Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 25 of 428) sorted by relevance

12345678910>>...18

/OK3568_Linux_fs/external/xserver/os/
H A Dmitauth.c43 static struct auth { struct
44 struct auth *next; argument
53 struct auth *new; in MitAddCookie() argument
55 new = malloc(sizeof(struct auth)); in MitAddCookie()
75 struct auth *auth; in MitCheckCookie() local
77 for (auth = mit_auth; auth; auth = auth->next) { in MitCheckCookie()
78 if (data_length == auth->len && in MitCheckCookie()
79 timingsafe_memcmp(data, auth->data, (int) data_length) == 0) in MitCheckCookie()
80 return auth->id; in MitCheckCookie()
89 struct auth *auth, *next; in MitResetCookie() local
[all …]
H A Dxdmauth.c202 XdmClientAuthDecode(const unsigned char *plain, XdmClientAuthPtr auth) in XdmClientAuthDecode() argument
208 auth->rho.data[i] = plain[j]; in XdmClientAuthDecode()
212 auth->client[i] = plain[j]; in XdmClientAuthDecode()
215 auth->time = 0; in XdmClientAuthDecode()
217 auth->time |= plain[j] << ((3 - i) << 3); in XdmClientAuthDecode()
369 XdmAuthorizationPtr auth; in XdmCheckCookie() local
379 for (auth = xdmAuth; auth; auth = auth->next) { in XdmCheckCookie()
380 XdmcpUnwrap((unsigned char *) cookie, (unsigned char *) &auth->key, in XdmCheckCookie()
383 XdmAuthorizationValidate(plain, cookie_length, &auth->rho, xclient, in XdmCheckCookie()
388 return auth->id; in XdmCheckCookie()
[all …]
/OK3568_Linux_fs/kernel/drivers/gpu/drm/amd/display/modules/hdcp/
H A Dhdcp_ddc.c249 hdcp->auth.msg.hdcp1.bksv, in mod_hdcp_read_bksv()
250 sizeof(hdcp->auth.msg.hdcp1.bksv)); in mod_hdcp_read_bksv()
256 &hdcp->auth.msg.hdcp1.bcaps, in mod_hdcp_read_bcaps()
257 sizeof(hdcp->auth.msg.hdcp1.bcaps)); in mod_hdcp_read_bcaps()
266 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus, in mod_hdcp_read_bstatus()
270 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus, in mod_hdcp_read_bstatus()
271 sizeof(hdcp->auth.msg.hdcp1.bstatus)); in mod_hdcp_read_bstatus()
278 (uint8_t *)&hdcp->auth.msg.hdcp1.r0p, in mod_hdcp_read_r0p()
279 sizeof(hdcp->auth.msg.hdcp1.r0p)); in mod_hdcp_read_r0p()
289 hdcp->auth.msg.hdcp1.ksvlist, in mod_hdcp_read_ksvlist()
[all …]
H A Dhdcp_log.h111 HDCP_DDC_READ_TRACE(hdcp, "BKSV", hdcp->auth.msg.hdcp1.bksv, \
112 sizeof(hdcp->auth.msg.hdcp1.bksv)); \
113 HDCP_DDC_READ_TRACE(hdcp, "BCAPS", &hdcp->auth.msg.hdcp1.bcaps, \
114 sizeof(hdcp->auth.msg.hdcp1.bcaps)); \
116 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus, \
117 sizeof(hdcp->auth.msg.hdcp1.bstatus)); \
118 HDCP_DDC_WRITE_TRACE(hdcp, "AN", hdcp->auth.msg.hdcp1.an, \
119 sizeof(hdcp->auth.msg.hdcp1.an)); \
120 HDCP_DDC_WRITE_TRACE(hdcp, "AKSV", hdcp->auth.msg.hdcp1.aksv, \
121 sizeof(hdcp->auth.msg.hdcp1.aksv)); \
[all …]
H A Dhdcp_psp.c37 in->session_handle = hdcp->auth.id; in hdcp2_message_init()
152 hdcp->auth.id = hdcp_cmd->out_msg.hdcp1_create_session.session_handle; in mod_hdcp_hdcp1_create_session()
157 hdcp->auth.msg.hdcp1.ainfo = hdcp_cmd->out_msg.hdcp1_create_session.ainfo_primary; in mod_hdcp_hdcp1_create_session()
158 memcpy(hdcp->auth.msg.hdcp1.aksv, hdcp_cmd->out_msg.hdcp1_create_session.aksv_primary, in mod_hdcp_hdcp1_create_session()
159 sizeof(hdcp->auth.msg.hdcp1.aksv)); in mod_hdcp_hdcp1_create_session()
160 memcpy(hdcp->auth.msg.hdcp1.an, hdcp_cmd->out_msg.hdcp1_create_session.an_primary, in mod_hdcp_hdcp1_create_session()
161 sizeof(hdcp->auth.msg.hdcp1.an)); in mod_hdcp_hdcp1_create_session()
180 hdcp_cmd->in_msg.hdcp1_destroy_session.session_handle = hdcp->auth.id; in mod_hdcp_hdcp1_destroy_session()
212 hdcp_cmd->in_msg.hdcp1_first_part_authentication.session_handle = hdcp->auth.id; in mod_hdcp_hdcp1_validate_rx()
214 memcpy(hdcp_cmd->in_msg.hdcp1_first_part_authentication.bksv_primary, hdcp->auth.msg.hdcp1.bksv, in mod_hdcp_hdcp1_validate_rx()
[all …]
H A Dhdcp2_execution.c35 is_ready = HDCP_2_2_DP_RXSTATUS_READY(hdcp->auth.msg.hdcp2.rxstatus_dp) ? 1 : 0; in check_receiver_id_list_ready()
37 is_ready = (HDCP_2_2_HDMI_RXSTATUS_READY(hdcp->auth.msg.hdcp2.rxstatus[1]) && in check_receiver_id_list_ready()
38 (HDCP_2_2_HDMI_RXSTATUS_MSG_SZ_HI(hdcp->auth.msg.hdcp2.rxstatus[1]) << 8 | in check_receiver_id_list_ready()
39 hdcp->auth.msg.hdcp2.rxstatus[0])) ? 1 : 0; in check_receiver_id_list_ready()
49 status = (hdcp->auth.msg.hdcp2.rxcaps_dp[0] == HDCP_2_2_RX_CAPS_VERSION_VAL) && in check_hdcp2_capable()
50 HDCP_2_2_DP_HDCP_CAPABLE(hdcp->auth.msg.hdcp2.rxcaps_dp[2]) ? in check_hdcp2_capable()
54 status = (hdcp->auth.msg.hdcp2.hdcp2version_hdmi & HDCP_2_2_HDMI_SUPPORT_MASK) ? in check_hdcp2_capable()
66 ret = HDCP_2_2_DP_RXSTATUS_REAUTH_REQ(hdcp->auth.msg.hdcp2.rxstatus_dp) ? in check_reauthentication_request()
70 ret = HDCP_2_2_HDMI_RXSTATUS_REAUTH_REQ(hdcp->auth.msg.hdcp2.rxstatus[1]) ? in check_reauthentication_request()
79 return HDCP_2_2_DP_RXSTATUS_LINK_FAILED(hdcp->auth.msg.hdcp2.rxstatus_dp) ? in check_link_integrity_failure_dp()
[all …]
H A Dhdcp1_execution.c34 memcpy(bksv, hdcp->auth.msg.hdcp1.bksv, sizeof(hdcp->auth.msg.hdcp1.bksv)); in validate_bksv()
48 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_READY) ? in check_ksv_ready()
51 return (hdcp->auth.msg.hdcp1.bcaps & DRM_HDCP_DDC_BCAPS_KSV_FIFO_READY) ? in check_ksv_ready()
58 return (hdcp->auth.msg.hdcp1.bcaps & DP_BCAPS_HDCP_CAPABLE) ? in check_hdcp_capable_dp()
67 status = (hdcp->auth.msg.hdcp1.bstatus & in check_r0p_available_dp()
80 return (hdcp->auth.msg.hdcp1.bstatus & in check_link_integrity_dp()
89 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_REAUTH_REQ) ? in check_no_reauthentication_request_dp()
99 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth.msg.hdcp1.binfo_dp >> 8) in check_no_max_cascade()
103 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth.msg.hdcp1.bstatus >> 8) in check_no_max_cascade()
114 status = DRM_HDCP_MAX_DEVICE_EXCEEDED(hdcp->auth.msg.hdcp1.binfo_dp) ? in check_no_max_devs()
[all …]
/OK3568_Linux_fs/kernel/crypto/
H A Dauthencesn.c26 struct crypto_ahash_spawn auth; member
32 struct crypto_ahash *auth; member
62 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_setkey() local
70 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_esn_setkey()
71 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc_esn) & in crypto_authenc_esn_setkey()
73 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
92 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv_tail() local
94 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_esn_genicv_tail()
125 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv() local
127 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_esn_genicv()
[all …]
H A Dauthenc.c23 struct crypto_ahash_spawn auth; member
29 struct crypto_ahash *auth; member
88 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local
96 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_setkey()
97 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) & in crypto_authenc_setkey()
99 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
138 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_genicv() local
144 hash = (u8 *)ALIGN((unsigned long)hash + crypto_ahash_alignmask(auth), in crypto_authenc_genicv()
145 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_genicv()
147 ahash_request_set_tfm(ahreq, auth); in crypto_authenc_genicv()
[all …]
/OK3568_Linux_fs/kernel/include/linux/ceph/
H A Dauth.h28 int (*sign_message)(struct ceph_auth_handshake *auth,
30 int (*check_message_signature)(struct ceph_auth_handshake *auth,
63 struct ceph_auth_handshake *auth);
66 struct ceph_auth_handshake *auth);
81 int (*sign_message)(struct ceph_auth_handshake *auth,
83 int (*check_message_signature)(struct ceph_auth_handshake *auth,
120 struct ceph_auth_handshake *auth);
134 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, in ceph_auth_sign_message() argument
137 if (auth->sign_message) in ceph_auth_sign_message()
138 return auth->sign_message(auth, msg); in ceph_auth_sign_message()
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/files/
H A Dshadow-update-pam-conf.patch1 The system-auth in the configure files is from Fedora which put all the 4 pam type rules
3 In yocto it obey the way with Debian/Ubuntu, and the names are common-auth, common-account,
16 auth sufficient pam_rootok.so
18 -password include system-auth
25 auth sufficient pam_rootok.so
27 -password include system-auth
34 auth sufficient pam_rootok.so
36 -password include system-auth
43 auth sufficient pam_rootok.so
45 -password include system-auth
[all …]
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/strongswan/files/
H A DCVE-2022-40617.patch34 - int pathlen, bool trusted, auth_cfg_t *auth)
35 + int pathlen, bool anchor, auth_cfg_t *auth)
43 - pathlen, trusted, auth);
44 + pathlen, anchor, auth);
52 - int pathlen, bool trusted, auth_cfg_t *auth)
53 + int pathlen, bool anchor, auth_cfg_t *auth)
58 if (!check_lifetime(this, subject, "subject", pathlen, FALSE, auth) ||
59 - !check_lifetime(this, issuer, "issuer", pathlen + 1, trusted, auth))
60 + !check_lifetime(this, issuer, "issuer", pathlen + 1, anchor, auth))
68 - online, pathlen, trusted, auth))
[all …]
/OK3568_Linux_fs/kernel/net/sunrpc/
H A Dauth.c227 struct rpc_auth *auth = ERR_PTR(-EINVAL); in rpcauth_create() local
235 auth = ops->create(args, clnt); in rpcauth_create()
238 if (IS_ERR(auth)) in rpcauth_create()
239 return auth; in rpcauth_create()
242 clnt->cl_auth = auth; in rpcauth_create()
245 return auth; in rpcauth_create()
250 rpcauth_release(struct rpc_auth *auth) in rpcauth_release() argument
252 if (!refcount_dec_and_test(&auth->au_count)) in rpcauth_release()
254 auth->au_ops->destroy(auth); in rpcauth_release()
291 rpcauth_init_credcache(struct rpc_auth *auth) in rpcauth_init_credcache() argument
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/cronie/cronie/
H A Dcrond_pam_config.patch1 password-auth is the Fedora's common pam configure file, use oe common pam
13 # Although no PAM authentication is called, auth modules
15 -auth include system-auth
16 +auth include common-auth
18 -account include system-auth
19 +account include common-auth
21 -session include system-auth
/OK3568_Linux_fs/kernel/drivers/target/iscsi/
H A Discsi_target_auth.c139 struct iscsi_node_auth *auth, in chap_server_open() argument
147 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open()
148 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open()
210 struct iscsi_node_auth *auth, in chap_server_compute_hash() argument
284 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash()
285 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash()
340 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash()
341 strlen(auth->password)); in chap_server_compute_hash()
369 if (!auth->authenticate_target) { in chap_server_compute_hash()
454 ret = crypto_shash_update(desc, auth->password_mutual, in chap_server_compute_hash()
[all …]
/OK3568_Linux_fs/kernel/net/sctp/
H A Doutput.c67 packet->auth = NULL; in sctp_packet_reset()
220 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local
235 if (!chunk->auth) in sctp_packet_bundle_auth()
238 auth = sctp_make_auth(asoc, chunk->shkey->key_id); in sctp_packet_bundle_auth()
239 if (!auth) in sctp_packet_bundle_auth()
242 auth->shkey = chunk->shkey; in sctp_packet_bundle_auth()
243 sctp_auth_shkey_hold(auth->shkey); in sctp_packet_bundle_auth()
245 retval = __sctp_packet_append_chunk(pkt, auth); in sctp_packet_bundle_auth()
248 sctp_chunk_free(auth); in sctp_packet_bundle_auth()
342 packet->auth = chunk; in __sctp_packet_append_chunk()
[all …]
/OK3568_Linux_fs/app/forlinx/flapp/src/plugins/imxwayland/simplebrowser/
H A Dwebpage.cpp88 void WebPage::handleAuthenticationRequired(const QUrl &requestUrl, QAuthenticator *auth) in handleAuthenticationRequired() argument
103 .arg(auth->realm()).arg(requestUrl.toString().toHtmlEscaped())); in handleAuthenticationRequired()
108 auth->setUser(passwordDialog.m_userNameLineEdit->text()); in handleAuthenticationRequired()
109 auth->setPassword(passwordDialog.m_passwordLineEdit->text()); in handleAuthenticationRequired()
112 *auth = QAuthenticator(); in handleAuthenticationRequired()
116 void WebPage::handleProxyAuthenticationRequired(const QUrl &, QAuthenticator *auth, const QString &… in handleProxyAuthenticationRequired() argument
136 auth->setUser(passwordDialog.m_userNameLineEdit->text()); in handleProxyAuthenticationRequired()
137 auth->setPassword(passwordDialog.m_passwordLineEdit->text()); in handleProxyAuthenticationRequired()
140 *auth = QAuthenticator(); in handleProxyAuthenticationRequired()
/OK3568_Linux_fs/app/forlinx/flapp/src/plugins/simplebrowser/
H A Dwebpage.cpp90 void WebPage::handleAuthenticationRequired(const QUrl &requestUrl, QAuthenticator *auth) in handleAuthenticationRequired() argument
105 .arg(auth->realm()).arg(requestUrl.toString().toHtmlEscaped())); in handleAuthenticationRequired()
110 auth->setUser(passwordDialog.m_userNameLineEdit->text()); in handleAuthenticationRequired()
111 auth->setPassword(passwordDialog.m_passwordLineEdit->text()); in handleAuthenticationRequired()
114 *auth = QAuthenticator(); in handleAuthenticationRequired()
118 void WebPage::handleProxyAuthenticationRequired(const QUrl &, QAuthenticator *auth, const QString &… in handleProxyAuthenticationRequired() argument
138 auth->setUser(passwordDialog.m_userNameLineEdit->text()); in handleProxyAuthenticationRequired()
139 auth->setPassword(passwordDialog.m_passwordLineEdit->text()); in handleProxyAuthenticationRequired()
142 *auth = QAuthenticator(); in handleProxyAuthenticationRequired()
/OK3568_Linux_fs/kernel/tools/testing/selftests/tpm2/
H A Dtpm2_tests.py24 auth = ('A' * 15).encode()
26 blob = self.client.seal(self.root_key, data, auth, None)
27 result = self.client.unseal(self.root_key, blob, auth, None)
34 auth = ('A' * 15).encode()
45 blob = self.client.seal(self.root_key, data, auth, policy_dig)
53 result = self.client.unseal(self.root_key, blob, auth, handle)
62 auth = ('A' * 20).encode()
65 blob = self.client.seal(self.root_key, data, auth, None)
68 auth[:-1] + 'B'.encode(), None)
78 auth = ('A' * 17).encode()
[all …]
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/
H A Dvlock_pam_tally2_reset.patch12 src/auth-pam.c | 3 +++
15 diff --git a/src/auth-pam.c b/src/auth-pam.c
17 --- a/src/auth-pam.c
18 +++ b/src/auth-pam.c
19 @@ -148,6 +148,9 @@ bool auth(const char *user, struct timespec *timeout)
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/polkit/polkit/
H A Dpolkit-1_pam.patch1 polkit: No system-auth in OE-Core, we can use common-* in place of it.
22 - PAM_FILE_INCLUDE_AUTH=system-auth
23 - PAM_FILE_INCLUDE_ACCOUNT=system-auth
24 - PAM_FILE_INCLUDE_PASSWORD=system-auth
25 - PAM_FILE_INCLUDE_SESSION=system-auth
26 + PAM_FILE_INCLUDE_AUTH=common-auth
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-netkit/netkit-rsh/netkit-rsh/
H A Drlogin.pam4 auth required pam_nologin.so
5 auth required pam_securetty.so
6 auth required pam_env.so
7 auth include common-auth
/OK3568_Linux_fs/external/rkwifibt/drivers/rtl8821cs/core/crypto/
H A Daes-ccm.c116 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument
126 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth()
127 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_encr_auth()
131 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument
136 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_decr_auth()
141 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth()
149 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument
168 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae()
179 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument
195 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()
/OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/rtl8821cs/core/crypto/
H A Daes-ccm.c117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument
127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth()
128 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_encr_auth()
132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument
137 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_decr_auth()
142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth()
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument
169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae()
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument
196 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()
/OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/rtl8723ds/core/crypto/
H A Daes-ccm.c117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument
127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth()
128 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_encr_auth()
132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument
137 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_decr_auth()
142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth()
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument
169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae()
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument
196 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()

12345678910>>...18