/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wpa_priv.c | 245 struct privsep_cmd_authenticate *auth; in wpa_priv_cmd_authenticate() local 251 if (len < sizeof(*auth)) { in wpa_priv_cmd_authenticate() 256 auth = buf; in wpa_priv_cmd_authenticate() 257 if (sizeof(*auth) + auth->ie_len + auth->auth_data_len > len) { in wpa_priv_cmd_authenticate() 263 params.freq = auth->freq; in wpa_priv_cmd_authenticate() 264 params.bssid = auth->bssid; in wpa_priv_cmd_authenticate() 265 params.ssid = auth->ssid; in wpa_priv_cmd_authenticate() 266 if (auth in wpa_priv_cmd_authenticate() 896 struct privsep_event_auth *auth; wpa_priv_send_auth() local [all...] |
H A D | ibss_rsn.c | 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 389 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta() 486 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init() 487 if (peer->auth == NULL) { in ibss_rsn_auth_init() 493 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init() 504 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init() 507 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init() 516 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local 517 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth in ibss_rsn_send_auth() [all...] |
/foundation/communication/dsoftbus/tests/core/authentication/unittest/ |
H A D | auth_manager_test.cpp | 130 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); in HWTEST_F() local 131 EXPECT_TRUE(auth != nullptr); in HWTEST_F() 160 EXPECT_EQ(AddSessionKey(&auth->sessionKeyList, AUTH_SEQ, &sessionKey, AUTH_LINK_TYPE_WIFI, false), SOFTBUS_OK); in HWTEST_F() 161 EXPECT_EQ(SetSessionKeyAvailable(&auth->sessionKeyList, AUTH_SEQ), SOFTBUS_OK); in HWTEST_F() 195 AuthManager *auth = FindAuthManagerByConnId(CONN_ID, true); in HWTEST_F() local 196 EXPECT_TRUE(auth == nullptr); in HWTEST_F() 198 MyUpdateFuncReturnError, auth, AUTH_LINK_TYPE_WIFI) == SOFTBUS_AUTH_NOT_FOUND); in HWTEST_F() 199 EXPECT_TRUE(UpdateAuthManagerByAuthId(AUTH_SEQ, MyUpdateFuncReturnError, auth, in HWTEST_F() 201 EXPECT_TRUE(UpdateAuthManagerByAuthId(AUTH_SEQ, MyUpdateFuncReturnOk, auth, AUTH_LINK_TYPE_WIFI) == SOFTBUS_OK); in HWTEST_F() 232 AuthManager *auth in HWTEST_F() local 265 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_4, &info, &isNewCreated, AUTH_SEQ_4); HWTEST_F() local 293 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_5, &info, &isNewCreated, AUTH_SEQ_5); HWTEST_F() local 335 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_1, &info, &isNewCreated, AUTH_SEQ_1); HWTEST_F() local 597 AuthManager *auth = NewAuthManager(authHandle.authId, &info); HWTEST_F() local 740 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local 768 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local 930 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local 954 AuthManager *auth = NewAuthManager(authSeq, &info); HWTEST_F() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | aes-ccm.c | 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument 127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth() 132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument 137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth() 142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() 169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae() 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() 196 aes_ccm_decr_auth(aes, M, a, auth, in aes_ccm_ad() 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) aes_ccm_ae() argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | aes-ccm.c | 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument 127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth() 132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument 137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth() 142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() 169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae() 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() 196 aes_ccm_decr_auth(aes, M, a, auth, in aes_ccm_ad() 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) aes_ccm_ae() argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | ibss_rsn.c | 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 358 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta() 455 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init() 456 if (peer->auth == NULL) { in ibss_rsn_auth_init() 462 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init() 473 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init() 476 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init() 485 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local 486 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth in ibss_rsn_send_auth() [all...] |
H A D | sme.c | 917 u.auth.variable)); in sme_external_auth_build_buf() 924 resp->u.auth.auth_alg = host_to_le16(WLAN_AUTH_SAE); in sme_external_auth_build_buf() 926 resp->u.auth.auth_transaction = host_to_le16(auth_transaction); in sme_external_auth_build_buf() 927 resp->u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS); in sme_external_auth_build_buf() 1207 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth); in sme_external_auth_mgmt_rx() 1216 if (le_to_host16(header->u.auth.auth_alg) == WLAN_AUTH_SAE) { in sme_external_auth_mgmt_rx() 1220 wpa_s, le_to_host16(header->u.auth.auth_transaction), in sme_external_auth_mgmt_rx() 1221 le_to_host16(header->u.auth.status_code), in sme_external_auth_mgmt_rx() 1222 header->u.auth.variable, in sme_external_auth_mgmt_rx() 1259 if (os_memcmp(wpa_s->pending_bssid, data->auth in sme_event_auth() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp.h | 403 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth); 540 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, 542 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth, 544 struct wpabuf * dpp_build_conf_req_helper(struct dpp_authentication *auth, 548 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, 550 int dpp_notify_new_qr_code(struct dpp_authentication *auth, 560 int dpp_set_configurator(struct dpp_authentication *auth, const char *cmd); 561 void dpp_auth_deinit(struct dpp_authentication *auth); 563 dpp_build_conf_resp(struct dpp_authentication *auth, const u8 *e_nonce, 567 dpp_conf_req_rx(struct dpp_authentication *auth, cons [all...] |
H A D | dpp_backup.c | 151 static struct wpabuf * dpp_build_key_pkg(struct dpp_authentication *auth) in dpp_build_key_pkg() argument 155 priv_key = crypto_ec_key_get_ecprivate_key(auth->conf->csign, false); in dpp_build_key_pkg() 159 alg = dpp_build_key_alg(auth->conf->curve); in dpp_build_key_pkg() 162 attr = dpp_build_attribute(auth->conf); in dpp_build_key_pkg() 264 dpp_build_pw_recipient_info(struct dpp_authentication *auth, size_t hash_len, in dpp_build_pw_recipient_info() argument 279 key_len = auth->curve->hash_len; in dpp_build_pw_recipient_info() 281 res = dpp_hkdf_expand(key_len, auth->bk, key_len, in dpp_build_pw_recipient_info() 348 dpp_build_recipient_info(struct dpp_authentication *auth, size_t hash_len, in dpp_build_recipient_info() argument 364 pwri = dpp_build_pw_recipient_info(auth, hash_len, cont_enc_key); in dpp_build_recipient_info() 370 dpp_build_enc_cont_info(struct dpp_authentication *auth, size_ argument 450 dpp_build_enveloped_data(struct dpp_authentication *auth) dpp_build_enveloped_data() argument 1132 dpp_conf_resp_env_data(struct dpp_authentication *auth, const u8 *env_data, size_t env_data_len) dpp_conf_resp_env_data() argument [all...] |
/third_party/node/deps/npm/node_modules/hosted-git-info/lib/ |
H A D | index.js | 11 constructor (type, user, auth, project, committish, defaultRepresentation, opts = {}) { 15 auth, 27 'git+https:': { name: 'https', auth: true }, 28 'git:': { auth: true }, 29 'http:': { auth: true }, 30 'https:': { auth: true }, 31 'git+http:': { auth: true },
|
/third_party/ffmpeg/libavformat/ |
H A D | icecast.c | 92 char h_url[1024], host[1024], auth[1024], path[1024]; in icecast_open() local 129 av_url_split(NULL, 0, auth, sizeof(auth), host, sizeof(host), in icecast_open() 132 // Check for auth data in URI in icecast_open() 133 if (auth[0]) { in icecast_open() 134 char *sep = strchr(auth, ':'); in icecast_open() 147 if (!(user = av_strdup(auth))) { in icecast_open() 154 snprintf(auth, sizeof(auth), in icecast_open() 169 auth, hos in icecast_open() [all...] |
/third_party/node/lib/ |
H A D | url.js | 73 this.auth = null; 161 // - '@' since this could cause parts of the hostname to be confused with auth 348 // auth portion cannot go past, or the last @ char is the decider. 358 this.auth = decodeURIComponent(rest.slice(0, atSign)); 578 let auth = true; 595 if (options.auth != null) { 596 auth = Boolean(options.auth); 600 return bindingUrl.format(urlObject.href, fragment, unicode, search, auth); 624 let auth [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/ |
H A D | huks_master.h | 39 bool GenerateKey(const UserAuth &auth, KeyBlob &keyOut); 40 bool EncryptKey(KeyContext &ctx, const UserAuth &auth, const KeyInfo &key, bool isNeedNewNonce); 41 bool EncryptKeyEx(const UserAuth &auth, const KeyBlob &rnd, KeyContext &ctx); 42 bool DecryptKey(KeyContext &ctx, const UserAuth &auth, KeyInfo &key, bool isNeedNewNonce); 43 bool DecryptKeyEx(KeyContext &ctx, const UserAuth &auth, KeyBlob &rnd);
|
/third_party/node/test/parallel/ |
H A D | test-http-client-headers-array.js | 22 if (options.auth && !Array.isArray(options.headers)) { 24 `Basic ${Buffer.from(options.auth).toString('base64')}`; 55 execute({ auth: 'foo:bar', headers: 57 execute({ auth: 'foo:bar', headers: [
|
H A D | test-url-format.js | 88 auth: 'isaacschlueter', 93 auth: 'atpass:foo@bar', 100 auth: 'atslash/@:/@', 142 auth: 'u:p', 258 // surrogate in auth 262 auth: '\uD83D\uDE00',
|
/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/ |
H A D | base_key_mock.h | 30 virtual bool StoreKey(const UserAuth &auth) = 0; 31 virtual bool StoreKey(const UserAuth &auth, bool needGenerateShield) = 0; 34 virtual bool RestoreKey(const UserAuth &auth) = 0; 50 MOCK_METHOD2(StoreKey, bool(const UserAuth &auth, bool needGenerateShield)); 51 MOCK_METHOD1(StoreKey, bool(const UserAuth &auth)); 54 MOCK_METHOD1(RestoreKey, bool(const UserAuth &auth));
|
/third_party/node/deps/npm/lib/commands/ |
H A D | profile.js | 18 'two-factor auth', 43 'enable-2fa [auth-only|auth-and-writes]', 66 return ['auth-and-writes', 'auth-only'] 108 const tfa = 'two-factor auth' 236 throw new Error('npm profile enable-2fa [auth-and-writes|auth-only]') 239 const mode = args[0] || 'auth-and-writes' 240 if (mode !== 'auth [all...] |
H A D | token.js | 163 conf.auth = { token: creds.token } 165 conf.auth = { 171 } else if (creds.auth) { 172 const auth = Buffer.from(creds.auth, 'base64').toString().split(':', 2) 173 conf.auth = { 175 username: auth[0], 176 password: auth[1], 180 conf.auth = {} 184 conf.auth [all...] |
/third_party/node/benchmark/url/ |
H A D | legacy-url-get-prop.js | 16 auth: obj.auth, 31 noDead.auth = obj.auth;
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | dpp.h | 412 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, 414 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth, 416 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, 418 int dpp_notify_new_qr_code(struct dpp_authentication *auth, 429 struct dpp_authentication *auth, 431 void dpp_auth_deinit(struct dpp_authentication *auth); 433 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, 435 int dpp_conf_resp_rx(struct dpp_authentication *auth, 437 enum dpp_status_error dpp_conf_result_rx(struct dpp_authentication *auth, 440 struct wpabuf * dpp_build_conf_result(struct dpp_authentication *auth, [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_privsep.c | 384 struct privsep_event_auth *auth; in wpa_driver_privsep_event_auth() local 387 if (len < sizeof(*auth)) in wpa_driver_privsep_event_auth() 389 auth = (struct privsep_event_auth *) buf; in wpa_driver_privsep_event_auth() 390 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth() 393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth() 394 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); in wpa_driver_privsep_event_auth() 395 data.auth in wpa_driver_privsep_event_auth() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_privsep.c | 390 struct privsep_event_auth *auth; in wpa_driver_privsep_event_auth() local 393 if (len < sizeof(*auth)) in wpa_driver_privsep_event_auth() 395 auth = (struct privsep_event_auth *) buf; in wpa_driver_privsep_event_auth() 396 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth() 399 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth() 400 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); in wpa_driver_privsep_event_auth() 401 data.auth in wpa_driver_privsep_event_auth() [all...] |
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-policy2c/ |
H A D | minimal-secure-streams.c | 77 const lws_ss_auth_t *auth; in main() local 413 * The auth map in main() 416 auth = lws_ss_auth_get(context); in main() 417 if (auth) in main() 421 while (auth) { in main() 423 purify_csymbol(auth->name, buf, sizeof(buf))); in main() 429 printf("\t.name = \"%s\",\n", auth->name); in main() 430 printf("\t.type= \"%s\",\n", auth->type); in main() 431 printf("\t.streamtype = \"%s\",\n", auth->streamtype); in main() 432 printf("\t.blob_index = %d,\n", auth in main() [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | key_manager.cpp | 172 int KeyManager::GenerateAndInstallUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) in GenerateAndInstallUserKey() argument 184 return GenerateAndInstallEl5Key(userId, dir, auth); in GenerateAndInstallUserKey() 190 if (elKey->StoreKey(auth) == false) { in GenerateAndInstallUserKey() 214 int KeyManager::GenerateAndInstallEl5Key(uint32_t userId, const std::string &dir, const UserAuth &auth) in GenerateAndInstallEl5Key() argument 235 saveESecretStatus[userId] = (!auth.secret.IsEmpty() && !auth.token.IsEmpty()); in GenerateAndInstallEl5Key() 237 if ((!auth.secret.IsEmpty() && !auth.token.IsEmpty()) && in GenerateAndInstallEl5Key() 238 !elKey->EncryptClassE(auth, saveESecretStatus[userId], userId, USER_ADD_AUTH)) { in GenerateAndInstallEl5Key() 245 if (!elKey->DecryptClassE(auth, saveESecretStatu in GenerateAndInstallEl5Key() 253 RestoreUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) RestoreUserKey() argument 642 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; GenerateUserKeyByType() local 871 UserAuth auth = { .token = tokenSecret.token, .secret = tokenSecret.newSecret, .secureUid = tokenSecret.secureUid }; UpdateESecret() local 902 UserAuth auth = { {}, userTokenSecret.oldSecret, userTokenSecret.secureUid }; UpdateCeEceSeceUserAuth() local 1220 UserAuth auth = { .token = token, .secret = secret }; UpdateCeEceSeceUserAuth() local 1245 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local 1340 UserAuth auth = {.token = token, .secret = secret}; UpdateCeEceSeceUserAuth() local 1437 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local 1897 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local 1931 UserAuth auth = { .token=token, .secret=secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local [all...] |
/foundation/communication/ipc/ipc/native/src/core/source/ |
H A D | ipc_process_skeleton.cpp | 1299 const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject() 1301 if ((auth->GetStubObject() == stub) && (auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject() 1302 (auth->GetRemoteTokenId() == tokenId) && (auth->GetRemoteDeviceId().compare(deviceId) == 0)) { in IsSameRemoteObject() 1310 const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject() 1312 if ((auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject() 1313 (auth in IsSameRemoteObject() 1298 IsSameRemoteObject(IRemoteObject *stub, int pid, int uid, uint32_t tokenId, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument 1309 IsSameRemoteObject(int pid, int uid, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument [all...] |