/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | aes-ccm.c | 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument 127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth() 132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument 137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth() 142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() 169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae() 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() 196 aes_ccm_decr_auth(aes, M, a, auth, in aes_ccm_ad() 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) aes_ccm_ae() argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | aes-ccm.c | 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument 127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth() 132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument 137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth() 142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() 169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae() 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() 196 aes_ccm_decr_auth(aes, M, a, auth, in aes_ccm_ad() 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) aes_ccm_ae() argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) aes_ccm_ad() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | ibss_rsn.c | 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 358 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta() 455 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init() 456 if (peer->auth == NULL) { in ibss_rsn_auth_init() 462 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init() 473 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init() 476 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init() 485 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local 486 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth in ibss_rsn_send_auth() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | ibss_rsn.c | 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 389 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta() 486 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init() 487 if (peer->auth == NULL) { in ibss_rsn_auth_init() 493 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init() 504 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init() 507 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init() 516 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local 517 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth in ibss_rsn_send_auth() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp.h | 403 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth); 540 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, 542 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth, 544 struct wpabuf * dpp_build_conf_req_helper(struct dpp_authentication *auth, 548 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, 550 int dpp_notify_new_qr_code(struct dpp_authentication *auth, 560 int dpp_set_configurator(struct dpp_authentication *auth, const char *cmd); 561 void dpp_auth_deinit(struct dpp_authentication *auth); 563 dpp_build_conf_resp(struct dpp_authentication *auth, const u8 *e_nonce, 567 dpp_conf_req_rx(struct dpp_authentication *auth, cons [all...] |
/kernel/linux/linux-5.10/net/ceph/ |
H A D | auth_none.c | 11 #include <linux/ceph/auth.h> 69 * the generic auth code decode the global_id, and we carry no actual 92 struct ceph_auth_handshake *auth) in ceph_auth_none_create_authorizer() 109 auth->authorizer = (struct ceph_authorizer *) au; in ceph_auth_none_create_authorizer() 110 auth->authorizer_buf = au->buf; in ceph_auth_none_create_authorizer() 111 auth->authorizer_buf_len = au->buf_len; in ceph_auth_none_create_authorizer() 112 auth->authorizer_reply_buf = au->reply_buf; in ceph_auth_none_create_authorizer() 113 auth->authorizer_reply_buf_len = sizeof (au->reply_buf); in ceph_auth_none_create_authorizer() 90 ceph_auth_none_create_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_auth_none_create_authorizer() argument
|
H A D | auth_x.c | 11 #include <linux/ceph/auth.h> 502 struct ceph_x_authenticate *auth = (void *)(head + 1); in ceph_x_build_request() local 503 void *p = auth + 1; in ceph_x_build_request() 516 get_random_bytes(&auth->client_challenge, sizeof(u64)); in ceph_x_build_request() 517 blob->client_challenge = auth->client_challenge; in ceph_x_build_request() 524 auth->struct_v = 1; in ceph_x_build_request() 525 auth->key = 0; in ceph_x_build_request() 527 auth->key ^= *(__le64 *)u; in ceph_x_build_request() 529 xi->server_challenge, le64_to_cpu(auth->client_challenge), in ceph_x_build_request() 530 le64_to_cpu(auth in ceph_x_build_request() 626 ceph_x_create_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_x_create_authorizer() argument 661 ceph_x_update_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_x_update_authorizer() argument 870 ceph_x_sign_message(struct ceph_auth_handshake *auth, struct ceph_msg *msg) ceph_x_sign_message() argument 889 ceph_x_check_message_signature(struct ceph_auth_handshake *auth, struct ceph_msg *msg) ceph_x_check_message_signature() argument [all...] |
/kernel/linux/linux-6.6/net/ceph/ |
H A D | auth_none.c | 11 #include <linux/ceph/auth.h> 69 * the generic auth code decode the global_id, and we carry no actual 95 struct ceph_auth_handshake *auth) in ceph_auth_none_create_authorizer() 112 auth->authorizer = (struct ceph_authorizer *) au; in ceph_auth_none_create_authorizer() 113 auth->authorizer_buf = au->buf; in ceph_auth_none_create_authorizer() 114 auth->authorizer_buf_len = au->buf_len; in ceph_auth_none_create_authorizer() 115 auth->authorizer_reply_buf = NULL; in ceph_auth_none_create_authorizer() 116 auth->authorizer_reply_buf_len = 0; in ceph_auth_none_create_authorizer() 93 ceph_auth_none_create_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_auth_none_create_authorizer() argument
|
/third_party/node/deps/npm/node_modules/hosted-git-info/lib/ |
H A D | index.js | 11 constructor (type, user, auth, project, committish, defaultRepresentation, opts = {}) { 15 auth, 27 'git+https:': { name: 'https', auth: true }, 28 'git:': { auth: true }, 29 'http:': { auth: true }, 30 'https:': { auth: true }, 31 'git+http:': { auth: true },
|
/kernel/linux/linux-5.10/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 139 struct iscsi_node_auth *auth, in chap_server_open() 147 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open() 148 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open() 210 struct iscsi_node_auth *auth, in chap_server_compute_hash() 284 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash() 285 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash() 340 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash() 341 strlen(auth->password)); in chap_server_compute_hash() 369 if (!auth->authenticate_target) { in chap_server_compute_hash() 454 ret = crypto_shash_update(desc, auth in chap_server_compute_hash() 137 chap_server_open( struct iscsi_conn *conn, struct iscsi_node_auth *auth, const char *a_str, char *aic_str, unsigned int *aic_len) chap_server_open() argument 208 chap_server_compute_hash( struct iscsi_conn *conn, struct iscsi_node_auth *auth, char *nr_in_ptr, char *nr_out_ptr, unsigned int *nr_out_len) chap_server_compute_hash() argument 499 chap_main_loop( struct iscsi_conn *conn, struct iscsi_node_auth *auth, char *in_text, char *out_text, int *in_len, int *out_len) chap_main_loop() argument [all...] |
/kernel/linux/linux-6.6/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 139 struct iscsi_node_auth *auth, in chap_server_open() 147 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open() 148 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open() 242 struct iscsi_node_auth *auth, in chap_server_compute_hash() 316 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash() 317 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash() 383 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash() 384 strlen(auth->password)); in chap_server_compute_hash() 412 if (!auth->authenticate_target) { in chap_server_compute_hash() 526 ret = crypto_shash_update(desc, auth in chap_server_compute_hash() 137 chap_server_open( struct iscsit_conn *conn, struct iscsi_node_auth *auth, const char *a_str, char *aic_str, unsigned int *aic_len) chap_server_open() argument 240 chap_server_compute_hash( struct iscsit_conn *conn, struct iscsi_node_auth *auth, char *nr_in_ptr, char *nr_out_ptr, unsigned int *nr_out_len) chap_server_compute_hash() argument 571 chap_main_loop( struct iscsit_conn *conn, struct iscsi_node_auth *auth, char *in_text, char *out_text, int *in_len, int *out_len) chap_main_loop() argument [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | icecast.c | 92 char h_url[1024], host[1024], auth[1024], path[1024]; in icecast_open() local 129 av_url_split(NULL, 0, auth, sizeof(auth), host, sizeof(host), in icecast_open() 132 // Check for auth data in URI in icecast_open() 133 if (auth[0]) { in icecast_open() 134 char *sep = strchr(auth, ':'); in icecast_open() 147 if (!(user = av_strdup(auth))) { in icecast_open() 154 snprintf(auth, sizeof(auth), in icecast_open() 169 auth, hos in icecast_open() [all...] |
/kernel/linux/linux-6.6/net/sctp/ |
H A D | output.c | 67 packet->auth = NULL; in sctp_packet_reset() 240 /* Try to bundle an auth chunk into the packet. */ 246 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local 252 /* See if this is an auth chunk we are bundling or if in sctp_packet_bundle_auth() 253 * auth is already bundled. in sctp_packet_bundle_auth() 261 if (!chunk->auth) in sctp_packet_bundle_auth() 264 auth = sctp_make_auth(asoc, chunk->shkey->key_id); in sctp_packet_bundle_auth() 265 if (!auth) in sctp_packet_bundle_auth() 268 auth->shkey = chunk->shkey; in sctp_packet_bundle_auth() 269 sctp_auth_shkey_hold(auth in sctp_packet_bundle_auth() 440 struct sctp_auth_chunk *auth = NULL; sctp_packet_pack() local [all...] |
/kernel/linux/linux-5.10/drivers/gpu/drm/amd/display/modules/hdcp/ |
H A D | hdcp1_execution.c | 34 memcpy(bksv, hdcp->auth.msg.hdcp1.bksv, sizeof(hdcp->auth.msg.hdcp1.bksv)); in validate_bksv() 48 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_READY) ? in check_ksv_ready() 51 return (hdcp->auth.msg.hdcp1.bcaps & DRM_HDCP_DDC_BCAPS_KSV_FIFO_READY) ? in check_ksv_ready() 58 return (hdcp->auth.msg.hdcp1.bcaps & DP_BCAPS_HDCP_CAPABLE) ? in check_hdcp_capable_dp() 67 status = (hdcp->auth.msg.hdcp1.bstatus & in check_r0p_available_dp() 80 return (hdcp->auth.msg.hdcp1.bstatus & in check_link_integrity_dp() 89 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_REAUTH_REQ) ? in check_no_reauthentication_request_dp() 99 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth.msg.hdcp1.binfo_dp >> 8) in check_no_max_cascade() 103 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth in check_no_max_cascade() [all...] |
/kernel/linux/linux-6.6/drivers/gpu/drm/amd/display/modules/hdcp/ |
H A D | hdcp1_execution.c | 34 memcpy(bksv, hdcp->auth.msg.hdcp1.bksv, sizeof(hdcp->auth.msg.hdcp1.bksv)); in validate_bksv() 48 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_READY) ? in check_ksv_ready() 51 return (hdcp->auth.msg.hdcp1.bcaps & DRM_HDCP_DDC_BCAPS_KSV_FIFO_READY) ? in check_ksv_ready() 58 return (hdcp->auth.msg.hdcp1.bcaps & DP_BCAPS_HDCP_CAPABLE) ? in check_hdcp_capable_dp() 67 status = (hdcp->auth.msg.hdcp1.bstatus & in check_r0p_available_dp() 80 return (hdcp->auth.msg.hdcp1.bstatus & in check_link_integrity_dp() 89 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_REAUTH_REQ) ? in check_no_reauthentication_request_dp() 99 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth.msg.hdcp1.binfo_dp >> 8) in check_no_max_cascade() 103 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth in check_no_max_cascade() [all...] |
/third_party/node/lib/ |
H A D | url.js | 73 this.auth = null; 161 // - '@' since this could cause parts of the hostname to be confused with auth 348 // auth portion cannot go past, or the last @ char is the decider. 358 this.auth = decodeURIComponent(rest.slice(0, atSign)); 578 let auth = true; 595 if (options.auth != null) { 596 auth = Boolean(options.auth); 600 return bindingUrl.format(urlObject.href, fragment, unicode, search, auth); 624 let auth [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/ |
H A D | huks_master.h | 39 bool GenerateKey(const UserAuth &auth, KeyBlob &keyOut); 40 bool EncryptKey(KeyContext &ctx, const UserAuth &auth, const KeyInfo &key, bool isNeedNewNonce); 41 bool EncryptKeyEx(const UserAuth &auth, const KeyBlob &rnd, KeyContext &ctx); 42 bool DecryptKey(KeyContext &ctx, const UserAuth &auth, KeyInfo &key, bool isNeedNewNonce); 43 bool DecryptKeyEx(KeyContext &ctx, const UserAuth &auth, KeyBlob &rnd);
|
/third_party/node/test/parallel/ |
H A D | test-http-client-headers-array.js | 22 if (options.auth && !Array.isArray(options.headers)) { 24 `Basic ${Buffer.from(options.auth).toString('base64')}`; 55 execute({ auth: 'foo:bar', headers: 57 execute({ auth: 'foo:bar', headers: [
|
/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/ |
H A D | base_key_mock.h | 30 virtual bool StoreKey(const UserAuth &auth) = 0; 31 virtual bool StoreKey(const UserAuth &auth, bool needGenerateShield) = 0; 34 virtual bool RestoreKey(const UserAuth &auth) = 0; 50 MOCK_METHOD2(StoreKey, bool(const UserAuth &auth, bool needGenerateShield)); 51 MOCK_METHOD1(StoreKey, bool(const UserAuth &auth)); 54 MOCK_METHOD1(RestoreKey, bool(const UserAuth &auth));
|
/kernel/linux/linux-5.10/tools/testing/selftests/tpm2/ |
H A D | tpm2_tests.py | 24 auth = ('A' * 15).encode() 26 blob = self.client.seal(self.root_key, data, auth, None) 27 result = self.client.unseal(self.root_key, blob, auth, None) 34 auth = ('A' * 15).encode() 45 blob = self.client.seal(self.root_key, data, auth, policy_dig) 53 result = self.client.unseal(self.root_key, blob, auth, handle) 62 auth = ('A' * 20).encode() 65 blob = self.client.seal(self.root_key, data, auth, None) 68 auth[:-1] + 'B'.encode(), None) 78 auth [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/tpm2/ |
H A D | tpm2_tests.py | 24 auth = ('A' * 15).encode() 26 blob = self.client.seal(self.root_key, data, auth, None) 27 result = self.client.unseal(self.root_key, blob, auth, None) 44 auth = ('A' * 15).encode() 55 blob = self.client.seal(self.root_key, data, auth, policy_dig) 63 result = self.client.unseal(self.root_key, blob, auth, handle) 72 auth = ('A' * 20).encode() 75 blob = self.client.seal(self.root_key, data, auth, None) 78 auth[:-1] + 'B'.encode(), None) 91 auth [all...] |
/kernel/linux/linux-5.10/net/sunrpc/ |
H A D | auth_unix.c | 16 #include <linux/sunrpc/auth.h> 36 unx_destroy(struct rpc_auth *auth) in unx_destroy() argument 44 unx_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in unx_lookup_cred() argument 48 rpcauth_init_cred(ret, acred, auth, &unix_credops); in unx_lookup_cred() 167 struct rpc_auth *auth = task->tk_rqstp->rq_cred->cr_auth; in unx_validate() local 189 auth->au_verfsize = XDR_QUADLEN(size) + 2; in unx_validate() 190 auth->au_rslack = XDR_QUADLEN(size) + 2; in unx_validate() 191 auth->au_ralign = XDR_QUADLEN(size) + 2; in unx_validate()
|
/kernel/linux/linux-6.6/net/sunrpc/ |
H A D | auth_unix.c | 16 #include <linux/sunrpc/auth.h> 36 unx_destroy(struct rpc_auth *auth) in unx_destroy() argument 43 static struct rpc_cred *unx_lookup_cred(struct rpc_auth *auth, in unx_lookup_cred() argument 56 rpcauth_init_cred(ret, acred, auth, &unix_credops); in unx_lookup_cred() 175 struct rpc_auth *auth = task->tk_rqstp->rq_cred->cr_auth; in unx_validate() local 197 auth->au_verfsize = XDR_QUADLEN(size) + 2; in unx_validate() 198 auth->au_rslack = XDR_QUADLEN(size) + 2; in unx_validate() 199 auth->au_ralign = XDR_QUADLEN(size) + 2; in unx_validate()
|
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | pkcs7_verify.c | 199 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local 252 auth = sig->auth_ids[0]; in pkcs7_verify_sig_chain() 253 if (auth) { in pkcs7_verify_sig_chain() 254 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 258 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain() 262 auth = sig->auth_ids[1]; in pkcs7_verify_sig_chain() 263 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 269 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain() [all...] |
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | pkcs7_verify.c | 198 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local 248 auth = sig->auth_ids[0]; in pkcs7_verify_sig_chain() 249 if (auth) { in pkcs7_verify_sig_chain() 250 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 254 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain() 258 auth = sig->auth_ids[1]; in pkcs7_verify_sig_chain() 259 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 265 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain() [all...] |