 288 : authenticator.authenticate(proxy, response); in processAuthHeader()
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.sim_db | 1 # Example GSM authentication triplet file for EAP-SIM authenticator
|
D | hostapd.eap_user | 36 # Multiple methods can be configured to make the authenticator try them one by 42 # authenticator advertises the highest supported version and select the version
|
D | ChangeLog | 859 * added support for EAP-AKA in the integrated EAP authenticator 936 using integrated EAP authenticator for EAP-TLS; new hostapd.conf 949 authenticator 991 * added support for EAP-PEAP in the integrated EAP authenticator 992 * added support for EAP-GTC in the integrated EAP authenticator 994 the integrated EAP authenticator can, e.g., use the wildcard entry 996 * added support for EAP-TTLS in the integrated EAP authenticator 997 * added support for EAP-SIM in the integrated EAP authenticator 999 with the integrated EAP authenticator taking care of EAP 1008 * added support for EAP-MSCHAPv2 in the integrated EAP authenticator [all …]
|
D | hlr_auc_gw.txt | 1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
D | ShadowAccountManager.java | 407 public void addAuthenticator(AuthenticatorDescription authenticator) { 408 authenticators.put(authenticator.type, authenticator);
|
/external/e2fsprogs/lib/et/test_cases/ |
D | simple.et | 13 "Can't decode authenticator"
|
D | heimdal.et | 31 ec RD_AP_UNDEC, "Kerberos error: Can't decode authenticator"
|
/external/curl/tests/python_dependencies/impacket/ |
D | smb3.py | 577 authenticator = Authenticator() 578 authenticator['authenticator-vno'] = 5 579 authenticator['crealm'] = domain 580 seq_set(authenticator, 'cname', userName.components_to_asn1) 583 authenticator['cusec'] = now.microsecond 584 authenticator['ctime'] = KerberosTime.to_asn1(now) 586 encodedAuthenticator = encoder.encode(authenticator)
|
D | smb.py | 3099 authenticator = Authenticator() 3100 authenticator['authenticator-vno'] = 5 3101 authenticator['crealm'] = domain 3102 seq_set(authenticator, 'cname', userName.components_to_asn1) 3105 authenticator['cusec'] = now.microsecond 3106 authenticator['ctime'] = KerberosTime.to_asn1(now) 3108 encodedAuthenticator = encoder.encode(authenticator)
|
/external/ppp/pppd/ |
D | chap_ms.c | 924 u_char authResponse[], int authenticator) in ChapMS2() argument 952 &response[MS_CHAP2_NTRESP], authenticator); in ChapMS2()
|