Home
last modified time | relevance | path

Searched refs:auth (Results 26 - 50 of 321) sorted by relevance

12345678910>>...13

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dwpa_priv.c245 struct privsep_cmd_authenticate *auth; in wpa_priv_cmd_authenticate() local
251 if (len < sizeof(*auth)) { in wpa_priv_cmd_authenticate()
256 auth = buf; in wpa_priv_cmd_authenticate()
257 if (sizeof(*auth) + auth->ie_len + auth->auth_data_len > len) { in wpa_priv_cmd_authenticate()
263 params.freq = auth->freq; in wpa_priv_cmd_authenticate()
264 params.bssid = auth->bssid; in wpa_priv_cmd_authenticate()
265 params.ssid = auth->ssid; in wpa_priv_cmd_authenticate()
266 if (auth in wpa_priv_cmd_authenticate()
896 struct privsep_event_auth *auth; wpa_priv_send_auth() local
[all...]
H A Dibss_rsn.c42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free()
389 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta()
486 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init()
487 if (peer->auth == NULL) { in ibss_rsn_auth_init()
493 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init()
504 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init()
507 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init()
516 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local
517 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth in ibss_rsn_send_auth()
[all...]
/foundation/communication/dsoftbus/tests/core/authentication/unittest/
H A Dauth_manager_test.cpp130 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); in HWTEST_F() local
131 EXPECT_TRUE(auth != nullptr); in HWTEST_F()
160 EXPECT_EQ(AddSessionKey(&auth->sessionKeyList, AUTH_SEQ, &sessionKey, AUTH_LINK_TYPE_WIFI, false), SOFTBUS_OK); in HWTEST_F()
161 EXPECT_EQ(SetSessionKeyAvailable(&auth->sessionKeyList, AUTH_SEQ), SOFTBUS_OK); in HWTEST_F()
195 AuthManager *auth = FindAuthManagerByConnId(CONN_ID, true); in HWTEST_F() local
196 EXPECT_TRUE(auth == nullptr); in HWTEST_F()
198 MyUpdateFuncReturnError, auth, AUTH_LINK_TYPE_WIFI) == SOFTBUS_AUTH_NOT_FOUND); in HWTEST_F()
199 EXPECT_TRUE(UpdateAuthManagerByAuthId(AUTH_SEQ, MyUpdateFuncReturnError, auth, in HWTEST_F()
201 EXPECT_TRUE(UpdateAuthManagerByAuthId(AUTH_SEQ, MyUpdateFuncReturnOk, auth, AUTH_LINK_TYPE_WIFI) == SOFTBUS_OK); in HWTEST_F()
232 AuthManager *auth in HWTEST_F() local
265 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_4, &info, &isNewCreated, AUTH_SEQ_4); HWTEST_F() local
293 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_5, &info, &isNewCreated, AUTH_SEQ_5); HWTEST_F() local
335 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_1, &info, &isNewCreated, AUTH_SEQ_1); HWTEST_F() local
597 AuthManager *auth = NewAuthManager(authHandle.authId, &info); HWTEST_F() local
740 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local
768 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local
930 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local
954 AuthManager *auth = NewAuthManager(authSeq, &info); HWTEST_F() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Daes-ccm.c117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument
127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth()
128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth()
132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument
137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth()
142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth()
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae()
169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae()
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad()
196 aes_ccm_decr_auth(aes, M, a, auth, in aes_ccm_ad()
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) aes_ccm_ae() argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Daes-ccm.c117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument
127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth()
128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth()
132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument
137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth()
142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth()
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae()
169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae()
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad()
196 aes_ccm_decr_auth(aes, M, a, auth, in aes_ccm_ad()
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) aes_ccm_ae() argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dibss_rsn.c42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free()
358 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta()
455 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init()
456 if (peer->auth == NULL) { in ibss_rsn_auth_init()
462 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init()
473 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init()
476 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init()
485 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local
486 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth in ibss_rsn_send_auth()
[all...]
H A Dsme.c917 u.auth.variable)); in sme_external_auth_build_buf()
924 resp->u.auth.auth_alg = host_to_le16(WLAN_AUTH_SAE); in sme_external_auth_build_buf()
926 resp->u.auth.auth_transaction = host_to_le16(auth_transaction); in sme_external_auth_build_buf()
927 resp->u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS); in sme_external_auth_build_buf()
1207 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth); in sme_external_auth_mgmt_rx()
1216 if (le_to_host16(header->u.auth.auth_alg) == WLAN_AUTH_SAE) { in sme_external_auth_mgmt_rx()
1220 wpa_s, le_to_host16(header->u.auth.auth_transaction), in sme_external_auth_mgmt_rx()
1221 le_to_host16(header->u.auth.status_code), in sme_external_auth_mgmt_rx()
1222 header->u.auth.variable, in sme_external_auth_mgmt_rx()
1259 if (os_memcmp(wpa_s->pending_bssid, data->auth in sme_event_auth()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp.h403 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth);
540 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr,
542 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth,
544 struct wpabuf * dpp_build_conf_req_helper(struct dpp_authentication *auth,
548 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr,
550 int dpp_notify_new_qr_code(struct dpp_authentication *auth,
560 int dpp_set_configurator(struct dpp_authentication *auth, const char *cmd);
561 void dpp_auth_deinit(struct dpp_authentication *auth);
563 dpp_build_conf_resp(struct dpp_authentication *auth, const u8 *e_nonce,
567 dpp_conf_req_rx(struct dpp_authentication *auth, cons
[all...]
H A Ddpp_backup.c151 static struct wpabuf * dpp_build_key_pkg(struct dpp_authentication *auth) in dpp_build_key_pkg() argument
155 priv_key = crypto_ec_key_get_ecprivate_key(auth->conf->csign, false); in dpp_build_key_pkg()
159 alg = dpp_build_key_alg(auth->conf->curve); in dpp_build_key_pkg()
162 attr = dpp_build_attribute(auth->conf); in dpp_build_key_pkg()
264 dpp_build_pw_recipient_info(struct dpp_authentication *auth, size_t hash_len, in dpp_build_pw_recipient_info() argument
279 key_len = auth->curve->hash_len; in dpp_build_pw_recipient_info()
281 res = dpp_hkdf_expand(key_len, auth->bk, key_len, in dpp_build_pw_recipient_info()
348 dpp_build_recipient_info(struct dpp_authentication *auth, size_t hash_len, in dpp_build_recipient_info() argument
364 pwri = dpp_build_pw_recipient_info(auth, hash_len, cont_enc_key); in dpp_build_recipient_info()
370 dpp_build_enc_cont_info(struct dpp_authentication *auth, size_ argument
450 dpp_build_enveloped_data(struct dpp_authentication *auth) dpp_build_enveloped_data() argument
1132 dpp_conf_resp_env_data(struct dpp_authentication *auth, const u8 *env_data, size_t env_data_len) dpp_conf_resp_env_data() argument
[all...]
/third_party/node/deps/npm/node_modules/hosted-git-info/lib/
H A Dindex.js11 constructor (type, user, auth, project, committish, defaultRepresentation, opts = {}) {
15 auth,
27 'git+https:': { name: 'https', auth: true },
28 'git:': { auth: true },
29 'http:': { auth: true },
30 'https:': { auth: true },
31 'git+http:': { auth: true },
/third_party/ffmpeg/libavformat/
H A Dicecast.c92 char h_url[1024], host[1024], auth[1024], path[1024]; in icecast_open() local
129 av_url_split(NULL, 0, auth, sizeof(auth), host, sizeof(host), in icecast_open()
132 // Check for auth data in URI in icecast_open()
133 if (auth[0]) { in icecast_open()
134 char *sep = strchr(auth, ':'); in icecast_open()
147 if (!(user = av_strdup(auth))) { in icecast_open()
154 snprintf(auth, sizeof(auth), in icecast_open()
169 auth, hos in icecast_open()
[all...]
/third_party/node/lib/
H A Durl.js73 this.auth = null;
161 // - '@' since this could cause parts of the hostname to be confused with auth
348 // auth portion cannot go past, or the last @ char is the decider.
358 this.auth = decodeURIComponent(rest.slice(0, atSign));
578 let auth = true;
595 if (options.auth != null) {
596 auth = Boolean(options.auth);
600 return bindingUrl.format(urlObject.href, fragment, unicode, search, auth);
624 let auth
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/
H A Dhuks_master.h39 bool GenerateKey(const UserAuth &auth, KeyBlob &keyOut);
40 bool EncryptKey(KeyContext &ctx, const UserAuth &auth, const KeyInfo &key, bool isNeedNewNonce);
41 bool EncryptKeyEx(const UserAuth &auth, const KeyBlob &rnd, KeyContext &ctx);
42 bool DecryptKey(KeyContext &ctx, const UserAuth &auth, KeyInfo &key, bool isNeedNewNonce);
43 bool DecryptKeyEx(KeyContext &ctx, const UserAuth &auth, KeyBlob &rnd);
/third_party/node/test/parallel/
H A Dtest-http-client-headers-array.js22 if (options.auth && !Array.isArray(options.headers)) {
24 `Basic ${Buffer.from(options.auth).toString('base64')}`;
55 execute({ auth: 'foo:bar', headers:
57 execute({ auth: 'foo:bar', headers: [
H A Dtest-url-format.js88 auth: 'isaacschlueter',
93 auth: 'atpass:foo@bar',
100 auth: 'atslash/@:/@',
142 auth: 'u:p',
258 // surrogate in auth
262 auth: '\uD83D\uDE00',
/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/
H A Dbase_key_mock.h30 virtual bool StoreKey(const UserAuth &auth) = 0;
31 virtual bool StoreKey(const UserAuth &auth, bool needGenerateShield) = 0;
34 virtual bool RestoreKey(const UserAuth &auth) = 0;
50 MOCK_METHOD2(StoreKey, bool(const UserAuth &auth, bool needGenerateShield));
51 MOCK_METHOD1(StoreKey, bool(const UserAuth &auth));
54 MOCK_METHOD1(RestoreKey, bool(const UserAuth &auth));
/third_party/node/deps/npm/lib/commands/
H A Dprofile.js18 'two-factor auth',
43 'enable-2fa [auth-only|auth-and-writes]',
66 return ['auth-and-writes', 'auth-only']
108 const tfa = 'two-factor auth'
236 throw new Error('npm profile enable-2fa [auth-and-writes|auth-only]')
239 const mode = args[0] || 'auth-and-writes'
240 if (mode !== 'auth
[all...]
H A Dtoken.js163 conf.auth = { token: creds.token }
165 conf.auth = {
171 } else if (creds.auth) {
172 const auth = Buffer.from(creds.auth, 'base64').toString().split(':', 2)
173 conf.auth = {
175 username: auth[0],
176 password: auth[1],
180 conf.auth = {}
184 conf.auth
[all...]
/third_party/node/benchmark/url/
H A Dlegacy-url-get-prop.js16 auth: obj.auth,
31 noDead.auth = obj.auth;
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Ddpp.h412 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr,
414 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth,
416 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr,
418 int dpp_notify_new_qr_code(struct dpp_authentication *auth,
429 struct dpp_authentication *auth,
431 void dpp_auth_deinit(struct dpp_authentication *auth);
433 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start,
435 int dpp_conf_resp_rx(struct dpp_authentication *auth,
437 enum dpp_status_error dpp_conf_result_rx(struct dpp_authentication *auth,
440 struct wpabuf * dpp_build_conf_result(struct dpp_authentication *auth,
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/
H A Ddriver_privsep.c384 struct privsep_event_auth *auth; in wpa_driver_privsep_event_auth() local
387 if (len < sizeof(*auth)) in wpa_driver_privsep_event_auth()
389 auth = (struct privsep_event_auth *) buf; in wpa_driver_privsep_event_auth()
390 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth()
393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth()
394 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); in wpa_driver_privsep_event_auth()
395 data.auth in wpa_driver_privsep_event_auth()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/
H A Ddriver_privsep.c390 struct privsep_event_auth *auth; in wpa_driver_privsep_event_auth() local
393 if (len < sizeof(*auth)) in wpa_driver_privsep_event_auth()
395 auth = (struct privsep_event_auth *) buf; in wpa_driver_privsep_event_auth()
396 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth()
399 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth()
400 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); in wpa_driver_privsep_event_auth()
401 data.auth in wpa_driver_privsep_event_auth()
[all...]
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-policy2c/
H A Dminimal-secure-streams.c77 const lws_ss_auth_t *auth; in main() local
413 * The auth map in main()
416 auth = lws_ss_auth_get(context); in main()
417 if (auth) in main()
421 while (auth) { in main()
423 purify_csymbol(auth->name, buf, sizeof(buf))); in main()
429 printf("\t.name = \"%s\",\n", auth->name); in main()
430 printf("\t.type= \"%s\",\n", auth->type); in main()
431 printf("\t.streamtype = \"%s\",\n", auth->streamtype); in main()
432 printf("\t.blob_index = %d,\n", auth in main()
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/
H A Dkey_manager.cpp172 int KeyManager::GenerateAndInstallUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) in GenerateAndInstallUserKey() argument
184 return GenerateAndInstallEl5Key(userId, dir, auth); in GenerateAndInstallUserKey()
190 if (elKey->StoreKey(auth) == false) { in GenerateAndInstallUserKey()
214 int KeyManager::GenerateAndInstallEl5Key(uint32_t userId, const std::string &dir, const UserAuth &auth) in GenerateAndInstallEl5Key() argument
235 saveESecretStatus[userId] = (!auth.secret.IsEmpty() && !auth.token.IsEmpty()); in GenerateAndInstallEl5Key()
237 if ((!auth.secret.IsEmpty() && !auth.token.IsEmpty()) && in GenerateAndInstallEl5Key()
238 !elKey->EncryptClassE(auth, saveESecretStatus[userId], userId, USER_ADD_AUTH)) { in GenerateAndInstallEl5Key()
245 if (!elKey->DecryptClassE(auth, saveESecretStatu in GenerateAndInstallEl5Key()
253 RestoreUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) RestoreUserKey() argument
642 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; GenerateUserKeyByType() local
871 UserAuth auth = { .token = tokenSecret.token, .secret = tokenSecret.newSecret, .secureUid = tokenSecret.secureUid }; UpdateESecret() local
902 UserAuth auth = { {}, userTokenSecret.oldSecret, userTokenSecret.secureUid }; UpdateCeEceSeceUserAuth() local
1220 UserAuth auth = { .token = token, .secret = secret }; UpdateCeEceSeceUserAuth() local
1245 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local
1340 UserAuth auth = {.token = token, .secret = secret}; UpdateCeEceSeceUserAuth() local
1437 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local
1897 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local
1931 UserAuth auth = { .token=token, .secret=secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local
[all...]
/foundation/communication/ipc/ipc/native/src/core/source/
H A Dipc_process_skeleton.cpp1299 const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject()
1301 if ((auth->GetStubObject() == stub) && (auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject()
1302 (auth->GetRemoteTokenId() == tokenId) && (auth->GetRemoteDeviceId().compare(deviceId) == 0)) { in IsSameRemoteObject()
1310 const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject()
1312 if ((auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject()
1313 (auth in IsSameRemoteObject()
1298 IsSameRemoteObject(IRemoteObject *stub, int pid, int uid, uint32_t tokenId, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument
1309 IsSameRemoteObject(int pid, int uid, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument
[all...]

Completed in 20 milliseconds

12345678910>>...13