/external/wpa_supplicant_8/src/common/ |
D | dpp_auth.c | 42 static void dpp_auth_success(struct dpp_authentication *auth) in dpp_auth_success() argument 46 os_memset(auth->Mx, 0, sizeof(auth->Mx)); in dpp_auth_success() 47 auth->Mx_len = 0; in dpp_auth_success() 48 os_memset(auth->Nx, 0, sizeof(auth->Nx)); in dpp_auth_success() 49 auth->Nx_len = 0; in dpp_auth_success() 50 os_memset(auth->Lx, 0, sizeof(auth->Lx)); in dpp_auth_success() 51 auth->Lx_len = 0; in dpp_auth_success() 52 os_memset(auth->k1, 0, sizeof(auth->k1)); in dpp_auth_success() 53 os_memset(auth->k2, 0, sizeof(auth->k2)); in dpp_auth_success() 55 auth->auth_success = 1; in dpp_auth_success() [all …]
|
D | dpp_reconfig.c | 84 static struct wpabuf * dpp_reconfig_build_req(struct dpp_authentication *auth) in dpp_reconfig_build_req() argument 90 attr_len = 4 + 1 + 4 + 1 + 4 + os_strlen(auth->conf->connector) + in dpp_reconfig_build_req() 91 4 + auth->curve->nonce_len; in dpp_reconfig_build_req() 99 wpabuf_put_u8(msg, auth->transaction_id); in dpp_reconfig_build_req() 108 wpabuf_put_le16(msg, os_strlen(auth->conf->connector)); in dpp_reconfig_build_req() 109 wpabuf_put_str(msg, auth->conf->connector); in dpp_reconfig_build_req() 113 wpabuf_put_le16(msg, auth->curve->nonce_len); in dpp_reconfig_build_req() 114 wpabuf_put_data(msg, auth->i_nonce, auth->curve->nonce_len); in dpp_reconfig_build_req() 177 struct dpp_authentication *auth; in dpp_reconfig_init() local 179 auth = dpp_alloc_auth(dpp, msg_ctx); in dpp_reconfig_init() [all …]
|
D | dpp.c | 57 void dpp_auth_fail(struct dpp_authentication *auth, const char *txt) in dpp_auth_fail() argument 59 wpa_msg(auth->msg_ctx, MSG_INFO, DPP_EVENT_FAIL "%s", txt); in dpp_auth_fail() 503 static int dpp_channel_intersect(struct dpp_authentication *auth, in dpp_channel_intersect() argument 507 struct dpp_bootstrap_info *peer_bi = auth->peer_bi; in dpp_channel_intersect() 512 if (freq_included(auth->freq, auth->num_freq, freq)) in dpp_channel_intersect() 515 auth->freq[auth->num_freq++] = freq; in dpp_channel_intersect() 517 if (!auth->num_freq) { in dpp_channel_intersect() 522 auth->curr_freq = auth->freq[0]; in dpp_channel_intersect() 527 static int dpp_channel_local_list(struct dpp_authentication *auth, in dpp_channel_local_list() argument 535 auth->num_freq = 0; in dpp_channel_local_list() [all …]
|
D | dpp_tcp.c | 27 struct dpp_authentication *auth; member 86 dpp_auth_deinit(conn->auth); in dpp_connection_free() 141 struct dpp_authentication *auth = conn->auth; in dpp_controller_gas_done() local 144 if (auth->peer_version >= 2 && in dpp_controller_gas_done() 145 auth->conf_resp_status == DPP_STATUS_OK) { in dpp_controller_gas_done() 147 auth->waiting_conf_result = 1; in dpp_controller_gas_done() 154 msg_ctx = auth->msg_ctx; in dpp_controller_gas_done() 204 } else if (conn->auth && (conn->ctrl || conn->auth->configurator) && in dpp_tcp_send() 244 struct dpp_authentication *auth = conn->auth; in dpp_controller_start_gas_client() local 248 buf = dpp_build_conf_req_helper(auth, "Test", netrole_ap, NULL, NULL); in dpp_controller_start_gas_client() [all …]
|
D | dpp_crypto.c | 814 int dpp_derive_bk_ke(struct dpp_authentication *auth) in dpp_derive_bk_ke() argument 816 unsigned int hash_len = auth->curve->hash_len; in dpp_derive_bk_ke() 817 size_t nonce_len = auth->curve->nonce_len; in dpp_derive_bk_ke() 825 if (!auth->Mx_len || !auth->Nx_len) { in dpp_derive_bk_ke() 832 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_bk_ke() 833 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_bk_ke() 834 addr[num_elem] = auth->Mx; in dpp_derive_bk_ke() 835 len[num_elem] = auth->Mx_len; in dpp_derive_bk_ke() 837 addr[num_elem] = auth->Nx; in dpp_derive_bk_ke() 838 len[num_elem] = auth->Nx_len; in dpp_derive_bk_ke() [all …]
|
D | dpp_i.h | 24 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth); 44 int dpp_prepare_channel_list(struct dpp_authentication *auth, 47 void dpp_auth_fail(struct dpp_authentication *auth, const char *txt); 55 struct wpabuf * dpp_build_enveloped_data(struct dpp_authentication *auth); 56 int dpp_conf_resp_env_data(struct dpp_authentication *auth, 106 int dpp_derive_bk_ke(struct dpp_authentication *auth); 107 int dpp_gen_r_auth(struct dpp_authentication *auth, u8 *r_auth); 108 int dpp_gen_i_auth(struct dpp_authentication *auth, u8 *i_auth); 109 int dpp_auth_derive_l_responder(struct dpp_authentication *auth); 110 int dpp_auth_derive_l_initiator(struct dpp_authentication *auth); [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | dpp_supplicant.c | 70 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_qr_code() local 76 if (auth && auth->response_pending && in wpas_dpp_qr_code() 77 dpp_notify_new_qr_code(auth, bi) == 1) { in wpas_dpp_qr_code() 82 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in wpas_dpp_qr_code() 84 offchannel_send_action(wpa_s, auth->curr_freq, in wpas_dpp_qr_code() 85 auth->peer_mac_addr, wpa_s->own_addr, in wpas_dpp_qr_code() 87 wpabuf_head(auth->resp_msg), in wpas_dpp_qr_code() 88 wpabuf_len(auth->resp_msg), in wpas_dpp_qr_code() 184 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_auth_resp_retry_timeout() local 186 if (!auth || !auth->resp_msg) in wpas_dpp_auth_resp_retry_timeout() [all …]
|
D | wpa_priv.c | 245 struct privsep_cmd_authenticate *auth; in wpa_priv_cmd_authenticate() local 251 if (len < sizeof(*auth)) { in wpa_priv_cmd_authenticate() 256 auth = buf; in wpa_priv_cmd_authenticate() 257 if (sizeof(*auth) + auth->ie_len + auth->auth_data_len > len) { in wpa_priv_cmd_authenticate() 263 params.freq = auth->freq; in wpa_priv_cmd_authenticate() 264 params.bssid = auth->bssid; in wpa_priv_cmd_authenticate() 265 params.ssid = auth->ssid; in wpa_priv_cmd_authenticate() 266 if (auth->ssid_len > SSID_MAX_LEN) in wpa_priv_cmd_authenticate() 268 params.ssid_len = auth->ssid_len; in wpa_priv_cmd_authenticate() 269 params.auth_alg = auth->auth_alg; in wpa_priv_cmd_authenticate() [all …]
|
D | ibss_rsn.c | 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 377 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta() 474 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init() 475 if (peer->auth == NULL) { in ibss_rsn_auth_init() 481 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init() 492 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init() 495 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init() 504 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local 505 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth.u.auth); in ibss_rsn_send_auth() 508 os_memset(&auth, 0, sizeof(auth)); in ibss_rsn_send_auth() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | dpp_hostapd.c | 46 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_qr_code() local 52 if (auth && auth->response_pending && in hostapd_dpp_qr_code() 53 dpp_notify_new_qr_code(auth, bi) == 1) { in hostapd_dpp_qr_code() 58 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_qr_code() 60 hostapd_drv_send_action(hapd, auth->curr_freq, 0, in hostapd_dpp_qr_code() 61 auth->peer_mac_addr, in hostapd_dpp_qr_code() 157 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_auth_resp_retry_timeout() local 159 if (!auth || !auth->resp_msg) in hostapd_dpp_auth_resp_retry_timeout() 166 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_auth_resp_retry_timeout() 168 hostapd_drv_send_action(hapd, auth->curr_freq, 500, auth->peer_mac_addr, in hostapd_dpp_auth_resp_retry_timeout() [all …]
|
/external/tcpdump/tests/ |
D | hsrp_1-v.out | 2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 4 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 12 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 14 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 18 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 20 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" [all …]
|
D | hsrp_2-v.out | 2 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 4 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 6 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 8 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 12 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 16 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 18 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 28 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 30 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" [all …]
|
D | hsrp_3-v.out | 2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 12 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 14 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 16 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 20 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 24 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" [all …]
|
/external/ppp/pppd/plugins/radius/ |
D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument 42 buf = auth->data; in rc_pack_list() 107 vector = (char *)auth->vector; in rc_pack_list() 143 memcpy ((char *) md5buf + secretlen, (char *) auth->vector, in rc_pack_list() 200 AUTH_HDR *auth, *recv_auth; in rc_send_server() local 262 auth = (AUTH_HDR *) send_buffer; in rc_send_server() 263 auth->code = data->code; in rc_send_server() 264 auth->id = data->seq_nbr; in rc_send_server() 268 total_length = rc_pack_list(data->send_pairs, secret, auth) + AUTH_HDR_LEN; in rc_send_server() 270 auth->length = htons ((unsigned short) total_length); in rc_send_server() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 72 int auth, encr = 0; in paramsFromScanResults() local 74 auth = AUTH_WPA2_EAP; in paramsFromScanResults() 76 auth = AUTH_WPA_EAP; in paramsFromScanResults() 78 auth = AUTH_WPA2_PSK; in paramsFromScanResults() 80 auth = AUTH_WPA_PSK; in paramsFromScanResults() 82 auth = AUTH_NONE_OPEN; in paramsFromScanResults() 90 if (auth == AUTH_NONE_OPEN) in paramsFromScanResults() 91 auth = AUTH_NONE_WEP; in paramsFromScanResults() 95 authSelect->setCurrentIndex(auth); in paramsFromScanResults() 96 authChanged(auth); in paramsFromScanResults() [all …]
|
/external/selinux/policycoreutils/newrole/ |
D | newrole.pamd | 3 # auth sufficient pam_rootok.so 4 auth include system-auth 5 account include system-auth 6 password include system-auth 7 session include system-auth
|
D | newrole-lspp.pamd | 2 auth include system-auth 3 account include system-auth 4 password include system-auth
|
/external/selinux/policycoreutils/run_init/ |
D | run_init.pamd | 3 #auth sufficient pam_rootok.so 4 auth include system-auth 5 account include system-auth 6 password include system-auth 7 session include system-auth
|
/external/python/google-api-python-client/googleapiclient/ |
D | _auth.py | 20 import google.auth 21 import google.auth.credentials 42 credentials, _ = google.auth.default() 66 credentials, google.auth.credentials.Credentials): 67 return google.auth.credentials.with_scopes_if_required( 94 credentials, google.auth.credentials.Credentials): 114 credentials, google.auth.credentials.Credentials): 130 credentials, google.auth.credentials.Credentials):
|
/external/ipsec-tools/ |
D | setup.c | 314 int auth, int hash, int encryption, int length) in add_proposal() argument 321 p->authmethod = auth; in add_proposal() 421 int auth; in setup() local 464 auth = OAKLEY_ATTR_AUTH_METHOD_PSKEY; in setup() 470 auth = OAKLEY_ATTR_AUTH_METHOD_RSASIG; in setup() 478 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I; in setup() 482 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_RSASIG_I; in setup() 486 auth = OAKLEY_ATTR_AUTH_METHOD_HYBRID_RSA_I; in setup() 507 add_proposal(remoteconf, auth, in setup() 509 add_proposal(remoteconf, auth, in setup() [all …]
|
/external/openssh/contrib/redhat/ |
D | sshd.pam | 2 auth required pam_stack.so service=system-auth 4 account required pam_stack.so service=system-auth 5 password required pam_stack.so service=system-auth 6 session required pam_stack.so service=system-auth
|
/external/apache-http/src/org/apache/http/impl/auth/ |
D | NTLMScheme.java | 31 package org.apache.http.impl.auth; 35 import org.apache.http.auth.AUTH; 36 import org.apache.http.auth.AuthenticationException; 37 import org.apache.http.auth.Credentials; 38 import org.apache.http.auth.InvalidCredentialsException; 39 import org.apache.http.auth.MalformedChallengeException; 40 import org.apache.http.auth.NTCredentials; 41 import org.apache.http.impl.auth.AuthSchemeBase;
|
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/http/ |
D | AuthenticatorAdapter.java | 47 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticate() local 50 if (auth == null) continue; in authenticate() 52 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticate() 70 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticateProxy() local 74 if (auth == null) continue; in authenticateProxy() 76 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticateProxy()
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
D | AuthenticatorAdapter.java | 45 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticate() local 48 if (auth == null) continue; in authenticate() 50 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticate() 68 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticateProxy() local 72 if (auth == null) continue; in authenticateProxy() 74 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticateProxy()
|
/external/linux-kselftest/tools/testing/selftests/tpm2/ |
D | tpm2_tests.py | 24 auth = 'A' * 15 26 blob = self.client.seal(self.root_key, data, auth, None) 27 result = self.client.unseal(self.root_key, blob, auth, None) 34 auth = 'A' * 15 45 blob = self.client.seal(self.root_key, data, auth, policy_dig) 53 result = self.client.unseal(self.root_key, blob, auth, handle) 62 auth = 'A' * 20 65 blob = self.client.seal(self.root_key, data, auth, None) 67 result = self.client.unseal(self.root_key, blob, auth[:-1] + 'B', None) 77 auth = 'A' * 17 [all …]
|