Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 25 of 314) sorted by relevance

12345678910>>...13

/openbmc/qemu/tests/unit/
H A Dtest-authz-list.c28 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_default_deny() local
34 object_unparent(OBJECT(auth)); in test_authz_default_deny()
39 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_default_allow() local
45 object_unparent(OBJECT(auth)); in test_authz_default_allow()
50 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_explicit_deny() local
59 object_unparent(OBJECT(auth)); in test_authz_explicit_deny()
64 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_explicit_allow() local
73 object_unparent(OBJECT(auth)); in test_authz_explicit_allow()
79 QAuthZList *auth = qauthz_list_new("auth0", in test_authz_complex() local
97 object_unparent(OBJECT(auth)); in test_authz_complex()
[all …]
H A Dtest-authz-listfile.c53 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_default_deny() local
61 object_unparent(OBJECT(auth)); in test_authz_default_deny()
71 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_default_allow() local
77 g_assert(qauthz_is_allowed(QAUTHZ(auth), "fred", &error_abort)); in test_authz_default_allow()
79 object_unparent(OBJECT(auth)); in test_authz_default_allow()
93 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_explicit_deny() local
102 object_unparent(OBJECT(auth)); in test_authz_explicit_deny()
116 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_explicit_allow() local
125 object_unparent(OBJECT(auth)); in test_authz_explicit_allow()
150 QAuthZListFile *auth = qauthz_list_file_new("auth0", in test_authz_complex() local
[all …]
H A Dtest-authz-pam.c79 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_unknown_service() local
83 g_assert_nonnull(auth); in test_authz_unknown_service()
85 g_assert_false(qauthz_is_allowed(QAUTHZ(auth), "fred", &local_err)); in test_authz_unknown_service()
88 object_unparent(OBJECT(auth)); in test_authz_unknown_service()
94 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_good_user() local
98 g_assert_nonnull(auth); in test_authz_good_user()
102 object_unparent(OBJECT(auth)); in test_authz_good_user()
109 QAuthZPAM *auth = qauthz_pam_new("auth0", in test_authz_bad_user() local
113 g_assert_nonnull(auth); in test_authz_bad_user()
115 g_assert_false(qauthz_is_allowed(QAUTHZ(auth), "bob", &local_err)); in test_authz_bad_user()
[all …]
/openbmc/linux/drivers/gpu/drm/amd/display/modules/hdcp/
H A Dhdcp_log.c58 sizeof(hdcp->auth.msg.hdcp1.bksv)); in mod_hdcp_log_ddc_trace()
60 sizeof(hdcp->auth.msg.hdcp1.bcaps)); in mod_hdcp_log_ddc_trace()
65 sizeof(hdcp->auth.msg.hdcp1.an)); in mod_hdcp_log_ddc_trace()
67 sizeof(hdcp->auth.msg.hdcp1.aksv)); in mod_hdcp_log_ddc_trace()
69 sizeof(hdcp->auth.msg.hdcp1.ainfo)); in mod_hdcp_log_ddc_trace()
71 (uint8_t *)&hdcp->auth.msg.hdcp1.r0p, in mod_hdcp_log_ddc_trace()
72 sizeof(hdcp->auth.msg.hdcp1.r0p)); in mod_hdcp_log_ddc_trace()
77 hdcp->auth.msg.hdcp1.ksvlist_size); in mod_hdcp_log_ddc_trace()
79 sizeof(hdcp->auth.msg.hdcp1.vp)); in mod_hdcp_log_ddc_trace()
91 hdcp->auth.msg.hdcp2.ake_stored_km, in mod_hdcp_log_ddc_trace()
[all …]
H A Dhdcp_ddc.c249 hdcp->auth.msg.hdcp1.bksv, in mod_hdcp_read_bksv()
256 &hdcp->auth.msg.hdcp1.bcaps, in mod_hdcp_read_bcaps()
289 hdcp->auth.msg.hdcp1.ksvlist, in mod_hdcp_read_ksvlist()
304 &hdcp->auth.msg.hdcp1.vp[0], 4); in mod_hdcp_read_vp()
309 &hdcp->auth.msg.hdcp1.vp[4], 4); in mod_hdcp_read_vp()
314 &hdcp->auth.msg.hdcp1.vp[8], 4); in mod_hdcp_read_vp()
346 hdcp->auth.msg.hdcp1.aksv, in mod_hdcp_write_aksv()
353 &hdcp->auth.msg.hdcp1.ainfo, in mod_hdcp_write_ainfo()
360 hdcp->auth.msg.hdcp1.an, in mod_hdcp_write_an()
584 hdcp->auth.msg.hdcp2.lc_init, in mod_hdcp_write_lc_init()
[all …]
H A Dhdcp_psp.c37 in->session_handle = hdcp->auth.id; in hdcp2_message_init()
280 sizeof(hdcp->auth.msg.hdcp1.aksv)); in mod_hdcp_hdcp1_create_session()
282 sizeof(hdcp->auth.msg.hdcp1.an)); in mod_hdcp_hdcp1_create_session()
405 hdcp->auth.msg.hdcp1.ksvlist_size); in mod_hdcp_hdcp1_validate_ksvlist_vp()
408 sizeof(hdcp->auth.msg.hdcp1.vp)); in mod_hdcp_hdcp1_validate_ksvlist_vp()
411 is_dp_hdcp(hdcp) ? hdcp->auth.msg.hdcp1.binfo_dp : hdcp->auth.msg.hdcp1.bstatus; in mod_hdcp_hdcp1_validate_ksvlist_vp()
631 sizeof(hdcp->auth.msg.hdcp2.ake_cert)); in mod_hdcp_hdcp2_validate_ake_cert()
647 memcpy(hdcp->auth.msg.hdcp2.ake_stored_km, in mod_hdcp_hdcp2_validate_ake_cert()
697 hdcp->auth.msg.hdcp2.ake_pairing_info, sizeof(hdcp->auth.msg.hdcp2.ake_pairing_info)); in mod_hdcp_hdcp2_validate_h_prime()
812 memcpy(hdcp->auth.msg.hdcp2.ske_eks, in mod_hdcp_hdcp2_prepare_eks()
[all …]
H A Dhdcp2_execution.c39 hdcp->auth.msg.hdcp2.rxstatus[0])) ? 1 : 0; in check_receiver_id_list_ready()
95 hdcp->auth.msg.hdcp2.rxstatus[0]; in check_ake_cert_available()
96 status = (size == sizeof(hdcp->auth.msg.hdcp2.ake_cert)) ? in check_ake_cert_available()
119 hdcp->auth.msg.hdcp2.rxstatus[0]; in check_h_prime_available()
143 hdcp->auth.msg.hdcp2.rxstatus[0]; in check_pairing_info_available()
171 hdcp->auth.msg.hdcp2.rxstatus[0]; in poll_l_prime_available()
193 hdcp->auth.msg.hdcp2.rxstatus[0]; in check_stream_ready_available()
249 hdcp->auth.msg.hdcp2.rx_id_list_size = in process_rxstatus()
250 sizeof(hdcp->auth.msg.hdcp2.rx_id_list); in process_rxstatus()
252 hdcp->auth.msg.hdcp2.rx_id_list_size = in process_rxstatus()
[all …]
/openbmc/linux/include/linux/ceph/
H A Dauth.h28 int (*sign_message)(struct ceph_auth_handshake *auth,
63 struct ceph_auth_handshake *auth);
66 struct ceph_auth_handshake *auth);
128 struct ceph_auth_handshake *auth,
147 if (auth->sign_message) in ceph_auth_sign_message()
148 return auth->sign_message(auth, msg); in ceph_auth_sign_message()
156 if (auth->check_message_signature) in ceph_auth_check_message_signature()
157 return auth->check_message_signature(auth, msg); in ceph_auth_check_message_signature()
174 struct ceph_auth_handshake *auth,
177 struct ceph_auth_handshake *auth,
[all …]
/openbmc/linux/crypto/
H A Dauthencesn.c32 struct crypto_ahash *auth; member
62 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_setkey() local
92 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv_tail() local
124 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_genicv() local
226 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_decrypt_tail() local
274 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_esn_decrypt() local
329 auth = crypto_spawn_ahash(&ictx->auth); in crypto_authenc_esn_init_tfm()
330 if (IS_ERR(auth)) in crypto_authenc_esn_init_tfm()
331 return PTR_ERR(auth); in crypto_authenc_esn_init_tfm()
343 ctx->auth = auth; in crypto_authenc_esn_init_tfm()
[all …]
H A Dauthenc.c29 struct crypto_ahash *auth; member
88 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_setkey() local
138 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_genicv() local
283 struct crypto_ahash *auth = ctx->auth; in crypto_authenc_decrypt() local
315 auth = crypto_spawn_ahash(&ictx->auth); in crypto_authenc_init_tfm()
316 if (IS_ERR(auth)) in crypto_authenc_init_tfm()
317 return PTR_ERR(auth); in crypto_authenc_init_tfm()
329 ctx->auth = auth; in crypto_authenc_init_tfm()
348 crypto_free_ahash(auth); in crypto_authenc_init_tfm()
394 auth = crypto_spawn_ahash_alg(&ctx->auth); in crypto_authenc_create()
[all …]
/openbmc/linux/arch/powerpc/platforms/pseries/
H A Dplpks.c181 if (!auth) in construct_auth()
184 auth->version = 1; in construct_auth()
188 return auth; in construct_auth()
194 return auth; in construct_auth()
448 if (IS_ERR(auth)) in plpks_signed_update_var()
479 kfree(auth); in plpks_signed_update_var()
499 if (IS_ERR(auth)) in plpks_write_var()
518 kfree(auth); in plpks_write_var()
534 if (IS_ERR(auth)) in plpks_remove_var()
552 kfree(auth); in plpks_remove_var()
[all …]
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/openssl-tpm-engine/files/
H A D0002-libtpm-support-env-TPM_SRK_PW.patch30 BYTE *auth;
45 - free(auth);
51 + memset(auth, 0, TPM_WELL_KNOWN_KEY_LEN);
56 + memset(auth, 0, authbuflen);
57 + strncpy(auth, srkPasswd, authbuflen-1);
59 + authlen = strlen(auth);
66 + free(auth);
71 + authlen = strlen(auth);
77 - strlen((char *)auth), auth))) {
79 + authlen, auth))) {
[all …]
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/
H A Dshadow-update-pam-conf.patch35 auth sufficient pam_rootok.so
37 -password include system-auth
45 auth sufficient pam_rootok.so
47 -password include system-auth
55 auth sufficient pam_rootok.so
57 -password include system-auth
65 auth sufficient pam_rootok.so
67 -password include system-auth
77 -password include system-auth
87 -password include system-auth
[all …]
/openbmc/openbmc/poky/meta/recipes-extended/cronie/cronie/
H A Dcrond_pam_config.patch6 password-auth is the Fedora's common pam configure file, use oe common pam
23 # Although no PAM authentication is called, auth modules
25 -auth include system-auth
26 +auth include common-auth
28 -account include system-auth
29 +account include common-auth
31 -session include system-auth
/openbmc/linux/net/sunrpc/
H A Dauth.c235 if (IS_ERR(auth)) in rpcauth_create()
236 return auth; in rpcauth_create()
239 clnt->cl_auth = auth; in rpcauth_create()
242 return auth; in rpcauth_create()
251 auth->au_ops->destroy(auth); in rpcauth_release()
538 new = auth->au_ops->crcreate(auth, acred, flags, gfp); in rpcauth_lookup_credcache()
586 ret = auth->au_ops->lookup_cred(auth, &acred, flags); in rpcauth_lookupcred()
598 cred->cr_auth = auth; in rpcauth_init_cred()
617 ret = auth->au_ops->lookup_cred(auth, &acred, lookupflags); in rpcauth_bind_root_cred()
635 return auth->au_ops->lookup_cred(auth, &acred, lookupflags); in rpcauth_bind_machine_cred()
[all …]
/openbmc/openbmc/poky/meta/recipes-support/curl/
H A Dcurl_8.7.1.bb28 ….utils.filter('DISTRO_FEATURES', 'ipv6', d)} aws basic-auth bearer-auth digest-auth negotiate-auth
35 PACKAGECONFIG[basic-auth] = "--enable-basic-auth,--disable-basic-auth"
36 PACKAGECONFIG[bearer-auth] = "--enable-bearer-auth,--disable-bearer-auth"
42 PACKAGECONFIG[digest-auth] = "--enable-digest-auth,--disable-digest-auth"
47 PACKAGECONFIG[kerberos-auth] = "--enable-kerberos-auth,--disable-kerberos-auth"
56 PACKAGECONFIG[negotiate-auth] = "--enable-negotiate-auth,--disable-negotiate-auth"
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/
H A Dvlock_pam_tally2_reset.patch12 src/auth-pam.c | 3 +++
15 diff --git a/src/auth-pam.c b/src/auth-pam.c
17 --- a/src/auth-pam.c
18 +++ b/src/auth-pam.c
19 @@ -148,6 +148,9 @@ bool auth(const char *user, struct timespec *timeout)
/openbmc/qemu/ui/
H A Dvnc-auth-sasl.c182 trace_vnc_auth_fail(vs, vs->auth, "No SASL username set", ""); in vnc_auth_sasl_check_access()
197 trace_vnc_auth_fail(vs, vs->auth, "Error from authz", in vnc_auth_sasl_check_access()
278 trace_vnc_auth_fail(vs, vs->auth, "Cannot step SASL auth", in protocol_client_auth_sasl_step()
286 trace_vnc_auth_fail(vs, vs->auth, "SASL data too long", ""); in protocol_client_auth_sasl_step()
316 trace_vnc_auth_pass(vs, vs->auth); in protocol_client_auth_sasl_step()
400 trace_vnc_auth_fail(vs, vs->auth, "Cannot start SASL auth", in protocol_client_auth_sasl_start()
407 trace_vnc_auth_fail(vs, vs->auth, "SASL data too long", ""); in protocol_client_auth_sasl_start()
437 trace_vnc_auth_pass(vs, vs->auth); in protocol_client_auth_sasl_start()
566 trace_vnc_auth_fail(vs, vs->auth, "Cannot format local IP", in start_auth_sasl()
599 if (vs->auth == VNC_AUTH_VENCRYPT && in start_auth_sasl()
[all …]
H A Dvnc-auth-vencrypt.c55 trace_vnc_auth_fail(vs, vs->auth, "Unhandled VeNCrypt subauth", ""); in start_auth_vencrypt_subauth()
73 trace_vnc_auth_fail(vs, vs->auth, "TLS handshake failed", in vnc_tls_handshake_done()
91 int auth = read_u32(data, 0); in protocol_client_vencrypt_auth() local
93 trace_vnc_auth_vencrypt_subauth(vs, auth); in protocol_client_vencrypt_auth()
94 if (auth != vs->subauth) { in protocol_client_vencrypt_auth()
95 trace_vnc_auth_fail(vs, vs->auth, "Unsupported sub-auth version", ""); in protocol_client_vencrypt_auth()
116 trace_vnc_auth_fail(vs, vs->auth, "TLS setup failed", in protocol_client_vencrypt_auth()
143 trace_vnc_auth_fail(vs, vs->auth, "Unsupported version", ""); in protocol_client_vencrypt_init()
/openbmc/linux/net/sctp/
H A Doutput.c67 packet->auth = NULL; in sctp_packet_reset()
246 struct sctp_chunk *auth; in sctp_packet_bundle_auth() local
261 if (!chunk->auth) in sctp_packet_bundle_auth()
265 if (!auth) in sctp_packet_bundle_auth()
268 auth->shkey = chunk->shkey; in sctp_packet_bundle_auth()
274 sctp_chunk_free(auth); in sctp_packet_bundle_auth()
368 packet->auth = chunk; in __sctp_packet_append_chunk()
463 if (chunk == packet->auth) in sctp_packet_pack()
519 if (auth) { in sctp_packet_pack()
793 if ((packet->auth && chunk->shkey != packet->auth->shkey) || in sctp_packet_will_fit()
[all …]
/openbmc/qemu/authz/
H A Dlist.c150 ssize_t qauthz_list_append_rule(QAuthZList *auth, in qauthz_list_append_rule() argument
169 rules = auth->rules; in qauthz_list_append_rule()
178 auth->rules = tmp; in qauthz_list_append_rule()
184 ssize_t qauthz_list_insert_rule(QAuthZList *auth, in qauthz_list_insert_rule() argument
204 rules = auth->rules; in qauthz_list_insert_rule()
214 tmp->next = auth->rules; in qauthz_list_insert_rule()
215 auth->rules = tmp; in qauthz_list_insert_rule()
221 ssize_t qauthz_list_delete_rule(QAuthZList *auth, const char *match) in qauthz_list_delete_rule() argument
228 rules = auth->rules; in qauthz_list_delete_rule()
235 auth->rules = rules->next; in qauthz_list_delete_rule()
/openbmc/linux/drivers/target/iscsi/
H A Discsi_target_auth.c139 struct iscsi_node_auth *auth, in chap_server_open() argument
147 if (!(auth->naf_flags & NAF_USERID_SET) || in chap_server_open()
148 !(auth->naf_flags & NAF_PASSWORD_SET)) { in chap_server_open()
242 struct iscsi_node_auth *auth, in chap_server_compute_hash() argument
316 compare_len = strlen(auth->userid) + 1; in chap_server_compute_hash()
317 if (strncmp(chap_n, auth->userid, compare_len) != 0) { in chap_server_compute_hash()
384 strlen(auth->password)); in chap_server_compute_hash()
412 if (!auth->authenticate_target) { in chap_server_compute_hash()
527 strlen(auth->password_mutual)); in chap_server_compute_hash()
573 struct iscsi_node_auth *auth, in chap_main_loop() argument
[all …]
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth2 # /etc/pam.d/common-auth - authentication settings common to all services
12 auth [success=2 default=ignore] pam_unix.so quiet
13 -auth [success=1 default=ignore] pam_ldap.so ignore_unknown_user ignore_authinfo_unavail
16 auth [default=die] pam_faillock.so authfail
19 auth sufficient pam_faillock.so authsucc
21 auth requisite pam_deny.so
25 auth required pam_permit.so
/openbmc/bmcweb/config/
H A Dpam-webserver3 auth include common-auth
5 auth [success=ok perm_denied=1 default=ignore] pam_localuser.so
6 auth required pam_succeed_if.so user ingroup redfish
/openbmc/linux/tools/testing/selftests/tpm2/
H A Dtpm2_tests.py24 auth = ('A' * 15).encode()
26 blob = self.client.seal(self.root_key, data, auth, None)
27 result = self.client.unseal(self.root_key, blob, auth, None)
44 auth = ('A' * 15).encode()
55 blob = self.client.seal(self.root_key, data, auth, policy_dig)
72 auth = ('A' * 20).encode()
75 blob = self.client.seal(self.root_key, data, auth, None)
78 auth[:-1] + 'B'.encode(), None)
91 auth = ('A' * 17).encode()
148 auth = ('A' * (ds + 1)).encode()
[all …]

12345678910>>...13