Home
last modified time | relevance | path

Searched refs:auth (Results 51 - 75 of 663) sorted by relevance

12345678910>>...27

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Daes-ccm.c117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument
127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth()
128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth()
132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument
137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth()
142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth()
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae()
169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae()
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad()
196 aes_ccm_decr_auth(aes, M, a, auth, in aes_ccm_ad()
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) aes_ccm_ae() argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Daes-ccm.c117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument
127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth()
128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth()
132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument
137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth()
142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth()
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae()
169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae()
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad()
196 aes_ccm_decr_auth(aes, M, a, auth, in aes_ccm_ad()
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) aes_ccm_ae() argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dibss_rsn.c42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free()
358 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta()
455 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init()
456 if (peer->auth == NULL) { in ibss_rsn_auth_init()
462 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init()
473 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init()
476 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init()
485 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local
486 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth in ibss_rsn_send_auth()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dibss_rsn.c42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free()
389 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta()
486 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init()
487 if (peer->auth == NULL) { in ibss_rsn_auth_init()
493 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init()
504 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init()
507 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init()
516 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local
517 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth in ibss_rsn_send_auth()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp.h403 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth);
540 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr,
542 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth,
544 struct wpabuf * dpp_build_conf_req_helper(struct dpp_authentication *auth,
548 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr,
550 int dpp_notify_new_qr_code(struct dpp_authentication *auth,
560 int dpp_set_configurator(struct dpp_authentication *auth, const char *cmd);
561 void dpp_auth_deinit(struct dpp_authentication *auth);
563 dpp_build_conf_resp(struct dpp_authentication *auth, const u8 *e_nonce,
567 dpp_conf_req_rx(struct dpp_authentication *auth, cons
[all...]
/kernel/linux/linux-5.10/net/ceph/
H A Dauth_none.c11 #include <linux/ceph/auth.h>
69 * the generic auth code decode the global_id, and we carry no actual
92 struct ceph_auth_handshake *auth) in ceph_auth_none_create_authorizer()
109 auth->authorizer = (struct ceph_authorizer *) au; in ceph_auth_none_create_authorizer()
110 auth->authorizer_buf = au->buf; in ceph_auth_none_create_authorizer()
111 auth->authorizer_buf_len = au->buf_len; in ceph_auth_none_create_authorizer()
112 auth->authorizer_reply_buf = au->reply_buf; in ceph_auth_none_create_authorizer()
113 auth->authorizer_reply_buf_len = sizeof (au->reply_buf); in ceph_auth_none_create_authorizer()
90 ceph_auth_none_create_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_auth_none_create_authorizer() argument
H A Dauth_x.c11 #include <linux/ceph/auth.h>
502 struct ceph_x_authenticate *auth = (void *)(head + 1); in ceph_x_build_request() local
503 void *p = auth + 1; in ceph_x_build_request()
516 get_random_bytes(&auth->client_challenge, sizeof(u64)); in ceph_x_build_request()
517 blob->client_challenge = auth->client_challenge; in ceph_x_build_request()
524 auth->struct_v = 1; in ceph_x_build_request()
525 auth->key = 0; in ceph_x_build_request()
527 auth->key ^= *(__le64 *)u; in ceph_x_build_request()
529 xi->server_challenge, le64_to_cpu(auth->client_challenge), in ceph_x_build_request()
530 le64_to_cpu(auth in ceph_x_build_request()
626 ceph_x_create_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_x_create_authorizer() argument
661 ceph_x_update_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_x_update_authorizer() argument
870 ceph_x_sign_message(struct ceph_auth_handshake *auth, struct ceph_msg *msg) ceph_x_sign_message() argument
889 ceph_x_check_message_signature(struct ceph_auth_handshake *auth, struct ceph_msg *msg) ceph_x_check_message_signature() argument
[all...]
/kernel/linux/linux-6.6/net/ceph/
H A Dauth_none.c11 #include <linux/ceph/auth.h>
69 * the generic auth code decode the global_id, and we carry no actual
95 struct ceph_auth_handshake *auth) in ceph_auth_none_create_authorizer()
112 auth->authorizer = (struct ceph_authorizer *) au; in ceph_auth_none_create_authorizer()
113 auth->authorizer_buf = au->buf; in ceph_auth_none_create_authorizer()
114 auth->authorizer_buf_len = au->buf_len; in ceph_auth_none_create_authorizer()
115 auth->authorizer_reply_buf = NULL; in ceph_auth_none_create_authorizer()
116 auth->authorizer_reply_buf_len = 0; in ceph_auth_none_create_authorizer()
93 ceph_auth_none_create_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_auth_none_create_authorizer() argument
/third_party/node/deps/npm/node_modules/hosted-git-info/lib/
H A Dindex.js11 constructor (type, user, auth, project, committish, defaultRepresentation, opts = {}) {
15 auth,
27 'git+https:': { name: 'https', auth: true },
28 'git:': { auth: true },
29 'http:': { auth: true },
30 'https:': { auth: true },
31 'git+http:': { auth: true },
/kernel/linux/linux-5.10/drivers/target/iscsi/
H A Discsi_target_auth.c139 struct iscsi_node_auth *auth, in chap_server_open()
147 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open()
148 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open()
210 struct iscsi_node_auth *auth, in chap_server_compute_hash()
284 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash()
285 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash()
340 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash()
341 strlen(auth->password)); in chap_server_compute_hash()
369 if (!auth->authenticate_target) { in chap_server_compute_hash()
454 ret = crypto_shash_update(desc, auth in chap_server_compute_hash()
137 chap_server_open( struct iscsi_conn *conn, struct iscsi_node_auth *auth, const char *a_str, char *aic_str, unsigned int *aic_len) chap_server_open() argument
208 chap_server_compute_hash( struct iscsi_conn *conn, struct iscsi_node_auth *auth, char *nr_in_ptr, char *nr_out_ptr, unsigned int *nr_out_len) chap_server_compute_hash() argument
499 chap_main_loop( struct iscsi_conn *conn, struct iscsi_node_auth *auth, char *in_text, char *out_text, int *in_len, int *out_len) chap_main_loop() argument
[all...]
/kernel/linux/linux-6.6/drivers/target/iscsi/
H A Discsi_target_auth.c139 struct iscsi_node_auth *auth, in chap_server_open()
147 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open()
148 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open()
242 struct iscsi_node_auth *auth, in chap_server_compute_hash()
316 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash()
317 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash()
383 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash()
384 strlen(auth->password)); in chap_server_compute_hash()
412 if (!auth->authenticate_target) { in chap_server_compute_hash()
526 ret = crypto_shash_update(desc, auth in chap_server_compute_hash()
137 chap_server_open( struct iscsit_conn *conn, struct iscsi_node_auth *auth, const char *a_str, char *aic_str, unsigned int *aic_len) chap_server_open() argument
240 chap_server_compute_hash( struct iscsit_conn *conn, struct iscsi_node_auth *auth, char *nr_in_ptr, char *nr_out_ptr, unsigned int *nr_out_len) chap_server_compute_hash() argument
571 chap_main_loop( struct iscsit_conn *conn, struct iscsi_node_auth *auth, char *in_text, char *out_text, int *in_len, int *out_len) chap_main_loop() argument
[all...]
/third_party/ffmpeg/libavformat/
H A Dicecast.c92 char h_url[1024], host[1024], auth[1024], path[1024]; in icecast_open() local
129 av_url_split(NULL, 0, auth, sizeof(auth), host, sizeof(host), in icecast_open()
132 // Check for auth data in URI in icecast_open()
133 if (auth[0]) { in icecast_open()
134 char *sep = strchr(auth, ':'); in icecast_open()
147 if (!(user = av_strdup(auth))) { in icecast_open()
154 snprintf(auth, sizeof(auth), in icecast_open()
169 auth, hos in icecast_open()
[all...]
/kernel/linux/linux-6.6/net/sctp/
H A Doutput.c67 packet->auth = NULL; in sctp_packet_reset()
240 /* Try to bundle an auth chunk into the packet. */
246 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local
252 /* See if this is an auth chunk we are bundling or if in sctp_packet_bundle_auth()
253 * auth is already bundled. in sctp_packet_bundle_auth()
261 if (!chunk->auth) in sctp_packet_bundle_auth()
264 auth = sctp_make_auth(asoc, chunk->shkey->key_id); in sctp_packet_bundle_auth()
265 if (!auth) in sctp_packet_bundle_auth()
268 auth->shkey = chunk->shkey; in sctp_packet_bundle_auth()
269 sctp_auth_shkey_hold(auth in sctp_packet_bundle_auth()
440 struct sctp_auth_chunk *auth = NULL; sctp_packet_pack() local
[all...]
/kernel/linux/linux-5.10/drivers/gpu/drm/amd/display/modules/hdcp/
H A Dhdcp1_execution.c34 memcpy(bksv, hdcp->auth.msg.hdcp1.bksv, sizeof(hdcp->auth.msg.hdcp1.bksv)); in validate_bksv()
48 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_READY) ? in check_ksv_ready()
51 return (hdcp->auth.msg.hdcp1.bcaps & DRM_HDCP_DDC_BCAPS_KSV_FIFO_READY) ? in check_ksv_ready()
58 return (hdcp->auth.msg.hdcp1.bcaps & DP_BCAPS_HDCP_CAPABLE) ? in check_hdcp_capable_dp()
67 status = (hdcp->auth.msg.hdcp1.bstatus & in check_r0p_available_dp()
80 return (hdcp->auth.msg.hdcp1.bstatus & in check_link_integrity_dp()
89 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_REAUTH_REQ) ? in check_no_reauthentication_request_dp()
99 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth.msg.hdcp1.binfo_dp >> 8) in check_no_max_cascade()
103 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth in check_no_max_cascade()
[all...]
/kernel/linux/linux-6.6/drivers/gpu/drm/amd/display/modules/hdcp/
H A Dhdcp1_execution.c34 memcpy(bksv, hdcp->auth.msg.hdcp1.bksv, sizeof(hdcp->auth.msg.hdcp1.bksv)); in validate_bksv()
48 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_READY) ? in check_ksv_ready()
51 return (hdcp->auth.msg.hdcp1.bcaps & DRM_HDCP_DDC_BCAPS_KSV_FIFO_READY) ? in check_ksv_ready()
58 return (hdcp->auth.msg.hdcp1.bcaps & DP_BCAPS_HDCP_CAPABLE) ? in check_hdcp_capable_dp()
67 status = (hdcp->auth.msg.hdcp1.bstatus & in check_r0p_available_dp()
80 return (hdcp->auth.msg.hdcp1.bstatus & in check_link_integrity_dp()
89 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_REAUTH_REQ) ? in check_no_reauthentication_request_dp()
99 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth.msg.hdcp1.binfo_dp >> 8) in check_no_max_cascade()
103 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth in check_no_max_cascade()
[all...]
/third_party/node/lib/
H A Durl.js73 this.auth = null;
161 // - '@' since this could cause parts of the hostname to be confused with auth
348 // auth portion cannot go past, or the last @ char is the decider.
358 this.auth = decodeURIComponent(rest.slice(0, atSign));
578 let auth = true;
595 if (options.auth != null) {
596 auth = Boolean(options.auth);
600 return bindingUrl.format(urlObject.href, fragment, unicode, search, auth);
624 let auth
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/
H A Dhuks_master.h39 bool GenerateKey(const UserAuth &auth, KeyBlob &keyOut);
40 bool EncryptKey(KeyContext &ctx, const UserAuth &auth, const KeyInfo &key, bool isNeedNewNonce);
41 bool EncryptKeyEx(const UserAuth &auth, const KeyBlob &rnd, KeyContext &ctx);
42 bool DecryptKey(KeyContext &ctx, const UserAuth &auth, KeyInfo &key, bool isNeedNewNonce);
43 bool DecryptKeyEx(KeyContext &ctx, const UserAuth &auth, KeyBlob &rnd);
/third_party/node/test/parallel/
H A Dtest-http-client-headers-array.js22 if (options.auth && !Array.isArray(options.headers)) {
24 `Basic ${Buffer.from(options.auth).toString('base64')}`;
55 execute({ auth: 'foo:bar', headers:
57 execute({ auth: 'foo:bar', headers: [
/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/
H A Dbase_key_mock.h30 virtual bool StoreKey(const UserAuth &auth) = 0;
31 virtual bool StoreKey(const UserAuth &auth, bool needGenerateShield) = 0;
34 virtual bool RestoreKey(const UserAuth &auth) = 0;
50 MOCK_METHOD2(StoreKey, bool(const UserAuth &auth, bool needGenerateShield));
51 MOCK_METHOD1(StoreKey, bool(const UserAuth &auth));
54 MOCK_METHOD1(RestoreKey, bool(const UserAuth &auth));
/kernel/linux/linux-5.10/tools/testing/selftests/tpm2/
H A Dtpm2_tests.py24 auth = ('A' * 15).encode()
26 blob = self.client.seal(self.root_key, data, auth, None)
27 result = self.client.unseal(self.root_key, blob, auth, None)
34 auth = ('A' * 15).encode()
45 blob = self.client.seal(self.root_key, data, auth, policy_dig)
53 result = self.client.unseal(self.root_key, blob, auth, handle)
62 auth = ('A' * 20).encode()
65 blob = self.client.seal(self.root_key, data, auth, None)
68 auth[:-1] + 'B'.encode(), None)
78 auth
[all...]
/kernel/linux/linux-6.6/tools/testing/selftests/tpm2/
H A Dtpm2_tests.py24 auth = ('A' * 15).encode()
26 blob = self.client.seal(self.root_key, data, auth, None)
27 result = self.client.unseal(self.root_key, blob, auth, None)
44 auth = ('A' * 15).encode()
55 blob = self.client.seal(self.root_key, data, auth, policy_dig)
63 result = self.client.unseal(self.root_key, blob, auth, handle)
72 auth = ('A' * 20).encode()
75 blob = self.client.seal(self.root_key, data, auth, None)
78 auth[:-1] + 'B'.encode(), None)
91 auth
[all...]
/kernel/linux/linux-5.10/net/sunrpc/
H A Dauth_unix.c16 #include <linux/sunrpc/auth.h>
36 unx_destroy(struct rpc_auth *auth) in unx_destroy() argument
44 unx_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in unx_lookup_cred() argument
48 rpcauth_init_cred(ret, acred, auth, &unix_credops); in unx_lookup_cred()
167 struct rpc_auth *auth = task->tk_rqstp->rq_cred->cr_auth; in unx_validate() local
189 auth->au_verfsize = XDR_QUADLEN(size) + 2; in unx_validate()
190 auth->au_rslack = XDR_QUADLEN(size) + 2; in unx_validate()
191 auth->au_ralign = XDR_QUADLEN(size) + 2; in unx_validate()
/kernel/linux/linux-6.6/net/sunrpc/
H A Dauth_unix.c16 #include <linux/sunrpc/auth.h>
36 unx_destroy(struct rpc_auth *auth) in unx_destroy() argument
43 static struct rpc_cred *unx_lookup_cred(struct rpc_auth *auth, in unx_lookup_cred() argument
56 rpcauth_init_cred(ret, acred, auth, &unix_credops); in unx_lookup_cred()
175 struct rpc_auth *auth = task->tk_rqstp->rq_cred->cr_auth; in unx_validate() local
197 auth->au_verfsize = XDR_QUADLEN(size) + 2; in unx_validate()
198 auth->au_rslack = XDR_QUADLEN(size) + 2; in unx_validate()
199 auth->au_ralign = XDR_QUADLEN(size) + 2; in unx_validate()
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
H A Dpkcs7_verify.c199 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local
252 auth = sig->auth_ids[0]; in pkcs7_verify_sig_chain()
253 if (auth) { in pkcs7_verify_sig_chain()
254 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain()
258 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain()
262 auth = sig->auth_ids[1]; in pkcs7_verify_sig_chain()
263 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain()
269 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain()
[all...]
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
H A Dpkcs7_verify.c198 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local
248 auth = sig->auth_ids[0]; in pkcs7_verify_sig_chain()
249 if (auth) { in pkcs7_verify_sig_chain()
250 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain()
254 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain()
258 auth = sig->auth_ids[1]; in pkcs7_verify_sig_chain()
259 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain()
265 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain()
[all...]

Completed in 14 milliseconds

12345678910>>...27