/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | dpp_auth.c | 42 static void dpp_auth_success(struct dpp_authentication *auth) in dpp_auth_success() argument 46 os_memset(auth->Mx, 0, sizeof(auth->Mx)); in dpp_auth_success() 47 auth->Mx_len = 0; in dpp_auth_success() 48 os_memset(auth->Nx, 0, sizeof(auth->Nx)); in dpp_auth_success() 49 auth->Nx_len = 0; in dpp_auth_success() 50 os_memset(auth->Lx, 0, sizeof(auth->Lx)); in dpp_auth_success() 51 auth->Lx_len = 0; in dpp_auth_success() 52 os_memset(auth->k1, 0, sizeof(auth->k1)); in dpp_auth_success() 53 os_memset(auth->k2, 0, sizeof(auth->k2)); in dpp_auth_success() 55 auth->auth_success = 1; in dpp_auth_success() [all …]
|
D | dpp_reconfig.c | 130 static struct wpabuf * dpp_reconfig_build_req(struct dpp_authentication *auth) in dpp_reconfig_build_req() argument 136 attr_len = 4 + 1 + 4 + 1 + 4 + os_strlen(auth->conf->connector) + in dpp_reconfig_build_req() 137 4 + auth->curve->nonce_len; in dpp_reconfig_build_req() 145 wpabuf_put_u8(msg, auth->transaction_id); in dpp_reconfig_build_req() 154 wpabuf_put_le16(msg, os_strlen(auth->conf->connector)); in dpp_reconfig_build_req() 155 wpabuf_put_str(msg, auth->conf->connector); in dpp_reconfig_build_req() 159 wpabuf_put_le16(msg, auth->curve->nonce_len); in dpp_reconfig_build_req() 160 wpabuf_put_data(msg, auth->c_nonce, auth->curve->nonce_len); in dpp_reconfig_build_req() 227 struct dpp_authentication *auth; in dpp_reconfig_init() local 276 auth = dpp_alloc_auth(dpp, msg_ctx); in dpp_reconfig_init() [all …]
|
D | dpp.c | 42 void dpp_auth_fail(struct dpp_authentication *auth, const char *txt) in dpp_auth_fail() argument 44 wpa_msg(auth->msg_ctx, MSG_INFO, DPP_EVENT_FAIL "%s", txt); in dpp_auth_fail() 491 static int dpp_channel_intersect(struct dpp_authentication *auth, in dpp_channel_intersect() argument 495 struct dpp_bootstrap_info *peer_bi = auth->peer_bi; in dpp_channel_intersect() 500 if (freq_included(auth->freq, auth->num_freq, freq)) in dpp_channel_intersect() 503 auth->freq[auth->num_freq++] = freq; in dpp_channel_intersect() 505 if (!auth->num_freq) { in dpp_channel_intersect() 510 auth->curr_freq = auth->freq[0]; in dpp_channel_intersect() 515 static int dpp_channel_local_list(struct dpp_authentication *auth, in dpp_channel_local_list() argument 523 auth->num_freq = 0; in dpp_channel_local_list() [all …]
|
D | dpp_tcp.c | 27 struct dpp_authentication *auth; member 30 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth); 76 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth); 104 dpp_auth_deinit(conn->auth); in dpp_connection_free() 179 struct dpp_authentication *auth = conn->auth; in dpp_controller_gas_done() local 181 if (auth->waiting_csr) { in dpp_controller_gas_done() 187 if (auth->peer_version >= 2 && in dpp_controller_gas_done() 188 auth->conf_resp_status == DPP_STATUS_OK) { in dpp_controller_gas_done() 190 auth->waiting_conf_result = 1; in dpp_controller_gas_done() 243 } else if (conn->auth && (conn->ctrl || conn->auth->configurator) && in dpp_tcp_send() [all …]
|
D | dpp_crypto.c | 423 int dpp_derive_bk_ke(struct dpp_authentication *auth) in dpp_derive_bk_ke() argument 425 unsigned int hash_len = auth->curve->hash_len; in dpp_derive_bk_ke() 426 size_t nonce_len = auth->curve->nonce_len; in dpp_derive_bk_ke() 434 if (!auth->Mx_len || !auth->Nx_len) { in dpp_derive_bk_ke() 441 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_bk_ke() 442 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_bk_ke() 443 addr[num_elem] = auth->Mx; in dpp_derive_bk_ke() 444 len[num_elem] = auth->Mx_len; in dpp_derive_bk_ke() 446 addr[num_elem] = auth->Nx; in dpp_derive_bk_ke() 447 len[num_elem] = auth->Nx_len; in dpp_derive_bk_ke() [all …]
|
/third_party/libsoup/libsoup/ |
D | soup-auth.c | 57 soup_auth_init (SoupAuth *auth) in soup_auth_init() argument 64 SoupAuth *auth = SOUP_AUTH (object); in soup_auth_finalize() local 65 SoupAuthPrivate *priv = soup_auth_get_instance_private (auth); in soup_auth_finalize() 67 g_free (auth->realm); in soup_auth_finalize() 77 SoupAuth *auth = SOUP_AUTH (object); in soup_auth_set_property() local 78 SoupAuthPrivate *priv = soup_auth_get_instance_private (auth); in soup_auth_set_property() 82 g_free (auth->realm); in soup_auth_set_property() 83 auth->realm = g_value_dup_string (value); in soup_auth_set_property() 102 SoupAuth *auth = SOUP_AUTH (object); in soup_auth_get_property() local 103 SoupAuthPrivate *priv = soup_auth_get_instance_private (auth); in soup_auth_get_property() [all …]
|
D | soup-connection-auth.c | 28 soup_connection_auth_init (SoupConnectionAuth *auth) in G_DEFINE_ABSTRACT_TYPE_WITH_PRIVATE() 30 auth->priv = soup_connection_auth_get_instance_private (auth); in G_DEFINE_ABSTRACT_TYPE_WITH_PRIVATE() 32 auth->priv->conns = g_hash_table_new (NULL, NULL); in G_DEFINE_ABSTRACT_TYPE_WITH_PRIVATE() 38 soup_connection_auth_free_connection_state (SoupConnectionAuth *auth, in soup_connection_auth_free_connection_state() argument 42 g_signal_handlers_disconnect_by_func (conn, G_CALLBACK (connection_disconnected), auth); in soup_connection_auth_free_connection_state() 43 SOUP_CONNECTION_AUTH_GET_CLASS (auth)->free_connection_state (auth, state); in soup_connection_auth_free_connection_state() 49 SoupConnectionAuth *auth = user_data; in connection_disconnected() local 52 state = g_hash_table_lookup (auth->priv->conns, conn); in connection_disconnected() 53 g_hash_table_remove (auth->priv->conns, conn); in connection_disconnected() 54 soup_connection_auth_free_connection_state (auth, conn, state); in connection_disconnected() [all …]
|
D | soup-auth-manager.c | 87 SoupURI *uri, SoupAuth *auth, 357 SoupAuth *auth = NULL; in create_auth() local 369 auth = soup_auth_new (G_TYPE_FROM_CLASS (auth_class), msg, challenge); in create_auth() 371 if (auth) in create_auth() 375 return auth; in create_auth() 379 check_auth (SoupMessage *msg, SoupAuth *auth) in check_auth() argument 385 scheme = soup_auth_get_scheme_name (auth); in check_auth() 395 if (!soup_auth_update (auth, msg, challenge)) in check_auth() 430 SoupAuth *auth; in make_auto_ntlm_auth() local 435 auth = g_object_new (SOUP_TYPE_AUTH_NTLM, in make_auto_ntlm_auth() [all …]
|
D | soup-auth.h | 33 gboolean (*update) (SoupAuth *auth, 37 GSList * (*get_protection_space) (SoupAuth *auth, 40 void (*authenticate) (SoupAuth *auth, 43 gboolean (*is_authenticated) (SoupAuth *auth); 45 char * (*get_authorization) (SoupAuth *auth, 48 gboolean (*is_ready) (SoupAuth *auth, 51 gboolean (*can_authenticate) (SoupAuth *auth); 72 gboolean soup_auth_update (SoupAuth *auth, 77 gboolean soup_auth_is_for_proxy (SoupAuth *auth); 79 const char *soup_auth_get_scheme_name (SoupAuth *auth); [all …]
|
/third_party/openssl/test/ssl-tests/ |
D | 04-client_auth.conf | 5 test-0 = 0-server-auth-flex 6 test-1 = 1-client-auth-flex-request 7 test-2 = 2-client-auth-flex-require-fail 8 test-3 = 3-client-auth-flex-require 9 test-4 = 4-client-auth-flex-require-non-empty-names 10 test-5 = 5-client-auth-flex-noroot 11 test-6 = 6-server-auth-TLSv1 12 test-7 = 7-client-auth-TLSv1-request 13 test-8 = 8-client-auth-TLSv1-require-fail 14 test-9 = 9-client-auth-TLSv1-require [all …]
|
D | 26-tls13_client_auth.conf | 5 test-0 = 0-server-auth-TLSv1.3 6 test-1 = 1-client-auth-TLSv1.3-request 7 test-2 = 2-client-auth-TLSv1.3-require-fail 8 test-3 = 3-client-auth-TLSv1.3-require 9 test-4 = 4-client-auth-TLSv1.3-require-non-empty-names 10 test-5 = 5-client-auth-TLSv1.3-noroot 11 test-6 = 6-client-auth-TLSv1.3-request-post-handshake 12 test-7 = 7-client-auth-TLSv1.3-require-fail-post-handshake 13 test-8 = 8-client-auth-TLSv1.3-require-post-handshake 14 test-9 = 9-client-auth-TLSv1.3-require-non-empty-names-post-handshake [all …]
|
D | 23-srp.conf | 7 test-2 = 2-srp-auth 8 test-3 = 3-srp-auth-bad-password 81 [2-srp-auth] 82 ssl_conf = 2-srp-auth-ssl 84 [2-srp-auth-ssl] 85 server = 2-srp-auth-server 86 client = 2-srp-auth-client 88 [2-srp-auth-server] 94 [2-srp-auth-client] 102 server = 2-srp-auth-server-extra [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | dpp_supplicant.c | 65 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_qr_code() local 71 if (auth && auth->response_pending && in wpas_dpp_qr_code() 72 dpp_notify_new_qr_code(auth, bi) == 1) { in wpas_dpp_qr_code() 77 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in wpas_dpp_qr_code() 79 offchannel_send_action(wpa_s, auth->curr_freq, in wpas_dpp_qr_code() 80 auth->peer_mac_addr, wpa_s->own_addr, in wpas_dpp_qr_code() 82 wpabuf_head(auth->resp_msg), in wpas_dpp_qr_code() 83 wpabuf_len(auth->resp_msg), in wpas_dpp_qr_code() 94 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_auth_resp_retry_timeout() local 96 if (!auth || !auth->resp_msg) in wpas_dpp_auth_resp_retry_timeout() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | dpp_supplicant.c | 55 struct dpp_authentication *auth); 74 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_qr_code() local 80 if (auth && auth->response_pending && in wpas_dpp_qr_code() 81 dpp_notify_new_qr_code(auth, bi) == 1) { in wpas_dpp_qr_code() 86 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in wpas_dpp_qr_code() 88 offchannel_send_action(wpa_s, auth->curr_freq, in wpas_dpp_qr_code() 89 auth->peer_mac_addr, wpa_s->own_addr, in wpas_dpp_qr_code() 91 wpabuf_head(auth->resp_msg), in wpas_dpp_qr_code() 92 wpabuf_len(auth->resp_msg), in wpas_dpp_qr_code() 192 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_auth_resp_retry_timeout() local [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | dpp_hostapd.c | 41 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_qr_code() local 47 if (auth && auth->response_pending && in hostapd_dpp_qr_code() 48 dpp_notify_new_qr_code(auth, bi) == 1) { in hostapd_dpp_qr_code() 53 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_qr_code() 55 hostapd_drv_send_action(hapd, auth->curr_freq, 0, in hostapd_dpp_qr_code() 56 auth->peer_mac_addr, in hostapd_dpp_qr_code() 69 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_auth_resp_retry_timeout() local 71 if (!auth || !auth->resp_msg) in hostapd_dpp_auth_resp_retry_timeout() 78 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_auth_resp_retry_timeout() 80 hostapd_drv_send_action(hapd, auth->curr_freq, 500, auth->peer_mac_addr, in hostapd_dpp_auth_resp_retry_timeout() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | dpp_hostapd.c | 35 struct dpp_authentication *auth, 51 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_qr_code() local 57 if (auth && auth->response_pending && in hostapd_dpp_qr_code() 58 dpp_notify_new_qr_code(auth, bi) == 1) { in hostapd_dpp_qr_code() 63 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_qr_code() 65 hostapd_drv_send_action(hapd, auth->curr_freq, 0, in hostapd_dpp_qr_code() 66 auth->peer_mac_addr, in hostapd_dpp_qr_code() 166 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_auth_resp_retry_timeout() local 168 if (!auth || !auth->resp_msg) in hostapd_dpp_auth_resp_retry_timeout() 175 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_auth_resp_retry_timeout() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | dpp.c | 81 struct dpp_authentication *auth; member 130 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth); 698 static void dpp_auth_fail(struct dpp_authentication *auth, const char *txt) in dpp_auth_fail() argument 700 wpa_msg(auth->msg_ctx, MSG_INFO, DPP_EVENT_FAIL "%s", txt); in dpp_auth_fail() 1576 static int dpp_derive_ke(struct dpp_authentication *auth, u8 *ke, in dpp_derive_ke() argument 1588 if (!auth->Mx_len || !auth->Nx_len) { in dpp_derive_ke() 1597 nonce_len = auth->curve->nonce_len; in dpp_derive_ke() 1598 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_ke() 1599 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_ke() 1600 addr[num_elem] = auth->Mx; in dpp_derive_ke() [all …]
|
/third_party/typescript/tests/baselines/reference/ |
D | parser509534.types | 12 …nv.siteRoot + "/auth/login", function (req, res, next) { // TODO Should render login page that … 18 …nv.siteRoot + "/auth/login", function (req, res, next) { // TODO Should render login page that … 22 server.get(config.env.siteRoot + "/auth/login", function (req, res, next) { 23 …nv.siteRoot + "/auth/login", function (req, res, next) { // TODO Should render login page that … 27 >config.env.siteRoot + "/auth/login" : string 33 >"/auth/login" : "/auth/login" 34 …res, next) { // TODO Should render login page that shows auth options req.redirect("/auth/live… 39 // TODO Should render login page that shows auth options 40 req.redirect("/auth/live"); 41 >req.redirect("/auth/live") : any [all …]
|
/third_party/node/deps/npm/node_modules/registry-auth-token/ |
D | README.md | 1 # registry-auth-token 3 …auth-token.svg?style=flat-square)](http://browsenpm.org/package/registry-auth-token)[![Build Statu… 5 Get the auth token set for an npm registry from `.npmrc`. Also allows fetching the configured regis… 10 npm install --save registry-auth-token 18 var getAuthToken = require('registry-auth-token') 19 var getRegistryUrl = require('registry-auth-token/registry-url') 21 // Get auth token and type for default `registry` set in `.npmrc` 24 // Get auth token for a specific registry URL 27 // Find the registry auth token for a given URL (with deep path): 49 // If auth info can be found: [all …]
|
D | CHANGELOG.md | 9 - Enabled legacy auth token to be read from environment variable (Martin Flodin) 21 - Auth legacy token is basic auth (Hutson Betts) 27 - Support legacy auth token config key (Zoltan Kochan) 102 [1.1.1]: https://github.com/rexxars/registry-auth-token/compare/a5b4fe2f5ff982110eb8a813ba1b3b3c5d8… 103 [2.0.0]: https://github.com/rexxars/registry-auth-token/compare/v1.1.1...v2.0.0 104 [2.1.0]: https://github.com/rexxars/registry-auth-token/compare/v2.0.0...v2.1.0 105 [2.1.1]: https://github.com/rexxars/registry-auth-token/compare/v2.1.0...v2.1.1 106 [3.0.0]: https://github.com/rexxars/registry-auth-token/compare/v2.1.1...v3.0.0 107 [3.0.1]: https://github.com/rexxars/registry-auth-token/compare/v3.0.0...v3.0.1 108 [3.1.0]: https://github.com/rexxars/registry-auth-token/compare/v3.0.1...v3.1.0 [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 72 int auth, encr = 0; in paramsFromScanResults() local 74 auth = AUTH_WPA2_EAP; in paramsFromScanResults() 76 auth = AUTH_WPA_EAP; in paramsFromScanResults() 78 auth = AUTH_WPA2_PSK; in paramsFromScanResults() 80 auth = AUTH_WPA_PSK; in paramsFromScanResults() 82 auth = AUTH_NONE_OPEN; in paramsFromScanResults() 90 if (auth == AUTH_NONE_OPEN) in paramsFromScanResults() 91 auth = AUTH_NONE_WEP; in paramsFromScanResults() 95 authSelect->setCurrentIndex(auth); in paramsFromScanResults() 96 authChanged(auth); in paramsFromScanResults() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 72 int auth, encr = 0; in paramsFromScanResults() local 74 auth = AUTH_WPA2_EAP; in paramsFromScanResults() 76 auth = AUTH_WPA_EAP; in paramsFromScanResults() 78 auth = AUTH_WPA2_PSK; in paramsFromScanResults() 80 auth = AUTH_WPA_PSK; in paramsFromScanResults() 82 auth = AUTH_NONE_OPEN; in paramsFromScanResults() 90 if (auth == AUTH_NONE_OPEN) in paramsFromScanResults() 91 auth = AUTH_NONE_WEP; in paramsFromScanResults() 95 authSelect->setCurrentIndex(auth); in paramsFromScanResults() 96 authChanged(auth); in paramsFromScanResults() [all …]
|
/third_party/libsoup/tests/ |
D | auth-test.c | 197 int auth, exp; in handler() local 199 auth = identify_auth (msg); in handler() 203 auths[auth]); in handler() 207 soup_test_assert (auth == exp, in handler() 218 SoupAuth *auth, gboolean retrying, gpointer data) in authenticate() argument 235 soup_auth_authenticate (auth, username, password); in authenticate() 245 int auth = identify_auth (msg); in bug271540_sent() local 247 soup_test_assert (*authenticated || !auth, in bug271540_sent() 249 soup_test_assert (!*authenticated || auth, in bug271540_sent() 255 SoupAuth *auth, gboolean retrying, gpointer data) in bug271540_authenticate() argument [all …]
|
D | ntlm-test-helper.c | 39 SoupAuth *auth; in main() local 61 auth = NULL; in main() 72 g_clear_object (&auth); in main() 73 auth = g_object_new (SOUP_TYPE_AUTH_NTLM, NULL); in main() 74 header = soup_auth_get_authorization (auth, msg); in main() 79 if (!soup_auth_update (auth, msg, header)) { in main() 85 soup_auth_authenticate (auth, username, "password"); in main() 86 header = soup_auth_get_authorization (auth, msg); in main() 100 g_clear_object (&auth); in main()
|
/third_party/glib/gio/ |
D | gdbusauth.c | 113 GDBusAuth *auth = G_DBUS_AUTH (object); in G_DEFINE_TYPE_WITH_PRIVATE() local 115 if (auth->priv->stream != NULL) in G_DEFINE_TYPE_WITH_PRIVATE() 116 g_object_unref (auth->priv->stream); in G_DEFINE_TYPE_WITH_PRIVATE() 117 g_list_free_full (auth->priv->available_mechanisms, (GDestroyNotify) mechanism_free); in G_DEFINE_TYPE_WITH_PRIVATE() 129 GDBusAuth *auth = G_DBUS_AUTH (object); in _g_dbus_auth_get_property() local 134 g_value_set_object (value, auth->priv->stream); in _g_dbus_auth_get_property() 149 GDBusAuth *auth = G_DBUS_AUTH (object); in _g_dbus_auth_set_property() local 154 auth->priv->stream = g_value_dup_object (value); in _g_dbus_auth_set_property() 194 add_mechanism (GDBusAuth *auth, in add_mechanism() argument 208 auth->priv->available_mechanisms = g_list_prepend (auth->priv->available_mechanisms, m); in add_mechanism() [all …]
|