| /OK3568_Linux_fs/external/xserver/os/ |
| H A D | mitauth.c | 43 static struct auth { struct 44 struct auth *next; argument 53 struct auth *new; in MitAddCookie() argument 55 new = malloc(sizeof(struct auth)); in MitAddCookie() 75 struct auth *auth; in MitCheckCookie() local 77 for (auth = mit_auth; auth; auth = auth->next) { in MitCheckCookie() 78 if (data_length == auth->len && in MitCheckCookie() 79 timingsafe_memcmp(data, auth->data, (int) data_length) == 0) in MitCheckCookie() 80 return auth->id; in MitCheckCookie() 89 struct auth *auth, *next; in MitResetCookie() local [all …]
|
| H A D | xdmauth.c | 202 XdmClientAuthDecode(const unsigned char *plain, XdmClientAuthPtr auth) in XdmClientAuthDecode() argument 208 auth->rho.data[i] = plain[j]; in XdmClientAuthDecode() 212 auth->client[i] = plain[j]; in XdmClientAuthDecode() 215 auth->time = 0; in XdmClientAuthDecode() 217 auth->time |= plain[j] << ((3 - i) << 3); in XdmClientAuthDecode() 369 XdmAuthorizationPtr auth; in XdmCheckCookie() local 379 for (auth = xdmAuth; auth; auth = auth->next) { in XdmCheckCookie() 380 XdmcpUnwrap((unsigned char *) cookie, (unsigned char *) &auth->key, in XdmCheckCookie() 383 XdmAuthorizationValidate(plain, cookie_length, &auth->rho, xclient, in XdmCheckCookie() 388 return auth->id; in XdmCheckCookie() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/gpu/drm/amd/display/modules/hdcp/ |
| H A D | hdcp_ddc.c | 249 hdcp->auth.msg.hdcp1.bksv, in mod_hdcp_read_bksv() 250 sizeof(hdcp->auth.msg.hdcp1.bksv)); in mod_hdcp_read_bksv() 256 &hdcp->auth.msg.hdcp1.bcaps, in mod_hdcp_read_bcaps() 257 sizeof(hdcp->auth.msg.hdcp1.bcaps)); in mod_hdcp_read_bcaps() 266 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus, in mod_hdcp_read_bstatus() 270 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus, in mod_hdcp_read_bstatus() 271 sizeof(hdcp->auth.msg.hdcp1.bstatus)); in mod_hdcp_read_bstatus() 278 (uint8_t *)&hdcp->auth.msg.hdcp1.r0p, in mod_hdcp_read_r0p() 279 sizeof(hdcp->auth.msg.hdcp1.r0p)); in mod_hdcp_read_r0p() 289 hdcp->auth.msg.hdcp1.ksvlist, in mod_hdcp_read_ksvlist() [all …]
|
| H A D | hdcp_log.h | 111 HDCP_DDC_READ_TRACE(hdcp, "BKSV", hdcp->auth.msg.hdcp1.bksv, \ 112 sizeof(hdcp->auth.msg.hdcp1.bksv)); \ 113 HDCP_DDC_READ_TRACE(hdcp, "BCAPS", &hdcp->auth.msg.hdcp1.bcaps, \ 114 sizeof(hdcp->auth.msg.hdcp1.bcaps)); \ 116 (uint8_t *)&hdcp->auth.msg.hdcp1.bstatus, \ 117 sizeof(hdcp->auth.msg.hdcp1.bstatus)); \ 118 HDCP_DDC_WRITE_TRACE(hdcp, "AN", hdcp->auth.msg.hdcp1.an, \ 119 sizeof(hdcp->auth.msg.hdcp1.an)); \ 120 HDCP_DDC_WRITE_TRACE(hdcp, "AKSV", hdcp->auth.msg.hdcp1.aksv, \ 121 sizeof(hdcp->auth.msg.hdcp1.aksv)); \ [all …]
|
| H A D | hdcp_psp.c | 37 in->session_handle = hdcp->auth.id; in hdcp2_message_init() 152 hdcp->auth.id = hdcp_cmd->out_msg.hdcp1_create_session.session_handle; in mod_hdcp_hdcp1_create_session() 157 hdcp->auth.msg.hdcp1.ainfo = hdcp_cmd->out_msg.hdcp1_create_session.ainfo_primary; in mod_hdcp_hdcp1_create_session() 158 memcpy(hdcp->auth.msg.hdcp1.aksv, hdcp_cmd->out_msg.hdcp1_create_session.aksv_primary, in mod_hdcp_hdcp1_create_session() 159 sizeof(hdcp->auth.msg.hdcp1.aksv)); in mod_hdcp_hdcp1_create_session() 160 memcpy(hdcp->auth.msg.hdcp1.an, hdcp_cmd->out_msg.hdcp1_create_session.an_primary, in mod_hdcp_hdcp1_create_session() 161 sizeof(hdcp->auth.msg.hdcp1.an)); in mod_hdcp_hdcp1_create_session() 180 hdcp_cmd->in_msg.hdcp1_destroy_session.session_handle = hdcp->auth.id; in mod_hdcp_hdcp1_destroy_session() 212 hdcp_cmd->in_msg.hdcp1_first_part_authentication.session_handle = hdcp->auth.id; in mod_hdcp_hdcp1_validate_rx() 214 memcpy(hdcp_cmd->in_msg.hdcp1_first_part_authentication.bksv_primary, hdcp->auth.msg.hdcp1.bksv, in mod_hdcp_hdcp1_validate_rx() [all …]
|
| H A D | hdcp2_execution.c | 35 is_ready = HDCP_2_2_DP_RXSTATUS_READY(hdcp->auth.msg.hdcp2.rxstatus_dp) ? 1 : 0; in check_receiver_id_list_ready() 37 is_ready = (HDCP_2_2_HDMI_RXSTATUS_READY(hdcp->auth.msg.hdcp2.rxstatus[1]) && in check_receiver_id_list_ready() 38 (HDCP_2_2_HDMI_RXSTATUS_MSG_SZ_HI(hdcp->auth.msg.hdcp2.rxstatus[1]) << 8 | in check_receiver_id_list_ready() 39 hdcp->auth.msg.hdcp2.rxstatus[0])) ? 1 : 0; in check_receiver_id_list_ready() 49 status = (hdcp->auth.msg.hdcp2.rxcaps_dp[0] == HDCP_2_2_RX_CAPS_VERSION_VAL) && in check_hdcp2_capable() 50 HDCP_2_2_DP_HDCP_CAPABLE(hdcp->auth.msg.hdcp2.rxcaps_dp[2]) ? in check_hdcp2_capable() 54 status = (hdcp->auth.msg.hdcp2.hdcp2version_hdmi & HDCP_2_2_HDMI_SUPPORT_MASK) ? in check_hdcp2_capable() 66 ret = HDCP_2_2_DP_RXSTATUS_REAUTH_REQ(hdcp->auth.msg.hdcp2.rxstatus_dp) ? in check_reauthentication_request() 70 ret = HDCP_2_2_HDMI_RXSTATUS_REAUTH_REQ(hdcp->auth.msg.hdcp2.rxstatus[1]) ? in check_reauthentication_request() 79 return HDCP_2_2_DP_RXSTATUS_LINK_FAILED(hdcp->auth.msg.hdcp2.rxstatus_dp) ? in check_link_integrity_failure_dp() [all …]
|
| H A D | hdcp1_execution.c | 34 memcpy(bksv, hdcp->auth.msg.hdcp1.bksv, sizeof(hdcp->auth.msg.hdcp1.bksv)); in validate_bksv() 48 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_READY) ? in check_ksv_ready() 51 return (hdcp->auth.msg.hdcp1.bcaps & DRM_HDCP_DDC_BCAPS_KSV_FIFO_READY) ? in check_ksv_ready() 58 return (hdcp->auth.msg.hdcp1.bcaps & DP_BCAPS_HDCP_CAPABLE) ? in check_hdcp_capable_dp() 67 status = (hdcp->auth.msg.hdcp1.bstatus & in check_r0p_available_dp() 80 return (hdcp->auth.msg.hdcp1.bstatus & in check_link_integrity_dp() 89 return (hdcp->auth.msg.hdcp1.bstatus & DP_BSTATUS_REAUTH_REQ) ? in check_no_reauthentication_request_dp() 99 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth.msg.hdcp1.binfo_dp >> 8) in check_no_max_cascade() 103 status = DRM_HDCP_MAX_CASCADE_EXCEEDED(hdcp->auth.msg.hdcp1.bstatus >> 8) in check_no_max_cascade() 114 status = DRM_HDCP_MAX_DEVICE_EXCEEDED(hdcp->auth.msg.hdcp1.binfo_dp) ? in check_no_max_devs() [all …]
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | authencesn.c | 26 struct crypto_ahash_spawn auth; member 32 struct crypto_ahash *auth; member 62 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_setkey() local 70 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_esn_setkey() 71 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc_esn) & in crypto_authenc_esn_setkey() 73 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey() 92 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv_tail() local 94 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_esn_genicv_tail() 125 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv() local 127 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_esn_genicv() [all …]
|
| H A D | authenc.c | 23 struct crypto_ahash_spawn auth; member 29 struct crypto_ahash *auth; member 88 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local 96 crypto_ahash_clear_flags(auth, CRYPTO_TFM_REQ_MASK); in crypto_authenc_setkey() 97 crypto_ahash_set_flags(auth, crypto_aead_get_flags(authenc) & in crypto_authenc_setkey() 99 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 138 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_genicv() local 144 hash = (u8 *)ALIGN((unsigned long)hash + crypto_ahash_alignmask(auth), in crypto_authenc_genicv() 145 crypto_ahash_alignmask(auth) + 1); in crypto_authenc_genicv() 147 ahash_request_set_tfm(ahreq, auth); in crypto_authenc_genicv() [all …]
|
| /OK3568_Linux_fs/kernel/include/linux/ceph/ |
| H A D | auth.h | 28 int (*sign_message)(struct ceph_auth_handshake *auth, 30 int (*check_message_signature)(struct ceph_auth_handshake *auth, 63 struct ceph_auth_handshake *auth); 66 struct ceph_auth_handshake *auth); 81 int (*sign_message)(struct ceph_auth_handshake *auth, 83 int (*check_message_signature)(struct ceph_auth_handshake *auth, 120 struct ceph_auth_handshake *auth); 134 static inline int ceph_auth_sign_message(struct ceph_auth_handshake *auth, in ceph_auth_sign_message() argument 137 if (auth->sign_message) in ceph_auth_sign_message() 138 return auth->sign_message(auth, msg); in ceph_auth_sign_message() [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/files/ |
| H A D | shadow-update-pam-conf.patch | 1 The system-auth in the configure files is from Fedora which put all the 4 pam type rules 3 In yocto it obey the way with Debian/Ubuntu, and the names are common-auth, common-account, 16 auth sufficient pam_rootok.so 18 -password include system-auth 25 auth sufficient pam_rootok.so 27 -password include system-auth 34 auth sufficient pam_rootok.so 36 -password include system-auth 43 auth sufficient pam_rootok.so 45 -password include system-auth [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/strongswan/files/ |
| H A D | CVE-2022-40617.patch | 34 - int pathlen, bool trusted, auth_cfg_t *auth) 35 + int pathlen, bool anchor, auth_cfg_t *auth) 43 - pathlen, trusted, auth); 44 + pathlen, anchor, auth); 52 - int pathlen, bool trusted, auth_cfg_t *auth) 53 + int pathlen, bool anchor, auth_cfg_t *auth) 58 if (!check_lifetime(this, subject, "subject", pathlen, FALSE, auth) || 59 - !check_lifetime(this, issuer, "issuer", pathlen + 1, trusted, auth)) 60 + !check_lifetime(this, issuer, "issuer", pathlen + 1, anchor, auth)) 68 - online, pathlen, trusted, auth)) [all …]
|
| /OK3568_Linux_fs/kernel/net/sunrpc/ |
| H A D | auth.c | 227 struct rpc_auth *auth = ERR_PTR(-EINVAL); in rpcauth_create() local 235 auth = ops->create(args, clnt); in rpcauth_create() 238 if (IS_ERR(auth)) in rpcauth_create() 239 return auth; in rpcauth_create() 242 clnt->cl_auth = auth; in rpcauth_create() 245 return auth; in rpcauth_create() 250 rpcauth_release(struct rpc_auth *auth) in rpcauth_release() argument 252 if (!refcount_dec_and_test(&auth->au_count)) in rpcauth_release() 254 auth->au_ops->destroy(auth); in rpcauth_release() 291 rpcauth_init_credcache(struct rpc_auth *auth) in rpcauth_init_credcache() argument [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/cronie/cronie/ |
| H A D | crond_pam_config.patch | 1 password-auth is the Fedora's common pam configure file, use oe common pam 13 # Although no PAM authentication is called, auth modules 15 -auth include system-auth 16 +auth include common-auth 18 -account include system-auth 19 +account include common-auth 21 -session include system-auth
|
| /OK3568_Linux_fs/kernel/drivers/target/iscsi/ |
| H A D | iscsi_target_auth.c | 139 struct iscsi_node_auth *auth, in chap_server_open() argument 147 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open() 148 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open() 210 struct iscsi_node_auth *auth, in chap_server_compute_hash() argument 284 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash() 285 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash() 340 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash() 341 strlen(auth->password)); in chap_server_compute_hash() 369 if (!auth->authenticate_target) { in chap_server_compute_hash() 454 ret = crypto_shash_update(desc, auth->password_mutual, in chap_server_compute_hash() [all …]
|
| /OK3568_Linux_fs/kernel/net/sctp/ |
| H A D | output.c | 67 packet->auth = NULL; in sctp_packet_reset() 220 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local 235 if (!chunk->auth) in sctp_packet_bundle_auth() 238 auth = sctp_make_auth(asoc, chunk->shkey->key_id); in sctp_packet_bundle_auth() 239 if (!auth) in sctp_packet_bundle_auth() 242 auth->shkey = chunk->shkey; in sctp_packet_bundle_auth() 243 sctp_auth_shkey_hold(auth->shkey); in sctp_packet_bundle_auth() 245 retval = __sctp_packet_append_chunk(pkt, auth); in sctp_packet_bundle_auth() 248 sctp_chunk_free(auth); in sctp_packet_bundle_auth() 342 packet->auth = chunk; in __sctp_packet_append_chunk() [all …]
|
| /OK3568_Linux_fs/app/forlinx/flapp/src/plugins/imxwayland/simplebrowser/ |
| H A D | webpage.cpp | 88 void WebPage::handleAuthenticationRequired(const QUrl &requestUrl, QAuthenticator *auth) in handleAuthenticationRequired() argument 103 .arg(auth->realm()).arg(requestUrl.toString().toHtmlEscaped())); in handleAuthenticationRequired() 108 auth->setUser(passwordDialog.m_userNameLineEdit->text()); in handleAuthenticationRequired() 109 auth->setPassword(passwordDialog.m_passwordLineEdit->text()); in handleAuthenticationRequired() 112 *auth = QAuthenticator(); in handleAuthenticationRequired() 116 void WebPage::handleProxyAuthenticationRequired(const QUrl &, QAuthenticator *auth, const QString &… in handleProxyAuthenticationRequired() argument 136 auth->setUser(passwordDialog.m_userNameLineEdit->text()); in handleProxyAuthenticationRequired() 137 auth->setPassword(passwordDialog.m_passwordLineEdit->text()); in handleProxyAuthenticationRequired() 140 *auth = QAuthenticator(); in handleProxyAuthenticationRequired()
|
| /OK3568_Linux_fs/app/forlinx/flapp/src/plugins/simplebrowser/ |
| H A D | webpage.cpp | 90 void WebPage::handleAuthenticationRequired(const QUrl &requestUrl, QAuthenticator *auth) in handleAuthenticationRequired() argument 105 .arg(auth->realm()).arg(requestUrl.toString().toHtmlEscaped())); in handleAuthenticationRequired() 110 auth->setUser(passwordDialog.m_userNameLineEdit->text()); in handleAuthenticationRequired() 111 auth->setPassword(passwordDialog.m_passwordLineEdit->text()); in handleAuthenticationRequired() 114 *auth = QAuthenticator(); in handleAuthenticationRequired() 118 void WebPage::handleProxyAuthenticationRequired(const QUrl &, QAuthenticator *auth, const QString &… in handleProxyAuthenticationRequired() argument 138 auth->setUser(passwordDialog.m_userNameLineEdit->text()); in handleProxyAuthenticationRequired() 139 auth->setPassword(passwordDialog.m_passwordLineEdit->text()); in handleProxyAuthenticationRequired() 142 *auth = QAuthenticator(); in handleProxyAuthenticationRequired()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/tpm2/ |
| H A D | tpm2_tests.py | 24 auth = ('A' * 15).encode() 26 blob = self.client.seal(self.root_key, data, auth, None) 27 result = self.client.unseal(self.root_key, blob, auth, None) 34 auth = ('A' * 15).encode() 45 blob = self.client.seal(self.root_key, data, auth, policy_dig) 53 result = self.client.unseal(self.root_key, blob, auth, handle) 62 auth = ('A' * 20).encode() 65 blob = self.client.seal(self.root_key, data, auth, None) 68 auth[:-1] + 'B'.encode(), None) 78 auth = ('A' * 17).encode() [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
| H A D | vlock_pam_tally2_reset.patch | 12 src/auth-pam.c | 3 +++ 15 diff --git a/src/auth-pam.c b/src/auth-pam.c 17 --- a/src/auth-pam.c 18 +++ b/src/auth-pam.c 19 @@ -148,6 +148,9 @@ bool auth(const char *user, struct timespec *timeout)
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/polkit/polkit/ |
| H A D | polkit-1_pam.patch | 1 polkit: No system-auth in OE-Core, we can use common-* in place of it. 22 - PAM_FILE_INCLUDE_AUTH=system-auth 23 - PAM_FILE_INCLUDE_ACCOUNT=system-auth 24 - PAM_FILE_INCLUDE_PASSWORD=system-auth 25 - PAM_FILE_INCLUDE_SESSION=system-auth 26 + PAM_FILE_INCLUDE_AUTH=common-auth
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-netkit/netkit-rsh/netkit-rsh/ |
| H A D | rlogin.pam | 4 auth required pam_nologin.so 5 auth required pam_securetty.so 6 auth required pam_env.so 7 auth include common-auth
|
| /OK3568_Linux_fs/external/rkwifibt/drivers/rtl8821cs/core/crypto/ |
| H A D | aes-ccm.c | 116 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument 126 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 127 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_encr_auth() 131 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument 136 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_decr_auth() 141 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth() 149 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 168 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae() 179 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument 195 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/rtl8821cs/core/crypto/ |
| H A D | aes-ccm.c | 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument 127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 128 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_encr_auth() 132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument 137 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_decr_auth() 142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae() 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument 196 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/rtl8723ds/core/crypto/ |
| H A D | aes-ccm.c | 117 static void aes_ccm_encr_auth(void *aes, size_t M, u8 *x, u8 *a, u8 *auth) in aes_ccm_encr_auth() argument 127 auth[i] = x[i] ^ tmp[i]; in aes_ccm_encr_auth() 128 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_encr_auth() 132 static void aes_ccm_decr_auth(void *aes, size_t M, u8 *a, const u8 *auth, u8 *t) in aes_ccm_decr_auth() argument 137 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM U", auth, M); in aes_ccm_decr_auth() 142 t[i] = auth[i] ^ tmp[i]; in aes_ccm_decr_auth() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 169 aes_ccm_encr_auth(aes, M, x, a, auth); in aes_ccm_ae() 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) in aes_ccm_ad() argument 196 aes_ccm_decr_auth(aes, M, a, auth, t); in aes_ccm_ad()
|