/external/wpa_supplicant_8/src/common/ |
D | dpp.c | 1282 static int dpp_derive_ke(struct dpp_authentication *auth, u8 *ke, in dpp_derive_ke() argument 1297 nonce_len = auth->curve->nonce_len; in dpp_derive_ke() 1298 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_ke() 1299 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_ke() 1300 addr[num_elem] = auth->Mx; in dpp_derive_ke() 1301 len[num_elem] = auth->secret_len; in dpp_derive_ke() 1303 addr[num_elem] = auth->Nx; in dpp_derive_ke() 1304 len[num_elem] = auth->secret_len; in dpp_derive_ke() 1306 if (auth->peer_bi && auth->own_bi) { in dpp_derive_ke() 1307 addr[num_elem] = auth->Lx; in dpp_derive_ke() [all …]
|
/external/dhcpcd-6.8.2/ |
D | auth.c | 106 dhcp_auth_validate(struct authstate *state, const struct auth *auth, in dhcp_auth_validate() argument 134 if (!(auth->options & DHCPCD_AUTH_SEND)) { in dhcp_auth_validate() 141 } else if (protocol != auth->protocol || in dhcp_auth_validate() 142 algorithm != auth->algorithm || in dhcp_auth_validate() 143 rdm != auth->rdm) in dhcp_auth_validate() 148 auth->options & DHCPCD_AUTH_REQUIRE) in dhcp_auth_validate() 274 TAILQ_FOREACH(t, &auth->tokens, next) { in dhcp_auth_validate() 388 get_next_rdm_monotonic_counter(struct auth *auth) in get_next_rdm_monotonic_counter() argument 399 return ++auth->last_replay; /* report error? */ in get_next_rdm_monotonic_counter() 402 return ++auth->last_replay; /* report error? */ in get_next_rdm_monotonic_counter() [all …]
|
/external/tcpdump/tests/ |
D | hsrp_1-v.out | 2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 4 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 12 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 14 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 18 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 20 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" [all …]
|
D | hsrp_2-v.out | 2 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 4 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 6 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 8 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 12 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 16 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 18 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 28 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 30 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" [all …]
|
D | hsrp_3-v.out | 2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 12 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 14 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 16 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" 20 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@" 24 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@" [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | dpp_supplicant.c | 83 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_qr_code() local 92 if (auth && auth->response_pending && in wpas_dpp_qr_code() 93 dpp_notify_new_qr_code(auth, bi) == 1) { in wpas_dpp_qr_code() 96 offchannel_send_action(wpa_s, auth->curr_freq, in wpas_dpp_qr_code() 97 auth->peer_mac_addr, wpa_s->own_addr, in wpas_dpp_qr_code() 99 wpabuf_head(auth->resp_msg), in wpas_dpp_qr_code() 100 wpabuf_len(auth->resp_msg), in wpas_dpp_qr_code() 352 struct dpp_authentication *auth) in wpas_dpp_set_testing_options() argument 356 auth->config_obj_override = in wpas_dpp_set_testing_options() 359 auth->discovery_override = in wpas_dpp_set_testing_options() [all …]
|
D | wpa_priv.c | 245 struct privsep_cmd_authenticate *auth; in wpa_priv_cmd_authenticate() local 251 if (len < sizeof(*auth)) { in wpa_priv_cmd_authenticate() 256 auth = buf; in wpa_priv_cmd_authenticate() 257 if (sizeof(*auth) + auth->ie_len + auth->auth_data_len > len) { in wpa_priv_cmd_authenticate() 263 params.freq = auth->freq; in wpa_priv_cmd_authenticate() 264 params.bssid = auth->bssid; in wpa_priv_cmd_authenticate() 265 params.ssid = auth->ssid; in wpa_priv_cmd_authenticate() 266 if (auth->ssid_len > SSID_MAX_LEN) in wpa_priv_cmd_authenticate() 268 params.ssid_len = auth->ssid_len; in wpa_priv_cmd_authenticate() 269 params.auth_alg = auth->auth_alg; in wpa_priv_cmd_authenticate() [all …]
|
D | ibss_rsn.c | 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 356 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta() 453 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init() 454 if (peer->auth == NULL) { in ibss_rsn_auth_init() 460 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, in ibss_rsn_auth_init() 471 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init() 474 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init() 483 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local 484 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth.u.auth); in ibss_rsn_send_auth() 490 os_memset(&auth, 0, sizeof(auth)); in ibss_rsn_send_auth() [all …]
|
/external/ppp/pppd/plugins/radius/ |
D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument 42 buf = auth->data; in rc_pack_list() 107 vector = (char *)auth->vector; in rc_pack_list() 143 memcpy ((char *) md5buf + secretlen, (char *) auth->vector, in rc_pack_list() 200 AUTH_HDR *auth, *recv_auth; in rc_send_server() local 262 auth = (AUTH_HDR *) send_buffer; in rc_send_server() 263 auth->code = data->code; in rc_send_server() 264 auth->id = data->seq_nbr; in rc_send_server() 268 total_length = rc_pack_list(data->send_pairs, secret, auth) + AUTH_HDR_LEN; in rc_send_server() 270 auth->length = htons ((unsigned short) total_length); in rc_send_server() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 72 int auth, encr = 0; in paramsFromScanResults() local 74 auth = AUTH_WPA2_EAP; in paramsFromScanResults() 76 auth = AUTH_WPA_EAP; in paramsFromScanResults() 78 auth = AUTH_WPA2_PSK; in paramsFromScanResults() 80 auth = AUTH_WPA_PSK; in paramsFromScanResults() 82 auth = AUTH_NONE_OPEN; in paramsFromScanResults() 90 if (auth == AUTH_NONE_OPEN) in paramsFromScanResults() 91 auth = AUTH_NONE_WEP; in paramsFromScanResults() 95 authSelect->setCurrentIndex(auth); in paramsFromScanResults() 96 authChanged(auth); in paramsFromScanResults() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | dpp_hostapd.c | 65 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_qr_code() local 74 if (auth && auth->response_pending && in hostapd_dpp_qr_code() 75 dpp_notify_new_qr_code(auth, bi) == 1) { in hostapd_dpp_qr_code() 78 hostapd_drv_send_action(hapd, auth->curr_freq, 0, in hostapd_dpp_qr_code() 79 auth->peer_mac_addr, in hostapd_dpp_qr_code() 303 struct dpp_authentication *auth) in hostapd_dpp_set_testing_options() argument 307 auth->config_obj_override = in hostapd_dpp_set_testing_options() 310 auth->discovery_override = in hostapd_dpp_set_testing_options() 313 auth->groups_override = os_strdup(hapd->dpp_groups_override); in hostapd_dpp_set_testing_options() 314 auth->ignore_netaccesskey_mismatch = in hostapd_dpp_set_testing_options() [all …]
|
/external/ipsec-tools/ |
D | setup.c | 314 int auth, int hash, int encryption, int length) in add_proposal() argument 321 p->authmethod = auth; in add_proposal() 421 int auth; in setup() local 464 auth = OAKLEY_ATTR_AUTH_METHOD_PSKEY; in setup() 470 auth = OAKLEY_ATTR_AUTH_METHOD_RSASIG; in setup() 478 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I; in setup() 482 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_RSASIG_I; in setup() 486 auth = OAKLEY_ATTR_AUTH_METHOD_HYBRID_RSA_I; in setup() 507 add_proposal(remoteconf, auth, in setup() 509 add_proposal(remoteconf, auth, in setup() [all …]
|
/external/selinux/policycoreutils/newrole/ |
D | newrole.pamd | 3 # auth sufficient pam_rootok.so 4 auth include system-auth 5 account include system-auth 6 password include system-auth 7 session include system-auth
|
/external/selinux/policycoreutils/run_init/ |
D | run_init.pamd | 3 #auth sufficient pam_rootok.so 4 auth include system-auth 5 account include system-auth 6 password include system-auth 7 session include system-auth
|
/external/apache-http/src/org/apache/http/impl/auth/ |
D | NTLMScheme.java | 31 package org.apache.http.impl.auth; 35 import org.apache.http.auth.AUTH; 36 import org.apache.http.auth.AuthenticationException; 37 import org.apache.http.auth.Credentials; 38 import org.apache.http.auth.InvalidCredentialsException; 39 import org.apache.http.auth.MalformedChallengeException; 40 import org.apache.http.auth.NTCredentials; 41 import org.apache.http.impl.auth.AuthSchemeBase;
|
D | BasicScheme.java | 31 package org.apache.http.impl.auth; 36 import org.apache.http.auth.AuthenticationException; 37 import org.apache.http.auth.Credentials; 38 import org.apache.http.auth.AUTH; 39 import org.apache.http.auth.MalformedChallengeException; 40 import org.apache.http.auth.params.AuthParams;
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
D | AuthenticatorAdapter.java | 45 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticate() local 48 if (auth == null) continue; in authenticate() 50 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticate() 68 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticateProxy() local 72 if (auth == null) continue; in authenticateProxy() 74 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticateProxy()
|
/external/wpa_supplicant_8/src/crypto/ |
D | aes-ccm.c | 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument 127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth() 132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument 137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth() 142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae() 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument 196 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()
|
/external/curl/tests/data/ |
D | test1286 | 6 HTTP Digest auth 16 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144", qop="auth" 40 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144", qop="auth" 84 # Since regular and SSPI digest auth header fields may not have the same order 88 # - Remove quotes from qop="auth" used by SSPI 91 …/=]+"$/$1REMOVED/; s/^(response=)"[a-f0-9]{32}"$/$1REMOVED/; s/^qop="auth"$/qop=auth/; $_ } sort s… 100 Authorization: Digest cnonce=REMOVED, nc=00000001, nonce="1053604144", qop=auth, realm="testrealm",… 105 Authorization: Digest cnonce=REMOVED, nc=00000002, nonce="1053604144", qop=auth, realm="testrealm",…
|
D | test2027 | 6 HTTP Digest auth 18 new response just as a duplicate and it sends another and detects the auth 23 <!-- First request has Digest auth, wrong password --> 25 HTTP/1.1 401 Need Digest auth 44 <!-- Second request has Digest auth, right password --> 46 HTTP/1.1 401 Need Digest auth (2) 64 <!-- Third request has Digest auth, wrong password --> 66 HTTP/1.1 401 Need Digest auth (3) 85 <!-- Fourth request has Digest auth, wrong password --> 87 HTTP/1.1 401 Need Digest auth (4) [all …]
|
D | test2028 | 6 HTTP Digest auth 7 HTTP NTLM auth 16 <!-- First request has Digest auth, wrong password --> 18 HTTP/1.1 401 Need Digest or NTLM auth 39 <!-- Second request has NTLM auth, right password --> 41 HTTP/1.1 401 Need Digest or NTLM auth (2) 70 <!-- Third request has Digest auth, wrong password --> 72 HTTP/1.1 401 Need Digest or NTLM auth (3) 93 <!-- Fourth request has NTLM auth, wrong password --> 95 HTTP/1.1 401 Need Digest or NTLM auth (4) [all …]
|
D | test2026 | 6 HTTP Basic auth 7 HTTP Digest auth 16 <!-- First request has Digest auth, wrong password --> 18 HTTP/1.1 401 Need Basic or Digest auth 39 <!-- Second request has Basic auth, right password --> 49 <!-- Third request has Digest auth, wrong password --> 51 HTTP/1.1 401 Need Basic or Digest auth (2) 72 <!-- Fourth request has Basic auth, wrong password --> 84 <!-- Fifth request has Basic auth, right password --> 95 HTTP/1.1 401 Need Basic or Digest auth [all …]
|
D | test540 | 7 HTTP proxy Digest auth 18 # this is returned first since we get no proxy-auth 27 # then this is returned when we get proxy-auth 33 Nice proxy auth sir! 45 Nice proxy auth sir! 54 Nice proxy auth sir! 72 HTTP proxy auth Digest multi API re-using connection
|
/external/tpm2/ |
D | Object.c | 411 TPM2B_AUTH *auth // IN: the authValue for the slot in AllocateSequenceSlot() argument 420 pAssert(&((*object)->auth) == &objectHash->publicArea.authPolicy); in AllocateSequenceSlot() 433 if(auth != NULL) in AllocateSequenceSlot() 435 MemoryRemoveTrailingZeros(auth); in AllocateSequenceSlot() 436 (*object)->auth = *auth; in AllocateSequenceSlot() 439 (*object)->auth.t.size = 0; in AllocateSequenceSlot() 457 TPM2B_AUTH *auth, // IN: authValue in ObjectCreateHMACSequence() argument 464 if(!AllocateSequenceSlot(newHandle, &hmacObject, auth)) in ObjectCreateHMACSequence() 487 TPM2B_AUTH *auth, // IN: authValue in ObjectCreateHashSequence() argument 493 if(!AllocateSequenceSlot(newHandle, &hashObject, auth)) in ObjectCreateHashSequence() [all …]
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_privsep.c | 384 struct privsep_event_auth *auth; in wpa_driver_privsep_event_auth() local 387 if (len < sizeof(*auth)) in wpa_driver_privsep_event_auth() 389 auth = (struct privsep_event_auth *) buf; in wpa_driver_privsep_event_auth() 390 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth() 393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth() 394 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); in wpa_driver_privsep_event_auth() 395 data.auth.auth_type = auth->auth_type; in wpa_driver_privsep_event_auth() 396 data.auth.auth_transaction = auth->auth_transaction; in wpa_driver_privsep_event_auth() 397 data.auth.status_code = auth->status_code; in wpa_driver_privsep_event_auth() 398 if (auth->ies_len) { in wpa_driver_privsep_event_auth() [all …]
|