Home
last modified time | relevance | path

Searched refs:otp (Results 1 - 25 of 26) sorted by relevance

12

/third_party/node/deps/npm/test/lib/utils/
H A Dotplease.js5 const setupOtplease = async (t, { otp = {}, ...rest }, fn) => {
7 otp: async () => '1234',
23 return await otplease(npm, otp, fn)
31 t.test('returns function results on otp success', async (t) => {
32 const fn = ({ otp }) => {
33 if (otp) {
49 t.test('prompts for otp for EOTP', async (t) => {
61 otp: { some: 'prop' },
68 t.strictSame(result, { some: 'prop', otp: '1234' })
72 const fn = ({ otp })
[all...]
H A Dread-user-info.js45 t.test('otp', async (t) => {
51 const result = await readUserInfo.otp()
52 t.equal(result, '1234', 'received the otp')
/third_party/node/deps/npm/lib/utils/
H A Dread-user-info.js5 exports.otp = readOTP
11 Enter one below. You can also pass one on the command line by appending --otp=123456.
24 function readOTP (msg = otpPrompt, otp, isRetry) {
25 if (isRetry && otp && /^[\d ]+$|^[A-Fa-f0-9]{64,64}$/.test(otp)) {
26 return otp.replace(/\s+/g, '')
29 return readWithProgress({ prompt: msg, default: otp || '' })
H A Dotplease.js23 const otp = await webAuth(openerPromise, err.body.authUrl, err.body.doneUrl, opts)
24 return await fn({ ...opts, otp })
29 const otp = await readUserInfo.otp('This operation requires a one-time password.\nEnter OTP:')
30 return await fn({ ...opts, otp })
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_otp.c35 int otp; in eap_otp_process() local
47 otp = 1; in eap_otp_process()
50 otp = 0; in eap_otp_process()
74 if (otp) { in eap_otp_process()
H A Deap_gtc.c52 int otp; in eap_gtc_process() local
79 otp = 1; in eap_gtc_process()
82 otp = 0; in eap_gtc_process()
118 if (otp) { in eap_gtc_process()
H A Deap_config.h627 * otp - One-time-password
632 u8 *otp; member
635 * otp_len - Length of the otp field
H A Deap.c2835 return config->otp; in eap_get_config_otp()
2852 os_memset(config->otp, 0, config->otp_len); in eap_clear_config_otp()
2853 os_free(config->otp); in eap_clear_config_otp()
2854 config->otp = NULL; in eap_clear_config_otp()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_otp.c35 int otp; in eap_otp_process() local
47 otp = 1; in eap_otp_process()
50 otp = 0; in eap_otp_process()
74 if (otp) { in eap_otp_process()
H A Deap_gtc.c52 int otp; in eap_gtc_process() local
79 otp = 1; in eap_gtc_process()
82 otp = 0; in eap_gtc_process()
118 if (otp) { in eap_gtc_process()
H A Deap_config.h539 * otp - One-time-password
544 u8 *otp; member
547 * otp_len - Length of the otp field
H A Deap.c2934 return config->otp; in eap_get_config_otp()
2951 os_memset(config->otp, 0, config->otp_len); in eap_clear_config_otp()
2952 os_free(config->otp); in eap_clear_config_otp()
2953 config->otp = NULL; in eap_clear_config_otp()
/third_party/node/deps/npm/lib/commands/
H A Dprofile.js53 'otp',
321 if (!conf.otp) {
322 conf.otp = await readUserInfo.otp(
356 await readUserInfo.otp('And an OTP code from your authenticator: ')
387 if (!conf.otp) {
389 conf.otp = await readUserInfo.otp(msg)
H A Dtoken.js14 static params = ['read-only', 'cidr', 'registry', 'otp']
183 if (conf.otp) {
184 conf.auth.otp = conf.otp
/third_party/node/deps/npm/test/lib/commands/
H A Dprofile.js21 async otp () {},
596 t.test('from basic auth, asks for otp', async t => {
629 async otp (label) {
633 'should ask for otp confirmation'
666 t.test('from token and set otp, retries on pending and verifies with qrcode', async t => {
711 'should set tfa as otp code?'
730 async otp () {
744 config: { otp: '1234' },
757 t.test('from token and set otp, retrieves invalid otp', asyn
[all...]
/third_party/node/deps/openssl/openssl/crypto/poly1305/asm/
H A Dpoly1305-x86_64.pl3820 my ($out,$inp,$otp,$len)=$win64 ? ("%rcx","%rdx","%r8", "%r9") : # Win64 order
3828 sub $otp,$inp
3829 sub $otp,$out
3835 movdqu ($inp,$otp),%xmm0
3836 pxor ($otp),%xmm0
3837 movdqu %xmm0,($out,$otp)
3838 movdqa %xmm0,($otp)
3839 lea 16($otp),$otp
3851 mov ($inp,$otp),
[all...]
/third_party/openssl/crypto/poly1305/asm/
H A Dpoly1305-x86_64.pl3820 my ($out,$inp,$otp,$len)=$win64 ? ("%rcx","%rdx","%r8", "%r9") : # Win64 order
3828 sub $otp,$inp
3829 sub $otp,$out
3835 movdqu ($inp,$otp),%xmm0
3836 pxor ($otp),%xmm0
3837 movdqu %xmm0,($out,$otp)
3838 movdqa %xmm0,($otp)
3839 lea 16($otp),$otp
3851 mov ($inp,$otp),
[all...]
/third_party/node/deps/npm/node_modules/npm-profile/lib/
H A Dindex.js193 const { otp } = opts
201 otp,
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/
H A Dcipher_chacha20_poly1305_hw.c110 void *xor128_encrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
111 void *xor128_decrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
/third_party/openssl/providers/implementations/ciphers/
H A Dcipher_chacha20_poly1305_hw.c110 void *xor128_encrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
111 void *xor128_decrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
/third_party/node/deps/openssl/openssl/crypto/evp/
H A De_chacha20_poly1305.c207 void *xor128_encrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
208 void *xor128_decrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
/third_party/openssl/crypto/evp/
H A De_chacha20_poly1305.c207 void *xor128_encrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
208 void *xor128_decrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dwpa_supplicant.c6928 bin_clear_free(eap->otp, eap->otp_len);
6929 eap->otp = (u8 *) os_strdup(value);
H A Dconfig.c2559 os_free(eap->otp); in eap_peer_config_free()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dwpa_supplicant.c8360 bin_clear_free(eap->otp, eap->otp_len);
8361 eap->otp = (u8 *) os_strdup(value);

Completed in 43 milliseconds

12