/external/wpa_supplicant_8/src/ap/ |
D | dpp_hostapd.c | 40 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_qr_code() local 46 if (auth && auth->response_pending && in hostapd_dpp_qr_code() 47 dpp_notify_new_qr_code(auth, bi) == 1) { in hostapd_dpp_qr_code() 52 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_qr_code() 54 hostapd_drv_send_action(hapd, auth->curr_freq, 0, in hostapd_dpp_qr_code() 55 auth->peer_mac_addr, in hostapd_dpp_qr_code() 68 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_auth_resp_retry_timeout() local 70 if (!auth || !auth->resp_msg) in hostapd_dpp_auth_resp_retry_timeout() 77 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_auth_resp_retry_timeout() 79 hostapd_drv_send_action(hapd, auth->curr_freq, 500, auth->peer_mac_addr, in hostapd_dpp_auth_resp_retry_timeout() [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | dpp.c | 557 static void dpp_auth_fail(struct dpp_authentication *auth, const char *txt) in dpp_auth_fail() argument 559 wpa_msg(auth->msg_ctx, MSG_INFO, DPP_EVENT_FAIL "%s", txt); in dpp_auth_fail() 1434 static int dpp_derive_ke(struct dpp_authentication *auth, u8 *ke, in dpp_derive_ke() argument 1446 if (!auth->Mx_len || !auth->Nx_len) { in dpp_derive_ke() 1455 nonce_len = auth->curve->nonce_len; in dpp_derive_ke() 1456 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_ke() 1457 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_ke() 1458 addr[num_elem] = auth->Mx; in dpp_derive_ke() 1459 len[num_elem] = auth->Mx_len; in dpp_derive_ke() 1461 addr[num_elem] = auth->Nx; in dpp_derive_ke() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | dpp_supplicant.c | 65 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_qr_code() local 71 if (auth && auth->response_pending && in wpas_dpp_qr_code() 72 dpp_notify_new_qr_code(auth, bi) == 1) { in wpas_dpp_qr_code() 77 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in wpas_dpp_qr_code() 79 offchannel_send_action(wpa_s, auth->curr_freq, in wpas_dpp_qr_code() 80 auth->peer_mac_addr, wpa_s->own_addr, in wpas_dpp_qr_code() 82 wpabuf_head(auth->resp_msg), in wpas_dpp_qr_code() 83 wpabuf_len(auth->resp_msg), in wpas_dpp_qr_code() 94 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_auth_resp_retry_timeout() local 96 if (!auth || !auth->resp_msg) in wpas_dpp_auth_resp_retry_timeout() [all …]
|
D | wpa_priv.c | 245 struct privsep_cmd_authenticate *auth; in wpa_priv_cmd_authenticate() local 251 if (len < sizeof(*auth)) { in wpa_priv_cmd_authenticate() 256 auth = buf; in wpa_priv_cmd_authenticate() 257 if (sizeof(*auth) + auth->ie_len + auth->auth_data_len > len) { in wpa_priv_cmd_authenticate() 263 params.freq = auth->freq; in wpa_priv_cmd_authenticate() 264 params.bssid = auth->bssid; in wpa_priv_cmd_authenticate() 265 params.ssid = auth->ssid; in wpa_priv_cmd_authenticate() 266 if (auth->ssid_len > SSID_MAX_LEN) in wpa_priv_cmd_authenticate() 268 params.ssid_len = auth->ssid_len; in wpa_priv_cmd_authenticate() 269 params.auth_alg = auth->auth_alg; in wpa_priv_cmd_authenticate() [all …]
|
D | ibss_rsn.c | 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 358 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta() 455 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init() 456 if (peer->auth == NULL) { in ibss_rsn_auth_init() 462 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init() 473 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init() 476 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init() 485 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local 486 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth.u.auth); in ibss_rsn_send_auth() 492 os_memset(&auth, 0, sizeof(auth)); in ibss_rsn_send_auth() [all …]
|
/external/tcpdump/tests/ |
D | hsrp_2-v.out | 2 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 4 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 6 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 8 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 12 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 16 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 18 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 28 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 30 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" [all …]
|
D | hsrp_1-v.out | 2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 4 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 12 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 14 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 18 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 20 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" [all …]
|
D | hsrp_3-v.out | 2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 12 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 14 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 16 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 20 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 24 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" [all …]
|
/external/ppp/pppd/plugins/radius/ |
D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument 42 buf = auth->data; in rc_pack_list() 107 vector = (char *)auth->vector; in rc_pack_list() 143 memcpy ((char *) md5buf + secretlen, (char *) auth->vector, in rc_pack_list() 200 AUTH_HDR *auth, *recv_auth; in rc_send_server() local 262 auth = (AUTH_HDR *) send_buffer; in rc_send_server() 263 auth->code = data->code; in rc_send_server() 264 auth->id = data->seq_nbr; in rc_send_server() 268 total_length = rc_pack_list(data->send_pairs, secret, auth) + AUTH_HDR_LEN; in rc_send_server() 270 auth->length = htons ((unsigned short) total_length); in rc_send_server() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 72 int auth, encr = 0; in paramsFromScanResults() local 74 auth = AUTH_WPA2_EAP; in paramsFromScanResults() 76 auth = AUTH_WPA_EAP; in paramsFromScanResults() 78 auth = AUTH_WPA2_PSK; in paramsFromScanResults() 80 auth = AUTH_WPA_PSK; in paramsFromScanResults() 82 auth = AUTH_NONE_OPEN; in paramsFromScanResults() 90 if (auth == AUTH_NONE_OPEN) in paramsFromScanResults() 91 auth = AUTH_NONE_WEP; in paramsFromScanResults() 95 authSelect->setCurrentIndex(auth); in paramsFromScanResults() 96 authChanged(auth); in paramsFromScanResults() [all …]
|
/external/python/google-api-python-client/googleapiclient/ |
D | _auth.py | 20 import google.auth 21 import google.auth.credentials 42 credentials, _ = google.auth.default() 66 credentials, google.auth.credentials.Credentials): 67 return google.auth.credentials.with_scopes_if_required( 94 credentials, google.auth.credentials.Credentials): 114 credentials, google.auth.credentials.Credentials): 130 credentials, google.auth.credentials.Credentials):
|
/external/selinux/policycoreutils/newrole/ |
D | newrole.pamd | 3 # auth sufficient pam_rootok.so 4 auth include system-auth 5 account include system-auth 6 password include system-auth 7 session include system-auth
|
D | newrole-lspp.pamd | 2 auth include system-auth 3 account include system-auth 4 password include system-auth
|
/external/selinux/policycoreutils/run_init/ |
D | run_init.pamd | 3 #auth sufficient pam_rootok.so 4 auth include system-auth 5 account include system-auth 6 password include system-auth 7 session include system-auth
|
/external/ipsec-tools/ |
D | setup.c | 314 int auth, int hash, int encryption, int length) in add_proposal() argument 321 p->authmethod = auth; in add_proposal() 421 int auth; in setup() local 464 auth = OAKLEY_ATTR_AUTH_METHOD_PSKEY; in setup() 470 auth = OAKLEY_ATTR_AUTH_METHOD_RSASIG; in setup() 478 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I; in setup() 482 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_RSASIG_I; in setup() 486 auth = OAKLEY_ATTR_AUTH_METHOD_HYBRID_RSA_I; in setup() 507 add_proposal(remoteconf, auth, in setup() 509 add_proposal(remoteconf, auth, in setup() [all …]
|
/external/apache-http/src/org/apache/http/impl/auth/ |
D | NTLMScheme.java | 31 package org.apache.http.impl.auth; 35 import org.apache.http.auth.AUTH; 36 import org.apache.http.auth.AuthenticationException; 37 import org.apache.http.auth.Credentials; 38 import org.apache.http.auth.InvalidCredentialsException; 39 import org.apache.http.auth.MalformedChallengeException; 40 import org.apache.http.auth.NTCredentials; 41 import org.apache.http.impl.auth.AuthSchemeBase;
|
D | BasicScheme.java | 31 package org.apache.http.impl.auth; 36 import org.apache.http.auth.AuthenticationException; 37 import org.apache.http.auth.Credentials; 38 import org.apache.http.auth.AUTH; 39 import org.apache.http.auth.MalformedChallengeException; 40 import org.apache.http.auth.params.AuthParams;
|
/external/openssh/contrib/redhat/ |
D | sshd.pam | 2 auth required pam_stack.so service=system-auth 4 account required pam_stack.so service=system-auth 5 password required pam_stack.so service=system-auth 6 session required pam_stack.so service=system-auth
|
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/http/ |
D | AuthenticatorAdapter.java | 47 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticate() local 50 if (auth == null) continue; in authenticate() 52 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticate() 70 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticateProxy() local 74 if (auth == null) continue; in authenticateProxy() 76 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticateProxy()
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
D | AuthenticatorAdapter.java | 45 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticate() local 48 if (auth == null) continue; in authenticate() 50 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticate() 68 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticateProxy() local 72 if (auth == null) continue; in authenticateProxy() 74 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticateProxy()
|
/external/grpc-grpc/doc/ |
D | server_side_auth.md | 10 The authentication context is structured as a multi-map of key-value pairs - the *auth properties*.… 12 The contents of the *auth properties* are populated by an *auth interceptor*. The interceptor also … 20 Populated auth properties: 42 Auth interceptors are gRPC components that populate contents of the auth context based on gRPC's in… 46 There are legitimate uses for custom interceptors but you should keep in mind that as auth intercep… 48 #### Available auth interceptors 50 - (coming soon) JWT auth token authentication 54 C-core exposes low level API to access auth context contents and to implement an auth interceptor. 55 In C++, the auth interceptor API is exposed as `AuthMetadataProcessor`.
|
/external/wpa_supplicant_8/src/crypto/ |
D | aes-ccm.c | 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument 127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth() 132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument 137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth() 142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae() 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument 196 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()
|
/external/curl/tests/data/ |
D | test1286 | 6 HTTP Digest auth 16 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144", qop="auth" 40 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144", qop="auth" 84 # Since regular and SSPI digest auth header fields may not have the same order 88 # - Remove quotes from qop="auth" used by SSPI 91 …/=]+"$/$1REMOVED/; s/^(response=)"[a-f0-9]{32}"$/$1REMOVED/; s/^qop="auth"$/qop=auth/; $_ } sort s… 100 Authorization: Digest cnonce=REMOVED, nc=00000001, nonce="1053604144", qop=auth, realm="testrealm",… 105 Authorization: Digest cnonce=REMOVED, nc=00000002, nonce="1053604144", qop=auth, realm="testrealm",…
|
D | test2027 | 6 HTTP Digest auth 18 new response just as a duplicate and it sends another and detects the auth 23 <!-- First request has Digest auth, wrong password --> 25 HTTP/1.1 401 Need Digest auth 44 <!-- Second request has Digest auth, right password --> 46 HTTP/1.1 401 Need Digest auth (2) 64 <!-- Third request has Digest auth, wrong password --> 66 HTTP/1.1 401 Need Digest auth (3) 85 <!-- Fourth request has Digest auth, wrong password --> 87 HTTP/1.1 401 Need Digest auth (4) [all …]
|
/external/u-boot/drivers/tpm/ |
D | tpm2_tis_sandbox.c | 69 const u8 **auth, in sandbox_tpm2_check_session() argument 100 handle = get_unaligned_be32(*auth); in sandbox_tpm2_check_session() 101 *auth += sizeof(handle); in sandbox_tpm2_check_session() 136 auth_sz = get_unaligned_be32(*auth); in sandbox_tpm2_check_session() 137 *auth += sizeof(auth_sz); in sandbox_tpm2_check_session() 139 session_handle = get_unaligned_be32(*auth); in sandbox_tpm2_check_session() 140 *auth += sizeof(session_handle); in sandbox_tpm2_check_session() 146 nonce_sz = get_unaligned_be16(*auth); in sandbox_tpm2_check_session() 147 *auth += sizeof(nonce_sz); in sandbox_tpm2_check_session() 154 *auth += sizeof(u8); in sandbox_tpm2_check_session() [all …]
|