/openbmc/qemu/tests/unit/ |
H A D | test-authz-list.c | 28 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_default_deny() local 34 object_unparent(OBJECT(auth)); in test_authz_default_deny() 39 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_default_allow() local 45 object_unparent(OBJECT(auth)); in test_authz_default_allow() 50 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_explicit_deny() local 59 object_unparent(OBJECT(auth)); in test_authz_explicit_deny() 64 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_explicit_allow() local 73 object_unparent(OBJECT(auth)); in test_authz_explicit_allow() 79 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_complex() local 97 object_unparent(OBJECT(auth)); in test_authz_complex() [all …]
|
H A D | test-authz-listfile.c | 53 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_default_deny() local 61 object_unparent(OBJECT(auth)); in test_authz_default_deny() 71 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_default_allow() local 77 g_assert(qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort)); in test_authz_default_allow() 79 object_unparent(OBJECT(auth)); in test_authz_default_allow() 93 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_explicit_deny() local 102 object_unparent(OBJECT(auth)); in test_authz_explicit_deny() 116 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_explicit_allow() local 125 object_unparent(OBJECT(auth)); in test_authz_explicit_allow() 150 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_complex() local [all …]
|
H A D | test-authz-pam.c | 79 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_unknown_service() local 83 g_assert_nonnull(auth); in test_authz_unknown_service() 85 g_assert_false(qauthz_is_allowed(QAUTHZ(auth), "fred", &local_err)); in test_authz_unknown_service() 88 object_unparent(OBJECT(auth)); in test_authz_unknown_service() 94 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_good_user() local 98 g_assert_nonnull(auth); in test_authz_good_user() 102 object_unparent(OBJECT(auth)); in test_authz_good_user() 109 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_bad_user() local 113 g_assert_nonnull(auth); in test_authz_bad_user() 115 g_assert_false(qauthz_is_allowed(QAUTHZ(auth), "bob", &local_err)); in test_authz_bad_user() [all …]
|
/openbmc/linux/drivers/gpu/drm/amd/display/modules/hdcp/ |
H A D | hdcp_log.c | 58 sizeof(hdcp->auth.msg.hdcp1.bksv)); in mod_hdcp_log_ddc_trace() 60 sizeof(hdcp->auth.msg.hdcp1.bcaps)); in mod_hdcp_log_ddc_trace() 65 sizeof(hdcp->auth.msg.hdcp1.an)); in mod_hdcp_log_ddc_trace() 67 sizeof(hdcp->auth.msg.hdcp1.aksv)); in mod_hdcp_log_ddc_trace() 69 sizeof(hdcp->auth.msg.hdcp1.ainfo)); in mod_hdcp_log_ddc_trace() 71 (uint8_t *)&hdcp->auth.msg.hdcp1.r0p, in mod_hdcp_log_ddc_trace() 72 sizeof(hdcp->auth.msg.hdcp1.r0p)); in mod_hdcp_log_ddc_trace() 77 hdcp->auth.msg.hdcp1.ksvlist_size); in mod_hdcp_log_ddc_trace() 79 sizeof(hdcp->auth.msg.hdcp1.vp)); in mod_hdcp_log_ddc_trace() 91 hdcp->auth.msg.hdcp2.ake_stored_km, in mod_hdcp_log_ddc_trace() [all …]
|
H A D | hdcp_ddc.c | 249 hdcp->auth.msg.hdcp1.bksv, in mod_hdcp_read_bksv() 256 &hdcp->auth.msg.hdcp1.bcaps, in mod_hdcp_read_bcaps() 289 hdcp->auth.msg.hdcp1.ksvlist, in mod_hdcp_read_ksvlist() 304 &hdcp->auth.msg.hdcp1.vp[0], 4); in mod_hdcp_read_vp() 309 &hdcp->auth.msg.hdcp1.vp[4], 4); in mod_hdcp_read_vp() 314 &hdcp->auth.msg.hdcp1.vp[8], 4); in mod_hdcp_read_vp() 346 hdcp->auth.msg.hdcp1.aksv, in mod_hdcp_write_aksv() 353 &hdcp->auth.msg.hdcp1.ainfo, in mod_hdcp_write_ainfo() 360 hdcp->auth.msg.hdcp1.an, in mod_hdcp_write_an() 584 hdcp->auth.msg.hdcp2.lc_init, in mod_hdcp_write_lc_init() [all …]
|
H A D | hdcp_psp.c | 37 in->session_handle = hdcp->auth.id; in hdcp2_message_init() 280 sizeof(hdcp->auth.msg.hdcp1.aksv)); in mod_hdcp_hdcp1_create_session() 282 sizeof(hdcp->auth.msg.hdcp1.an)); in mod_hdcp_hdcp1_create_session() 405 hdcp->auth.msg.hdcp1.ksvlist_size); in mod_hdcp_hdcp1_validate_ksvlist_vp() 408 sizeof(hdcp->auth.msg.hdcp1.vp)); in mod_hdcp_hdcp1_validate_ksvlist_vp() 411 is_dp_hdcp(hdcp) ? hdcp->auth.msg.hdcp1.binfo_dp : hdcp->auth.msg.hdcp1.bstatus; in mod_hdcp_hdcp1_validate_ksvlist_vp() 631 sizeof(hdcp->auth.msg.hdcp2.ake_cert)); in mod_hdcp_hdcp2_validate_ake_cert() 647 memcpy(hdcp->auth.msg.hdcp2.ake_stored_km, in mod_hdcp_hdcp2_validate_ake_cert() 697 hdcp->auth.msg.hdcp2.ake_pairing_info, sizeof(hdcp->auth.msg.hdcp2.ake_pairing_info)); in mod_hdcp_hdcp2_validate_h_prime() 812 memcpy(hdcp->auth.msg.hdcp2.ske_eks, in mod_hdcp_hdcp2_prepare_eks() [all …]
|
H A D | hdcp2_execution.c | 39 hdcp->auth.msg.hdcp2.rxstatus[0])) ? 1 : 0; in check_receiver_id_list_ready() 95 hdcp->auth.msg.hdcp2.rxstatus[0]; in check_ake_cert_available() 96 status = (size == sizeof(hdcp->auth.msg.hdcp2.ake_cert)) ? in check_ake_cert_available() 119 hdcp->auth.msg.hdcp2.rxstatus[0]; in check_h_prime_available() 143 hdcp->auth.msg.hdcp2.rxstatus[0]; in check_pairing_info_available() 171 hdcp->auth.msg.hdcp2.rxstatus[0]; in poll_l_prime_available() 193 hdcp->auth.msg.hdcp2.rxstatus[0]; in check_stream_ready_available() 249 hdcp->auth.msg.hdcp2.rx_id_list_size = in process_rxstatus() 250 sizeof(hdcp->auth.msg.hdcp2.rx_id_list); in process_rxstatus() 252 hdcp->auth.msg.hdcp2.rx_id_list_size = in process_rxstatus() [all …]
|
/openbmc/linux/include/linux/ceph/ |
H A D | auth.h | 28 int (*sign_message)(struct ceph_auth_handshake *auth, 63 struct ceph_auth_handshake *auth); 66 struct ceph_auth_handshake *auth); 128 struct ceph_auth_handshake *auth, 147 if (auth->sign_message) in ceph_auth_sign_message() 148 return auth->sign_message(auth, msg); in ceph_auth_sign_message() 156 if (auth->check_message_signature) in ceph_auth_check_message_signature() 157 return auth->check_message_signature(auth, msg); in ceph_auth_check_message_signature() 174 struct ceph_auth_handshake *auth, 177 struct ceph_auth_handshake *auth, [all …]
|
/openbmc/linux/crypto/ |
H A D | authencesn.c | 32 struct crypto_ahash *auth; member 62 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_setkey() local 92 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv_tail() local 124 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv() local 226 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_decrypt_tail() local 274 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_decrypt() local 329 auth = crypto_spawn_ahash(&ictx->auth); in crypto_authenc_esn_init_tfm() 330 if (IS_ERR(auth)) in crypto_authenc_esn_init_tfm() 331 return PTR_ERR(auth); in crypto_authenc_esn_init_tfm() 343 ctx->auth = auth; in crypto_authenc_esn_init_tfm() [all …]
|
H A D | authenc.c | 29 struct crypto_ahash *auth; member 88 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local 138 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_genicv() local 283 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_decrypt() local 315 auth = crypto_spawn_ahash(&ictx->auth); in crypto_authenc_init_tfm() 316 if (IS_ERR(auth)) in crypto_authenc_init_tfm() 317 return PTR_ERR(auth); in crypto_authenc_init_tfm() 329 ctx->auth = auth; in crypto_authenc_init_tfm() 348 crypto_free_ahash(auth); in crypto_authenc_init_tfm() 394 auth = crypto_spawn_ahash_alg(&ctx->auth); in crypto_authenc_create() [all …]
|
/openbmc/linux/arch/powerpc/platforms/pseries/ |
H A D | plpks.c | 181 if (!auth) in construct_auth() 184 auth->version = 1; in construct_auth() 188 return auth; in construct_auth() 194 return auth; in construct_auth() 448 if (IS_ERR(auth)) in plpks_signed_update_var() 479 kfree(auth); in plpks_signed_update_var() 499 if (IS_ERR(auth)) in plpks_write_var() 518 kfree(auth); in plpks_write_var() 534 if (IS_ERR(auth)) in plpks_remove_var() 552 kfree(auth); in plpks_remove_var() [all …]
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/openssl-tpm-engine/files/ |
H A D | 0002-libtpm-support-env-TPM_SRK_PW.patch | 30 BYTE *auth; 45 - free(auth); 51 + memset(auth, 0, TPM_WELL_KNOWN_KEY_LEN); 56 + memset(auth, 0, authbuflen); 57 + strncpy(auth, srkPasswd, authbuflen-1); 59 + authlen = strlen(auth); 66 + free(auth); 71 + authlen = strlen(auth); 77 - strlen((char *)auth), auth))) { 79 + authlen, auth))) { [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | shadow-update-pam-conf.patch | 35 auth sufficient pam_rootok.so 37 -password include system-auth 45 auth sufficient pam_rootok.so 47 -password include system-auth 55 auth sufficient pam_rootok.so 57 -password include system-auth 65 auth sufficient pam_rootok.so 67 -password include system-auth 77 -password include system-auth 87 -password include system-auth [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/cronie/cronie/ |
H A D | crond_pam_config.patch | 6 password-auth is the Fedora's common pam configure file, use oe common pam 23 # Although no PAM authentication is called, auth modules 25 -auth include system-auth 26 +auth include common-auth 28 -account include system-auth 29 +account include common-auth 31 -session include system-auth
|
/openbmc/linux/net/sunrpc/ |
H A D | auth.c | 235 if (IS_ERR(auth)) in rpcauth_create() 236 return auth; in rpcauth_create() 239 clnt->cl_auth = auth; in rpcauth_create() 242 return auth; in rpcauth_create() 251 auth->au_ops->destroy(auth); in rpcauth_release() 538 new = auth->au_ops->crcreate(auth, acred, flags, gfp); in rpcauth_lookup_credcache() 586 ret = auth->au_ops->lookup_cred(auth, &acred, flags); in rpcauth_lookupcred() 598 cred->cr_auth = auth; in rpcauth_init_cred() 617 ret = auth->au_ops->lookup_cred(auth, &acred, lookupflags); in rpcauth_bind_root_cred() 635 return auth->au_ops->lookup_cred(auth, &acred, lookupflags); in rpcauth_bind_machine_cred() [all …]
|
/openbmc/openbmc/poky/meta/recipes-support/curl/ |
H A D | curl_8.7.1.bb | 28 ….utils.filter('DISTRO_FEATURES', 'ipv6', d)} aws basic-auth bearer-auth digest-auth negotiate-auth… 35 PACKAGECONFIG[basic-auth] = "--enable-basic-auth,--disable-basic-auth" 36 PACKAGECONFIG[bearer-auth] = "--enable-bearer-auth,--disable-bearer-auth" 42 PACKAGECONFIG[digest-auth] = "--enable-digest-auth,--disable-digest-auth" 47 PACKAGECONFIG[kerberos-auth] = "--enable-kerberos-auth,--disable-kerberos-auth" 56 PACKAGECONFIG[negotiate-auth] = "--enable-negotiate-auth,--disable-negotiate-auth"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
H A D | vlock_pam_tally2_reset.patch | 12 src/auth-pam.c | 3 +++ 15 diff --git a/src/auth-pam.c b/src/auth-pam.c 17 --- a/src/auth-pam.c 18 +++ b/src/auth-pam.c 19 @@ -148,6 +148,9 @@ bool auth(const char *user, struct timespec *timeout)
|
/openbmc/qemu/ui/ |
H A D | vnc-auth-sasl.c | 182 trace_vnc_auth_fail(vs, vs->auth, "No SASL username set", ""); in vnc_auth_sasl_check_access() 197 trace_vnc_auth_fail(vs, vs->auth, "Error from authz", in vnc_auth_sasl_check_access() 278 trace_vnc_auth_fail(vs, vs->auth, "Cannot step SASL auth", in protocol_client_auth_sasl_step() 286 trace_vnc_auth_fail(vs, vs->auth, "SASL data too long", ""); in protocol_client_auth_sasl_step() 316 trace_vnc_auth_pass(vs, vs->auth); in protocol_client_auth_sasl_step() 400 trace_vnc_auth_fail(vs, vs->auth, "Cannot start SASL auth", in protocol_client_auth_sasl_start() 407 trace_vnc_auth_fail(vs, vs->auth, "SASL data too long", ""); in protocol_client_auth_sasl_start() 437 trace_vnc_auth_pass(vs, vs->auth); in protocol_client_auth_sasl_start() 566 trace_vnc_auth_fail(vs, vs->auth, "Cannot format local IP", in start_auth_sasl() 599 if (vs->auth == VNC_AUTH_VENCRYPT && in start_auth_sasl() [all …]
|
H A D | vnc-auth-vencrypt.c | 55 trace_vnc_auth_fail(vs, vs->auth, "Unhandled VeNCrypt subauth", ""); in start_auth_vencrypt_subauth() 73 trace_vnc_auth_fail(vs, vs->auth, "TLS handshake failed", in vnc_tls_handshake_done() 91 int auth = read_u32(data, 0); in protocol_client_vencrypt_auth() local 93 trace_vnc_auth_vencrypt_subauth(vs, auth); in protocol_client_vencrypt_auth() 94 if (auth != vs->subauth) { in protocol_client_vencrypt_auth() 95 trace_vnc_auth_fail(vs, vs->auth, "Unsupported sub-auth version", ""); in protocol_client_vencrypt_auth() 116 trace_vnc_auth_fail(vs, vs->auth, "TLS setup failed", in protocol_client_vencrypt_auth() 143 trace_vnc_auth_fail(vs, vs->auth, "Unsupported version", ""); in protocol_client_vencrypt_init()
|
/openbmc/linux/net/sctp/ |
H A D | output.c | 67 packet->auth = NULL; in sctp_packet_reset() 246 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local 261 if (!chunk->auth) in sctp_packet_bundle_auth() 265 if (!auth) in sctp_packet_bundle_auth() 268 auth->shkey = chunk->shkey; in sctp_packet_bundle_auth() 274 sctp_chunk_free(auth); in sctp_packet_bundle_auth() 368 packet->auth = chunk; in __sctp_packet_append_chunk() 463 if (chunk == packet->auth) in sctp_packet_pack() 519 if (auth) { in sctp_packet_pack() 793 if ((packet->auth && chunk->shkey != packet->auth->shkey) || in sctp_packet_will_fit() [all …]
|
/openbmc/qemu/authz/ |
H A D | list.c | 150 ssize_t qauthz_list_append_rule(QAuthZList *auth, in qauthz_list_append_rule() argument 169 rules = auth->rules; in qauthz_list_append_rule() 178 auth->rules = tmp; in qauthz_list_append_rule() 184 ssize_t qauthz_list_insert_rule(QAuthZList *auth, in qauthz_list_insert_rule() argument 204 rules = auth->rules; in qauthz_list_insert_rule() 214 tmp->next = auth->rules; in qauthz_list_insert_rule() 215 auth->rules = tmp; in qauthz_list_insert_rule() 221 ssize_t qauthz_list_delete_rule(QAuthZList *auth, const char *match) in qauthz_list_delete_rule() argument 228 rules = auth->rules; in qauthz_list_delete_rule() 235 auth->rules = rules->next; in qauthz_list_delete_rule()
|
/openbmc/linux/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 139 struct iscsi_node_auth *auth, in chap_server_open() argument 147 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open() 148 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open() 242 struct iscsi_node_auth *auth, in chap_server_compute_hash() argument 316 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash() 317 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash() 384 strlen(auth->password)); in chap_server_compute_hash() 412 if (!auth->authenticate_target) { in chap_server_compute_hash() 527 strlen(auth->password_mutual)); in chap_server_compute_hash() 573 struct iscsi_node_auth *auth, in chap_main_loop() argument [all …]
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
H A D | common-auth | 2 # /etc/pam.d/common-auth - authentication settings common to all services 12 auth [success=2 default=ignore] pam_unix.so quiet 13 -auth [success=1 default=ignore] pam_ldap.so ignore_unknown_user ignore_authinfo_unavail 16 auth [default=die] pam_faillock.so authfail 19 auth sufficient pam_faillock.so authsucc 21 auth requisite pam_deny.so 25 auth required pam_permit.so
|
/openbmc/bmcweb/config/ |
H A D | pam-webserver | 3 auth include common-auth 5 auth [success=ok perm_denied=1 default=ignore] pam_localuser.so 6 auth required pam_succeed_if.so user ingroup redfish
|
/openbmc/linux/tools/testing/selftests/tpm2/ |
H A D | tpm2_tests.py | 24 auth = ('A' * 15).encode() 26 blob = self.client.seal(self.root_key, data, auth, None) 27 result = self.client.unseal(self.root_key, blob, auth, None) 44 auth = ('A' * 15).encode() 55 blob = self.client.seal(self.root_key, data, auth, policy_dig) 72 auth = ('A' * 20).encode() 75 blob = self.client.seal(self.root_key, data, auth, None) 78 auth[:-1] + 'B'.encode(), None) 91 auth = ('A' * 17).encode() 148 auth = ('A' * (ds + 1)).encode() [all …]
|