Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 25 of 697) sorted by relevance

12345678910>>...28

/external/wpa_supplicant_8/src/common/
Ddpp_auth.c42 static void dpp_auth_success(struct dpp_authentication *auth) in dpp_auth_success() argument
46 os_memset(auth->Mx, 0, sizeof(auth->Mx)); in dpp_auth_success()
47 auth->Mx_len = 0; in dpp_auth_success()
48 os_memset(auth->Nx, 0, sizeof(auth->Nx)); in dpp_auth_success()
49 auth->Nx_len = 0; in dpp_auth_success()
50 os_memset(auth->Lx, 0, sizeof(auth->Lx)); in dpp_auth_success()
51 auth->Lx_len = 0; in dpp_auth_success()
52 os_memset(auth->k1, 0, sizeof(auth->k1)); in dpp_auth_success()
53 os_memset(auth->k2, 0, sizeof(auth->k2)); in dpp_auth_success()
55 auth->auth_success = 1; in dpp_auth_success()
[all …]
Ddpp_reconfig.c84 static struct wpabuf * dpp_reconfig_build_req(struct dpp_authentication *auth) in dpp_reconfig_build_req() argument
90 attr_len = 4 + 1 + 4 + 1 + 4 + os_strlen(auth->conf->connector) + in dpp_reconfig_build_req()
91 4 + auth->curve->nonce_len; in dpp_reconfig_build_req()
99 wpabuf_put_u8(msg, auth->transaction_id); in dpp_reconfig_build_req()
108 wpabuf_put_le16(msg, os_strlen(auth->conf->connector)); in dpp_reconfig_build_req()
109 wpabuf_put_str(msg, auth->conf->connector); in dpp_reconfig_build_req()
113 wpabuf_put_le16(msg, auth->curve->nonce_len); in dpp_reconfig_build_req()
114 wpabuf_put_data(msg, auth->i_nonce, auth->curve->nonce_len); in dpp_reconfig_build_req()
177 struct dpp_authentication *auth; in dpp_reconfig_init() local
179 auth = dpp_alloc_auth(dpp, msg_ctx); in dpp_reconfig_init()
[all …]
Ddpp.c57 void dpp_auth_fail(struct dpp_authentication *auth, const char *txt) in dpp_auth_fail() argument
59 wpa_msg(auth->msg_ctx, MSG_INFO, DPP_EVENT_FAIL "%s", txt); in dpp_auth_fail()
503 static int dpp_channel_intersect(struct dpp_authentication *auth, in dpp_channel_intersect() argument
507 struct dpp_bootstrap_info *peer_bi = auth->peer_bi; in dpp_channel_intersect()
512 if (freq_included(auth->freq, auth->num_freq, freq)) in dpp_channel_intersect()
515 auth->freq[auth->num_freq++] = freq; in dpp_channel_intersect()
517 if (!auth->num_freq) { in dpp_channel_intersect()
522 auth->curr_freq = auth->freq[0]; in dpp_channel_intersect()
527 static int dpp_channel_local_list(struct dpp_authentication *auth, in dpp_channel_local_list() argument
535 auth->num_freq = 0; in dpp_channel_local_list()
[all …]
Ddpp_tcp.c27 struct dpp_authentication *auth; member
86 dpp_auth_deinit(conn->auth); in dpp_connection_free()
141 struct dpp_authentication *auth = conn->auth; in dpp_controller_gas_done() local
144 if (auth->peer_version >= 2 && in dpp_controller_gas_done()
145 auth->conf_resp_status == DPP_STATUS_OK) { in dpp_controller_gas_done()
147 auth->waiting_conf_result = 1; in dpp_controller_gas_done()
154 msg_ctx = auth->msg_ctx; in dpp_controller_gas_done()
204 } else if (conn->auth && (conn->ctrl || conn->auth->configurator) && in dpp_tcp_send()
244 struct dpp_authentication *auth = conn->auth; in dpp_controller_start_gas_client() local
248 buf = dpp_build_conf_req_helper(auth, "Test", netrole_ap, NULL, NULL); in dpp_controller_start_gas_client()
[all …]
Ddpp_crypto.c814 int dpp_derive_bk_ke(struct dpp_authentication *auth) in dpp_derive_bk_ke() argument
816 unsigned int hash_len = auth->curve->hash_len; in dpp_derive_bk_ke()
817 size_t nonce_len = auth->curve->nonce_len; in dpp_derive_bk_ke()
825 if (!auth->Mx_len || !auth->Nx_len) { in dpp_derive_bk_ke()
832 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_bk_ke()
833 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_bk_ke()
834 addr[num_elem] = auth->Mx; in dpp_derive_bk_ke()
835 len[num_elem] = auth->Mx_len; in dpp_derive_bk_ke()
837 addr[num_elem] = auth->Nx; in dpp_derive_bk_ke()
838 len[num_elem] = auth->Nx_len; in dpp_derive_bk_ke()
[all …]
Ddpp_i.h24 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth);
44 int dpp_prepare_channel_list(struct dpp_authentication *auth,
47 void dpp_auth_fail(struct dpp_authentication *auth, const char *txt);
55 struct wpabuf * dpp_build_enveloped_data(struct dpp_authentication *auth);
56 int dpp_conf_resp_env_data(struct dpp_authentication *auth,
106 int dpp_derive_bk_ke(struct dpp_authentication *auth);
107 int dpp_gen_r_auth(struct dpp_authentication *auth, u8 *r_auth);
108 int dpp_gen_i_auth(struct dpp_authentication *auth, u8 *i_auth);
109 int dpp_auth_derive_l_responder(struct dpp_authentication *auth);
110 int dpp_auth_derive_l_initiator(struct dpp_authentication *auth);
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Ddpp_supplicant.c70 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_qr_code() local
76 if (auth && auth->response_pending && in wpas_dpp_qr_code()
77 dpp_notify_new_qr_code(auth, bi) == 1) { in wpas_dpp_qr_code()
82 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in wpas_dpp_qr_code()
84 offchannel_send_action(wpa_s, auth->curr_freq, in wpas_dpp_qr_code()
85 auth->peer_mac_addr, wpa_s->own_addr, in wpas_dpp_qr_code()
87 wpabuf_head(auth->resp_msg), in wpas_dpp_qr_code()
88 wpabuf_len(auth->resp_msg), in wpas_dpp_qr_code()
184 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_auth_resp_retry_timeout() local
186 if (!auth || !auth->resp_msg) in wpas_dpp_auth_resp_retry_timeout()
[all …]
Dwpa_priv.c245 struct privsep_cmd_authenticate *auth; in wpa_priv_cmd_authenticate() local
251 if (len < sizeof(*auth)) { in wpa_priv_cmd_authenticate()
256 auth = buf; in wpa_priv_cmd_authenticate()
257 if (sizeof(*auth) + auth->ie_len + auth->auth_data_len > len) { in wpa_priv_cmd_authenticate()
263 params.freq = auth->freq; in wpa_priv_cmd_authenticate()
264 params.bssid = auth->bssid; in wpa_priv_cmd_authenticate()
265 params.ssid = auth->ssid; in wpa_priv_cmd_authenticate()
266 if (auth->ssid_len > SSID_MAX_LEN) in wpa_priv_cmd_authenticate()
268 params.ssid_len = auth->ssid_len; in wpa_priv_cmd_authenticate()
269 params.auth_alg = auth->auth_alg; in wpa_priv_cmd_authenticate()
[all …]
Dibss_rsn.c42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free()
377 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta()
474 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init()
475 if (peer->auth == NULL) { in ibss_rsn_auth_init()
481 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init()
492 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init()
495 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init()
504 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local
505 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth.u.auth); in ibss_rsn_send_auth()
508 os_memset(&auth, 0, sizeof(auth)); in ibss_rsn_send_auth()
[all …]
/external/wpa_supplicant_8/src/ap/
Ddpp_hostapd.c46 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_qr_code() local
52 if (auth && auth->response_pending && in hostapd_dpp_qr_code()
53 dpp_notify_new_qr_code(auth, bi) == 1) { in hostapd_dpp_qr_code()
58 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_qr_code()
60 hostapd_drv_send_action(hapd, auth->curr_freq, 0, in hostapd_dpp_qr_code()
61 auth->peer_mac_addr, in hostapd_dpp_qr_code()
157 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_auth_resp_retry_timeout() local
159 if (!auth || !auth->resp_msg) in hostapd_dpp_auth_resp_retry_timeout()
166 MAC2STR(auth->peer_mac_addr), auth->curr_freq, in hostapd_dpp_auth_resp_retry_timeout()
168 hostapd_drv_send_action(hapd, auth->curr_freq, 500, auth->peer_mac_addr, in hostapd_dpp_auth_resp_retry_timeout()
[all …]
/external/tcpdump/tests/
Dhsrp_1-v.out2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
4 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
12 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
14 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
18 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
20 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
[all …]
Dhsrp_2-v.out2 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
4 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
6 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
8 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
12 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
16 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
18 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
28 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
30 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
[all …]
Dhsrp_3-v.out2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
12 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
14 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
16 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
20 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
24 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
[all …]
/external/ppp/pppd/plugins/radius/
Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument
42 buf = auth->data; in rc_pack_list()
107 vector = (char *)auth->vector; in rc_pack_list()
143 memcpy ((char *) md5buf + secretlen, (char *) auth->vector, in rc_pack_list()
200 AUTH_HDR *auth, *recv_auth; in rc_send_server() local
262 auth = (AUTH_HDR *) send_buffer; in rc_send_server()
263 auth->code = data->code; in rc_send_server()
264 auth->id = data->seq_nbr; in rc_send_server()
268 total_length = rc_pack_list(data->send_pairs, secret, auth) + AUTH_HDR_LEN; in rc_send_server()
270 auth->length = htons ((unsigned short) total_length); in rc_send_server()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp72 int auth, encr = 0; in paramsFromScanResults() local
74 auth = AUTH_WPA2_EAP; in paramsFromScanResults()
76 auth = AUTH_WPA_EAP; in paramsFromScanResults()
78 auth = AUTH_WPA2_PSK; in paramsFromScanResults()
80 auth = AUTH_WPA_PSK; in paramsFromScanResults()
82 auth = AUTH_NONE_OPEN; in paramsFromScanResults()
90 if (auth == AUTH_NONE_OPEN) in paramsFromScanResults()
91 auth = AUTH_NONE_WEP; in paramsFromScanResults()
95 authSelect->setCurrentIndex(auth); in paramsFromScanResults()
96 authChanged(auth); in paramsFromScanResults()
[all …]
/external/selinux/policycoreutils/newrole/
Dnewrole.pamd3 # auth sufficient pam_rootok.so
4 auth include system-auth
5 account include system-auth
6 password include system-auth
7 session include system-auth
Dnewrole-lspp.pamd2 auth include system-auth
3 account include system-auth
4 password include system-auth
/external/selinux/policycoreutils/run_init/
Drun_init.pamd3 #auth sufficient pam_rootok.so
4 auth include system-auth
5 account include system-auth
6 password include system-auth
7 session include system-auth
/external/python/google-api-python-client/googleapiclient/
D_auth.py20 import google.auth
21 import google.auth.credentials
42 credentials, _ = google.auth.default()
66 credentials, google.auth.credentials.Credentials):
67 return google.auth.credentials.with_scopes_if_required(
94 credentials, google.auth.credentials.Credentials):
114 credentials, google.auth.credentials.Credentials):
130 credentials, google.auth.credentials.Credentials):
/external/ipsec-tools/
Dsetup.c314 int auth, int hash, int encryption, int length) in add_proposal() argument
321 p->authmethod = auth; in add_proposal()
421 int auth; in setup() local
464 auth = OAKLEY_ATTR_AUTH_METHOD_PSKEY; in setup()
470 auth = OAKLEY_ATTR_AUTH_METHOD_RSASIG; in setup()
478 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I; in setup()
482 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_RSASIG_I; in setup()
486 auth = OAKLEY_ATTR_AUTH_METHOD_HYBRID_RSA_I; in setup()
507 add_proposal(remoteconf, auth, in setup()
509 add_proposal(remoteconf, auth, in setup()
[all …]
/external/openssh/contrib/redhat/
Dsshd.pam2 auth required pam_stack.so service=system-auth
4 account required pam_stack.so service=system-auth
5 password required pam_stack.so service=system-auth
6 session required pam_stack.so service=system-auth
/external/apache-http/src/org/apache/http/impl/auth/
DNTLMScheme.java31 package org.apache.http.impl.auth;
35 import org.apache.http.auth.AUTH;
36 import org.apache.http.auth.AuthenticationException;
37 import org.apache.http.auth.Credentials;
38 import org.apache.http.auth.InvalidCredentialsException;
39 import org.apache.http.auth.MalformedChallengeException;
40 import org.apache.http.auth.NTCredentials;
41 import org.apache.http.impl.auth.AuthSchemeBase;
/external/okhttp/repackaged/okhttp/src/main/java/com/android/okhttp/internal/http/
DAuthenticatorAdapter.java47 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticate() local
50 if (auth == null) continue; in authenticate()
52 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticate()
70 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticateProxy() local
74 if (auth == null) continue; in authenticateProxy()
76 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticateProxy()
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
DAuthenticatorAdapter.java45 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticate() local
48 if (auth == null) continue; in authenticate()
50 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticate()
68 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticateProxy() local
72 if (auth == null) continue; in authenticateProxy()
74 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticateProxy()
/external/linux-kselftest/tools/testing/selftests/tpm2/
Dtpm2_tests.py24 auth = 'A' * 15
26 blob = self.client.seal(self.root_key, data, auth, None)
27 result = self.client.unseal(self.root_key, blob, auth, None)
34 auth = 'A' * 15
45 blob = self.client.seal(self.root_key, data, auth, policy_dig)
53 result = self.client.unseal(self.root_key, blob, auth, handle)
62 auth = 'A' * 20
65 blob = self.client.seal(self.root_key, data, auth, None)
67 result = self.client.unseal(self.root_key, blob, auth[:-1] + 'B', None)
77 auth = 'A' * 17
[all …]

12345678910>>...28