Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 25 of 673) sorted by relevance

12345678910>>...27

/external/wpa_supplicant_8/src/ap/
Ddpp_hostapd.c40 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_qr_code() local
46 if (auth && auth->response_pending && in hostapd_dpp_qr_code()
47 dpp_notify_new_qr_code(auth, bi) == 1) { in hostapd_dpp_qr_code()
52 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_qr_code()
54 hostapd_drv_send_action(hapd, auth->curr_freq, 0, in hostapd_dpp_qr_code()
55 auth->peer_mac_addr, in hostapd_dpp_qr_code()
68 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_auth_resp_retry_timeout() local
70 if (!auth || !auth->resp_msg) in hostapd_dpp_auth_resp_retry_timeout()
77 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_auth_resp_retry_timeout()
79 hostapd_drv_send_action(hapd, auth->curr_freq, 500, auth->peer_mac_addr, in hostapd_dpp_auth_resp_retry_timeout()
[all …]
/external/wpa_supplicant_8/src/common/
Ddpp.c557 static void dpp_auth_fail(struct dpp_authentication *auth, const char *txt) in dpp_auth_fail() argument
559 wpa_msg(auth->msg_ctx, MSG_INFO, DPP_EVENT_FAIL "%s", txt); in dpp_auth_fail()
1434 static int dpp_derive_ke(struct dpp_authentication *auth, u8 *ke, in dpp_derive_ke() argument
1446 if (!auth->Mx_len || !auth->Nx_len) { in dpp_derive_ke()
1455 nonce_len = auth->curve->nonce_len; in dpp_derive_ke()
1456 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_ke()
1457 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_ke()
1458 addr[num_elem] = auth->Mx; in dpp_derive_ke()
1459 len[num_elem] = auth->Mx_len; in dpp_derive_ke()
1461 addr[num_elem] = auth->Nx; in dpp_derive_ke()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Ddpp_supplicant.c65 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_qr_code() local
71 if (auth && auth->response_pending && in wpas_dpp_qr_code()
72 dpp_notify_new_qr_code(auth, bi) == 1) { in wpas_dpp_qr_code()
77 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in wpas_dpp_qr_code()
79 offchannel_send_action(wpa_s, auth->curr_freq, in wpas_dpp_qr_code()
80 auth->peer_mac_addr, wpa_s->own_addr, in wpas_dpp_qr_code()
82 wpabuf_head(auth->resp_msg), in wpas_dpp_qr_code()
83 wpabuf_len(auth->resp_msg), in wpas_dpp_qr_code()
94 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_auth_resp_retry_timeout() local
96 if (!auth || !auth->resp_msg) in wpas_dpp_auth_resp_retry_timeout()
[all …]
Dwpa_priv.c245 struct privsep_cmd_authenticate *auth; in wpa_priv_cmd_authenticate() local
251 if (len < sizeof(*auth)) { in wpa_priv_cmd_authenticate()
256 auth = buf; in wpa_priv_cmd_authenticate()
257 if (sizeof(*auth) + auth->ie_len + auth->auth_data_len > len) { in wpa_priv_cmd_authenticate()
263 params.freq = auth->freq; in wpa_priv_cmd_authenticate()
264 params.bssid = auth->bssid; in wpa_priv_cmd_authenticate()
265 params.ssid = auth->ssid; in wpa_priv_cmd_authenticate()
266 if (auth->ssid_len > SSID_MAX_LEN) in wpa_priv_cmd_authenticate()
268 params.ssid_len = auth->ssid_len; in wpa_priv_cmd_authenticate()
269 params.auth_alg = auth->auth_alg; in wpa_priv_cmd_authenticate()
[all …]
Dibss_rsn.c42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free()
358 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta()
455 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init()
456 if (peer->auth == NULL) { in ibss_rsn_auth_init()
462 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init()
473 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init()
476 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init()
485 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local
486 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth.u.auth); in ibss_rsn_send_auth()
492 os_memset(&auth, 0, sizeof(auth)); in ibss_rsn_send_auth()
[all …]
/external/tcpdump/tests/
Dhsrp_2-v.out2 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
4 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
6 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
8 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
12 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
16 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
18 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
28 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
30 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
[all …]
Dhsrp_1-v.out2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
4 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
12 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
14 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
18 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
20 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
[all …]
Dhsrp_3-v.out2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
12 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
14 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
16 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
20 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
24 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
[all …]
/external/ppp/pppd/plugins/radius/
Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument
42 buf = auth->data; in rc_pack_list()
107 vector = (char *)auth->vector; in rc_pack_list()
143 memcpy ((char *) md5buf + secretlen, (char *) auth->vector, in rc_pack_list()
200 AUTH_HDR *auth, *recv_auth; in rc_send_server() local
262 auth = (AUTH_HDR *) send_buffer; in rc_send_server()
263 auth->code = data->code; in rc_send_server()
264 auth->id = data->seq_nbr; in rc_send_server()
268 total_length = rc_pack_list(data->send_pairs, secret, auth) + AUTH_HDR_LEN; in rc_send_server()
270 auth->length = htons ((unsigned short) total_length); in rc_send_server()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp72 int auth, encr = 0; in paramsFromScanResults() local
74 auth = AUTH_WPA2_EAP; in paramsFromScanResults()
76 auth = AUTH_WPA_EAP; in paramsFromScanResults()
78 auth = AUTH_WPA2_PSK; in paramsFromScanResults()
80 auth = AUTH_WPA_PSK; in paramsFromScanResults()
82 auth = AUTH_NONE_OPEN; in paramsFromScanResults()
90 if (auth == AUTH_NONE_OPEN) in paramsFromScanResults()
91 auth = AUTH_NONE_WEP; in paramsFromScanResults()
95 authSelect->setCurrentIndex(auth); in paramsFromScanResults()
96 authChanged(auth); in paramsFromScanResults()
[all …]
/external/python/google-api-python-client/googleapiclient/
D_auth.py20 import google.auth
21 import google.auth.credentials
42 credentials, _ = google.auth.default()
66 credentials, google.auth.credentials.Credentials):
67 return google.auth.credentials.with_scopes_if_required(
94 credentials, google.auth.credentials.Credentials):
114 credentials, google.auth.credentials.Credentials):
130 credentials, google.auth.credentials.Credentials):
/external/selinux/policycoreutils/newrole/
Dnewrole.pamd3 # auth sufficient pam_rootok.so
4 auth include system-auth
5 account include system-auth
6 password include system-auth
7 session include system-auth
Dnewrole-lspp.pamd2 auth include system-auth
3 account include system-auth
4 password include system-auth
/external/selinux/policycoreutils/run_init/
Drun_init.pamd3 #auth sufficient pam_rootok.so
4 auth include system-auth
5 account include system-auth
6 password include system-auth
7 session include system-auth
/external/ipsec-tools/
Dsetup.c314 int auth, int hash, int encryption, int length) in add_proposal() argument
321 p->authmethod = auth; in add_proposal()
421 int auth; in setup() local
464 auth = OAKLEY_ATTR_AUTH_METHOD_PSKEY; in setup()
470 auth = OAKLEY_ATTR_AUTH_METHOD_RSASIG; in setup()
478 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I; in setup()
482 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_RSASIG_I; in setup()
486 auth = OAKLEY_ATTR_AUTH_METHOD_HYBRID_RSA_I; in setup()
507 add_proposal(remoteconf, auth, in setup()
509 add_proposal(remoteconf, auth, in setup()
[all …]
/external/apache-http/src/org/apache/http/impl/auth/
DNTLMScheme.java31 package org.apache.http.impl.auth;
35 import org.apache.http.auth.AUTH;
36 import org.apache.http.auth.AuthenticationException;
37 import org.apache.http.auth.Credentials;
38 import org.apache.http.auth.InvalidCredentialsException;
39 import org.apache.http.auth.MalformedChallengeException;
40 import org.apache.http.auth.NTCredentials;
41 import org.apache.http.impl.auth.AuthSchemeBase;
DBasicScheme.java31 package org.apache.http.impl.auth;
36 import org.apache.http.auth.AuthenticationException;
37 import org.apache.http.auth.Credentials;
38 import org.apache.http.auth.AUTH;
39 import org.apache.http.auth.MalformedChallengeException;
40 import org.apache.http.auth.params.AuthParams;
/external/openssh/contrib/redhat/
Dsshd.pam2 auth required pam_stack.so service=system-auth
4 account required pam_stack.so service=system-auth
5 password required pam_stack.so service=system-auth
6 session required pam_stack.so service=system-auth
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/http/
DAuthenticatorAdapter.java47 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticate() local
50 if (auth == null) continue; in authenticate()
52 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticate()
70 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticateProxy() local
74 if (auth == null) continue; in authenticateProxy()
76 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticateProxy()
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
DAuthenticatorAdapter.java45 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticate() local
48 if (auth == null) continue; in authenticate()
50 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticate()
68 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticateProxy() local
72 if (auth == null) continue; in authenticateProxy()
74 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticateProxy()
/external/grpc-grpc/doc/
Dserver_side_auth.md10 The authentication context is structured as a multi-map of key-value pairs - the *auth properties*.…
12 The contents of the *auth properties* are populated by an *auth interceptor*. The interceptor also …
20 Populated auth properties:
42 Auth interceptors are gRPC components that populate contents of the auth context based on gRPC's in…
46 There are legitimate uses for custom interceptors but you should keep in mind that as auth intercep…
48 #### Available auth interceptors
50 - (coming soon) JWT auth token authentication
54 C-core exposes low level API to access auth context contents and to implement an auth interceptor.
55 In C++, the auth interceptor API is exposed as `AuthMetadataProcessor`.
/external/wpa_supplicant_8/src/crypto/
Daes-ccm.c117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument
127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth()
128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth()
132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument
137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth()
142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth()
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument
169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae()
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument
196 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()
/external/curl/tests/data/
Dtest12866 HTTP Digest auth
16 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144", qop="auth"
40 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144", qop="auth"
84 # Since regular and SSPI digest auth header fields may not have the same order
88 # - Remove quotes from qop="auth" used by SSPI
91 …/=]+"$/$1REMOVED/; s/^(response=)"[a-f0-9]{32}"$/$1REMOVED/; s/^qop="auth"$/qop=auth/; $_ } sort s…
100 Authorization: Digest cnonce=REMOVED, nc=00000001, nonce="1053604144", qop=auth, realm="testrealm",…
105 Authorization: Digest cnonce=REMOVED, nc=00000002, nonce="1053604144", qop=auth, realm="testrealm",…
Dtest20276 HTTP Digest auth
18 new response just as a duplicate and it sends another and detects the auth
23 <!-- First request has Digest auth, wrong password -->
25 HTTP/1.1 401 Need Digest auth
44 <!-- Second request has Digest auth, right password -->
46 HTTP/1.1 401 Need Digest auth (2)
64 <!-- Third request has Digest auth, wrong password -->
66 HTTP/1.1 401 Need Digest auth (3)
85 <!-- Fourth request has Digest auth, wrong password -->
87 HTTP/1.1 401 Need Digest auth (4)
[all …]
/external/u-boot/drivers/tpm/
Dtpm2_tis_sandbox.c69 const u8 **auth, in sandbox_tpm2_check_session() argument
100 handle = get_unaligned_be32(*auth); in sandbox_tpm2_check_session()
101 *auth += sizeof(handle); in sandbox_tpm2_check_session()
136 auth_sz = get_unaligned_be32(*auth); in sandbox_tpm2_check_session()
137 *auth += sizeof(auth_sz); in sandbox_tpm2_check_session()
139 session_handle = get_unaligned_be32(*auth); in sandbox_tpm2_check_session()
140 *auth += sizeof(session_handle); in sandbox_tpm2_check_session()
146 nonce_sz = get_unaligned_be16(*auth); in sandbox_tpm2_check_session()
147 *auth += sizeof(nonce_sz); in sandbox_tpm2_check_session()
154 *auth += sizeof(u8); in sandbox_tpm2_check_session()
[all …]

12345678910>>...27