/third_party/node/deps/npm/test/lib/utils/ |
H A D | otplease.js | 5 const setupOtplease = async (t, { otp = {}, ...rest }, fn) => { 7 otp: async () => '1234', 23 return await otplease(npm, otp, fn) 31 t.test('returns function results on otp success', async (t) => { 32 const fn = ({ otp }) => { 33 if (otp) { 49 t.test('prompts for otp for EOTP', async (t) => { 61 otp: { some: 'prop' }, 68 t.strictSame(result, { some: 'prop', otp: '1234' }) 72 const fn = ({ otp }) [all...] |
H A D | read-user-info.js | 45 t.test('otp', async (t) => { 51 const result = await readUserInfo.otp() 52 t.equal(result, '1234', 'received the otp')
|
/third_party/node/deps/npm/lib/utils/ |
H A D | read-user-info.js | 5 exports.otp = readOTP 11 Enter one below. You can also pass one on the command line by appending --otp=123456. 24 function readOTP (msg = otpPrompt, otp, isRetry) { 25 if (isRetry && otp && /^[\d ]+$|^[A-Fa-f0-9]{64,64}$/.test(otp)) { 26 return otp.replace(/\s+/g, '') 29 return readWithProgress({ prompt: msg, default: otp || '' })
|
H A D | otplease.js | 23 const otp = await webAuth(openerPromise, err.body.authUrl, err.body.doneUrl, opts) 24 return await fn({ ...opts, otp }) 29 const otp = await readUserInfo.otp('This operation requires a one-time password.\nEnter OTP:') 30 return await fn({ ...opts, otp })
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_otp.c | 35 int otp; in eap_otp_process() local 47 otp = 1; in eap_otp_process() 50 otp = 0; in eap_otp_process() 74 if (otp) { in eap_otp_process()
|
H A D | eap_gtc.c | 52 int otp; in eap_gtc_process() local 79 otp = 1; in eap_gtc_process() 82 otp = 0; in eap_gtc_process() 118 if (otp) { in eap_gtc_process()
|
H A D | eap_config.h | 627 * otp - One-time-password 632 u8 *otp; member 635 * otp_len - Length of the otp field
|
H A D | eap.c | 2835 return config->otp; in eap_get_config_otp() 2852 os_memset(config->otp, 0, config->otp_len); in eap_clear_config_otp() 2853 os_free(config->otp); in eap_clear_config_otp() 2854 config->otp = NULL; in eap_clear_config_otp()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_otp.c | 35 int otp; in eap_otp_process() local 47 otp = 1; in eap_otp_process() 50 otp = 0; in eap_otp_process() 74 if (otp) { in eap_otp_process()
|
H A D | eap_gtc.c | 52 int otp; in eap_gtc_process() local 79 otp = 1; in eap_gtc_process() 82 otp = 0; in eap_gtc_process() 118 if (otp) { in eap_gtc_process()
|
H A D | eap_config.h | 539 * otp - One-time-password 544 u8 *otp; member 547 * otp_len - Length of the otp field
|
H A D | eap.c | 2934 return config->otp; in eap_get_config_otp() 2951 os_memset(config->otp, 0, config->otp_len); in eap_clear_config_otp() 2952 os_free(config->otp); in eap_clear_config_otp() 2953 config->otp = NULL; in eap_clear_config_otp()
|
/third_party/node/deps/npm/lib/commands/ |
H A D | profile.js | 53 'otp', 321 if (!conf.otp) { 322 conf.otp = await readUserInfo.otp( 356 await readUserInfo.otp('And an OTP code from your authenticator: ') 387 if (!conf.otp) { 389 conf.otp = await readUserInfo.otp(msg)
|
H A D | token.js | 14 static params = ['read-only', 'cidr', 'registry', 'otp'] 183 if (conf.otp) { 184 conf.auth.otp = conf.otp
|
/third_party/node/deps/npm/test/lib/commands/ |
H A D | profile.js | 21 async otp () {}, 596 t.test('from basic auth, asks for otp', async t => { 629 async otp (label) { 633 'should ask for otp confirmation' 666 t.test('from token and set otp, retries on pending and verifies with qrcode', async t => { 711 'should set tfa as otp code?' 730 async otp () { 744 config: { otp: '1234' }, 757 t.test('from token and set otp, retrieves invalid otp', asyn [all...] |
/third_party/node/deps/openssl/openssl/crypto/poly1305/asm/ |
H A D | poly1305-x86_64.pl | 3820 my ($out,$inp,$otp,$len)=$win64 ? ("%rcx","%rdx","%r8", "%r9") : # Win64 order 3828 sub $otp,$inp 3829 sub $otp,$out 3835 movdqu ($inp,$otp),%xmm0 3836 pxor ($otp),%xmm0 3837 movdqu %xmm0,($out,$otp) 3838 movdqa %xmm0,($otp) 3839 lea 16($otp),$otp 3851 mov ($inp,$otp), [all...] |
/third_party/openssl/crypto/poly1305/asm/ |
H A D | poly1305-x86_64.pl | 3820 my ($out,$inp,$otp,$len)=$win64 ? ("%rcx","%rdx","%r8", "%r9") : # Win64 order 3828 sub $otp,$inp 3829 sub $otp,$out 3835 movdqu ($inp,$otp),%xmm0 3836 pxor ($otp),%xmm0 3837 movdqu %xmm0,($out,$otp) 3838 movdqa %xmm0,($otp) 3839 lea 16($otp),$otp 3851 mov ($inp,$otp), [all...] |
/third_party/node/deps/npm/node_modules/npm-profile/lib/ |
H A D | index.js | 193 const { otp } = opts 201 otp,
|
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/ |
H A D | cipher_chacha20_poly1305_hw.c | 110 void *xor128_encrypt_n_pad(void *out, const void *inp, void *otp, size_t len); 111 void *xor128_decrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
|
/third_party/openssl/providers/implementations/ciphers/ |
H A D | cipher_chacha20_poly1305_hw.c | 110 void *xor128_encrypt_n_pad(void *out, const void *inp, void *otp, size_t len); 111 void *xor128_decrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | e_chacha20_poly1305.c | 207 void *xor128_encrypt_n_pad(void *out, const void *inp, void *otp, size_t len); 208 void *xor128_decrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
|
/third_party/openssl/crypto/evp/ |
H A D | e_chacha20_poly1305.c | 207 void *xor128_encrypt_n_pad(void *out, const void *inp, void *otp, size_t len); 208 void *xor128_decrypt_n_pad(void *out, const void *inp, void *otp, size_t len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | wpa_supplicant.c | 6928 bin_clear_free(eap->otp, eap->otp_len); 6929 eap->otp = (u8 *) os_strdup(value);
|
H A D | config.c | 2559 os_free(eap->otp); in eap_peer_config_free()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wpa_supplicant.c | 8360 bin_clear_free(eap->otp, eap->otp_len); 8361 eap->otp = (u8 *) os_strdup(value);
|