Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 25 of 602) sorted by relevance

12345678910>>...25

/external/wpa_supplicant_8/src/common/
Ddpp.c1282 static int dpp_derive_ke(struct dpp_authentication *auth, u8 *ke, in dpp_derive_ke() argument
1297 nonce_len = auth->curve->nonce_len; in dpp_derive_ke()
1298 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_ke()
1299 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_ke()
1300 addr[num_elem] = auth->Mx; in dpp_derive_ke()
1301 len[num_elem] = auth->secret_len; in dpp_derive_ke()
1303 addr[num_elem] = auth->Nx; in dpp_derive_ke()
1304 len[num_elem] = auth->secret_len; in dpp_derive_ke()
1306 if (auth->peer_bi && auth->own_bi) { in dpp_derive_ke()
1307 addr[num_elem] = auth->Lx; in dpp_derive_ke()
[all …]
/external/dhcpcd-6.8.2/
Dauth.c106 dhcp_auth_validate(struct authstate *state, const struct auth *auth, in dhcp_auth_validate() argument
134 if (!(auth->options & DHCPCD_AUTH_SEND)) { in dhcp_auth_validate()
141 } else if (protocol != auth->protocol || in dhcp_auth_validate()
142 algorithm != auth->algorithm || in dhcp_auth_validate()
143 rdm != auth->rdm) in dhcp_auth_validate()
148 auth->options & DHCPCD_AUTH_REQUIRE) in dhcp_auth_validate()
274 TAILQ_FOREACH(t, &auth->tokens, next) { in dhcp_auth_validate()
388 get_next_rdm_monotonic_counter(struct auth *auth) in get_next_rdm_monotonic_counter() argument
399 return ++auth->last_replay; /* report error? */ in get_next_rdm_monotonic_counter()
402 return ++auth->last_replay; /* report error? */ in get_next_rdm_monotonic_counter()
[all …]
/external/tcpdump/tests/
Dhsrp_1-v.out2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
4 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
12 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
14 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
18 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
20 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
[all …]
Dhsrp_2-v.out2 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
4 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
6 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
8 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
12 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
16 … 20: state=speak group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
18 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
28 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
30 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
[all …]
Dhsrp_3-v.out2 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
6 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
8 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
10 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
12 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
14 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
16 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
20 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
22 …20: state=active group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=200 auth="cisco^@^@^@"
24 …0: state=standby group=1 addr=192.168.0.1 hellotime=3s holdtime=10s priority=100 auth="cisco^@^@^@"
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Ddpp_supplicant.c83 struct dpp_authentication *auth = wpa_s->dpp_auth; in wpas_dpp_qr_code() local
92 if (auth && auth->response_pending && in wpas_dpp_qr_code()
93 dpp_notify_new_qr_code(auth, bi) == 1) { in wpas_dpp_qr_code()
96 offchannel_send_action(wpa_s, auth->curr_freq, in wpas_dpp_qr_code()
97 auth->peer_mac_addr, wpa_s->own_addr, in wpas_dpp_qr_code()
99 wpabuf_head(auth->resp_msg), in wpas_dpp_qr_code()
100 wpabuf_len(auth->resp_msg), in wpas_dpp_qr_code()
352 struct dpp_authentication *auth) in wpas_dpp_set_testing_options() argument
356 auth->config_obj_override = in wpas_dpp_set_testing_options()
359 auth->discovery_override = in wpas_dpp_set_testing_options()
[all …]
Dwpa_priv.c245 struct privsep_cmd_authenticate *auth; in wpa_priv_cmd_authenticate() local
251 if (len < sizeof(*auth)) { in wpa_priv_cmd_authenticate()
256 auth = buf; in wpa_priv_cmd_authenticate()
257 if (sizeof(*auth) + auth->ie_len + auth->auth_data_len > len) { in wpa_priv_cmd_authenticate()
263 params.freq = auth->freq; in wpa_priv_cmd_authenticate()
264 params.bssid = auth->bssid; in wpa_priv_cmd_authenticate()
265 params.ssid = auth->ssid; in wpa_priv_cmd_authenticate()
266 if (auth->ssid_len > SSID_MAX_LEN) in wpa_priv_cmd_authenticate()
268 params.ssid_len = auth->ssid_len; in wpa_priv_cmd_authenticate()
269 params.auth_alg = auth->auth_alg; in wpa_priv_cmd_authenticate()
[all …]
Dibss_rsn.c42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free()
356 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta()
453 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init()
454 if (peer->auth == NULL) { in ibss_rsn_auth_init()
460 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, in ibss_rsn_auth_init()
471 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init()
474 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init()
483 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local
484 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth.u.auth); in ibss_rsn_send_auth()
490 os_memset(&auth, 0, sizeof(auth)); in ibss_rsn_send_auth()
[all …]
/external/ppp/pppd/plugins/radius/
Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument
42 buf = auth->data; in rc_pack_list()
107 vector = (char *)auth->vector; in rc_pack_list()
143 memcpy ((char *) md5buf + secretlen, (char *) auth->vector, in rc_pack_list()
200 AUTH_HDR *auth, *recv_auth; in rc_send_server() local
262 auth = (AUTH_HDR *) send_buffer; in rc_send_server()
263 auth->code = data->code; in rc_send_server()
264 auth->id = data->seq_nbr; in rc_send_server()
268 total_length = rc_pack_list(data->send_pairs, secret, auth) + AUTH_HDR_LEN; in rc_send_server()
270 auth->length = htons ((unsigned short) total_length); in rc_send_server()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp72 int auth, encr = 0; in paramsFromScanResults() local
74 auth = AUTH_WPA2_EAP; in paramsFromScanResults()
76 auth = AUTH_WPA_EAP; in paramsFromScanResults()
78 auth = AUTH_WPA2_PSK; in paramsFromScanResults()
80 auth = AUTH_WPA_PSK; in paramsFromScanResults()
82 auth = AUTH_NONE_OPEN; in paramsFromScanResults()
90 if (auth == AUTH_NONE_OPEN) in paramsFromScanResults()
91 auth = AUTH_NONE_WEP; in paramsFromScanResults()
95 authSelect->setCurrentIndex(auth); in paramsFromScanResults()
96 authChanged(auth); in paramsFromScanResults()
[all …]
/external/wpa_supplicant_8/src/ap/
Ddpp_hostapd.c65 struct dpp_authentication *auth = hapd->dpp_auth; in hostapd_dpp_qr_code() local
74 if (auth && auth->response_pending && in hostapd_dpp_qr_code()
75 dpp_notify_new_qr_code(auth, bi) == 1) { in hostapd_dpp_qr_code()
78 hostapd_drv_send_action(hapd, auth->curr_freq, 0, in hostapd_dpp_qr_code()
79 auth->peer_mac_addr, in hostapd_dpp_qr_code()
303 struct dpp_authentication *auth) in hostapd_dpp_set_testing_options() argument
307 auth->config_obj_override = in hostapd_dpp_set_testing_options()
310 auth->discovery_override = in hostapd_dpp_set_testing_options()
313 auth->groups_override = os_strdup(hapd->dpp_groups_override); in hostapd_dpp_set_testing_options()
314 auth->ignore_netaccesskey_mismatch = in hostapd_dpp_set_testing_options()
[all …]
/external/ipsec-tools/
Dsetup.c314 int auth, int hash, int encryption, int length) in add_proposal() argument
321 p->authmethod = auth; in add_proposal()
421 int auth; in setup() local
464 auth = OAKLEY_ATTR_AUTH_METHOD_PSKEY; in setup()
470 auth = OAKLEY_ATTR_AUTH_METHOD_RSASIG; in setup()
478 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I; in setup()
482 auth = OAKLEY_ATTR_AUTH_METHOD_XAUTH_RSASIG_I; in setup()
486 auth = OAKLEY_ATTR_AUTH_METHOD_HYBRID_RSA_I; in setup()
507 add_proposal(remoteconf, auth, in setup()
509 add_proposal(remoteconf, auth, in setup()
[all …]
/external/selinux/policycoreutils/newrole/
Dnewrole.pamd3 # auth sufficient pam_rootok.so
4 auth include system-auth
5 account include system-auth
6 password include system-auth
7 session include system-auth
/external/selinux/policycoreutils/run_init/
Drun_init.pamd3 #auth sufficient pam_rootok.so
4 auth include system-auth
5 account include system-auth
6 password include system-auth
7 session include system-auth
/external/apache-http/src/org/apache/http/impl/auth/
DNTLMScheme.java31 package org.apache.http.impl.auth;
35 import org.apache.http.auth.AUTH;
36 import org.apache.http.auth.AuthenticationException;
37 import org.apache.http.auth.Credentials;
38 import org.apache.http.auth.InvalidCredentialsException;
39 import org.apache.http.auth.MalformedChallengeException;
40 import org.apache.http.auth.NTCredentials;
41 import org.apache.http.impl.auth.AuthSchemeBase;
DBasicScheme.java31 package org.apache.http.impl.auth;
36 import org.apache.http.auth.AuthenticationException;
37 import org.apache.http.auth.Credentials;
38 import org.apache.http.auth.AUTH;
39 import org.apache.http.auth.MalformedChallengeException;
40 import org.apache.http.auth.params.AuthParams;
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
DAuthenticatorAdapter.java45 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticate() local
48 if (auth == null) continue; in authenticate()
50 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticate()
68 PasswordAuthentication auth = java.net.Authenticator.requestPasswordAuthentication( in authenticateProxy() local
72 if (auth == null) continue; in authenticateProxy()
74 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); in authenticateProxy()
/external/wpa_supplicant_8/src/crypto/
Daes-ccm.c117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument
127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth()
128 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_encr_auth()
132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument
137 wpa_hexdump_key(MSG_EXCESSIVE, "CCM U", auth, M); in aes_ccm_decr_auth()
142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth()
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument
169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae()
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument
196 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()
/external/curl/tests/data/
Dtest12866 HTTP Digest auth
16 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144", qop="auth"
40 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144", qop="auth"
84 # Since regular and SSPI digest auth header fields may not have the same order
88 # - Remove quotes from qop="auth" used by SSPI
91 …/=]+"$/$1REMOVED/; s/^(response=)"[a-f0-9]{32}"$/$1REMOVED/; s/^qop="auth"$/qop=auth/; $_ } sort s…
100 Authorization: Digest cnonce=REMOVED, nc=00000001, nonce="1053604144", qop=auth, realm="testrealm",…
105 Authorization: Digest cnonce=REMOVED, nc=00000002, nonce="1053604144", qop=auth, realm="testrealm",…
Dtest20276 HTTP Digest auth
18 new response just as a duplicate and it sends another and detects the auth
23 <!-- First request has Digest auth, wrong password -->
25 HTTP/1.1 401 Need Digest auth
44 <!-- Second request has Digest auth, right password -->
46 HTTP/1.1 401 Need Digest auth (2)
64 <!-- Third request has Digest auth, wrong password -->
66 HTTP/1.1 401 Need Digest auth (3)
85 <!-- Fourth request has Digest auth, wrong password -->
87 HTTP/1.1 401 Need Digest auth (4)
[all …]
Dtest20286 HTTP Digest auth
7 HTTP NTLM auth
16 <!-- First request has Digest auth, wrong password -->
18 HTTP/1.1 401 Need Digest or NTLM auth
39 <!-- Second request has NTLM auth, right password -->
41 HTTP/1.1 401 Need Digest or NTLM auth (2)
70 <!-- Third request has Digest auth, wrong password -->
72 HTTP/1.1 401 Need Digest or NTLM auth (3)
93 <!-- Fourth request has NTLM auth, wrong password -->
95 HTTP/1.1 401 Need Digest or NTLM auth (4)
[all …]
Dtest20266 HTTP Basic auth
7 HTTP Digest auth
16 <!-- First request has Digest auth, wrong password -->
18 HTTP/1.1 401 Need Basic or Digest auth
39 <!-- Second request has Basic auth, right password -->
49 <!-- Third request has Digest auth, wrong password -->
51 HTTP/1.1 401 Need Basic or Digest auth (2)
72 <!-- Fourth request has Basic auth, wrong password -->
84 <!-- Fifth request has Basic auth, right password -->
95 HTTP/1.1 401 Need Basic or Digest auth
[all …]
Dtest5407 HTTP proxy Digest auth
18 # this is returned first since we get no proxy-auth
27 # then this is returned when we get proxy-auth
33 Nice proxy auth sir!
45 Nice proxy auth sir!
54 Nice proxy auth sir!
72 HTTP proxy auth Digest multi API re-using connection
/external/tpm2/
DObject.c411 TPM2B_AUTH *auth // IN: the authValue for the slot in AllocateSequenceSlot() argument
420 pAssert(&((*object)->auth) == &objectHash->publicArea.authPolicy); in AllocateSequenceSlot()
433 if(auth != NULL) in AllocateSequenceSlot()
435 MemoryRemoveTrailingZeros(auth); in AllocateSequenceSlot()
436 (*object)->auth = *auth; in AllocateSequenceSlot()
439 (*object)->auth.t.size = 0; in AllocateSequenceSlot()
457 TPM2B_AUTH *auth, // IN: authValue in ObjectCreateHMACSequence() argument
464 if(!AllocateSequenceSlot(newHandle, &hmacObject, auth)) in ObjectCreateHMACSequence()
487 TPM2B_AUTH *auth, // IN: authValue in ObjectCreateHashSequence() argument
493 if(!AllocateSequenceSlot(newHandle, &hashObject, auth)) in ObjectCreateHashSequence()
[all …]
/external/wpa_supplicant_8/src/drivers/
Ddriver_privsep.c384 struct privsep_event_auth *auth; in wpa_driver_privsep_event_auth() local
387 if (len < sizeof(*auth)) in wpa_driver_privsep_event_auth()
389 auth = (struct privsep_event_auth *) buf; in wpa_driver_privsep_event_auth()
390 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth()
393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth()
394 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); in wpa_driver_privsep_event_auth()
395 data.auth.auth_type = auth->auth_type; in wpa_driver_privsep_event_auth()
396 data.auth.auth_transaction = auth->auth_transaction; in wpa_driver_privsep_event_auth()
397 data.auth.status_code = auth->status_code; in wpa_driver_privsep_event_auth()
398 if (auth->ies_len) { in wpa_driver_privsep_event_auth()
[all …]

12345678910>>...25