Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 17 of 17) sorted by relevance

/lib/efi_loader/
A Defi_variable.c53 const struct efi_variable_authentication_2 *auth; in efi_variable_authenticate() local
75 auth = *data; in efi_variable_authenticate()
76 if (*data_size < (sizeof(auth->time_stamp) in efi_variable_authenticate()
77 + auth->auth_info.hdr.dwLength)) in efi_variable_authenticate()
83 memcpy(&timestamp, &auth->time_stamp, sizeof(timestamp)); in efi_variable_authenticate()
88 *data += sizeof(auth->time_stamp) + auth->auth_info.hdr.dwLength; in efi_variable_authenticate()
89 *data_size -= (sizeof(auth->time_stamp) in efi_variable_authenticate()
90 + auth->auth_info.hdr.dwLength); in efi_variable_authenticate()
128 if (auth->auth_info.hdr.dwLength < sizeof(auth->auth_info)) in efi_variable_authenticate()
133 auth->auth_info.hdr.dwLength in efi_variable_authenticate()
[all …]
A Defi_image_loader.c349 WIN_CERTIFICATE **auth, size_t *auth_len) in efi_image_parse() argument
490 if (authsz < sizeof(*auth)) { in efi_image_parse()
492 __func__, authsz, sizeof(*auth)); in efi_image_parse()
495 *auth = efi + authoff; in efi_image_parse()
500 *auth = NULL; in efi_image_parse()
589 u8 *auth, *wincerts_end; in efi_image_authenticate() local
655 auth = (u8 *)wincert + sizeof(*wincert); in efi_image_authenticate()
658 if (auth + sizeof(efi_guid_t) >= wincerts_end) in efi_image_authenticate()
668 auth); in efi_image_authenticate()
673 auth += sizeof(efi_guid_t); in efi_image_authenticate()
[all …]
A DKconfig139 violate the EFI spec since writing auth variables will return
/lib/mbedtls/external/mbedtls/tests/suites/
A Dtest_suite_ccm.data69 CCM* auth decrypt tag #1
73 CCM* auth decrypt tag #2
77 CCM* auth decrypt tag #3
1045 CCM auth decrypt tag NIST DVPT AES-128 #1 (P=0, N=7, A=0, T=4)
1049 CCM auth decrypt tag NIST DVPT AES-128 #2 (P=0, N=7, A=0, T=4)
1173 CCM auth decrypt tag NIST DVPT AES-192 #1 (P=0, N=7, A=0, T=4)
1177 CCM auth decrypt tag NIST DVPT AES-192 #2 (P=0, N=7, A=0, T=4)
1301 CCM auth decrypt tag NIST DVPT AES-256 #1 (P=0, N=7, A=0, T=4)
1305 CCM auth decrypt tag NIST DVPT AES-256 #2 (P=0, N=7, A=0, T=4)
1757 CCM* encrypt, no auth NIST VADT AES-256 #1 (P=24, N=13)
[all …]
A Dtest_suite_ccm.function503 /* Skip auth data, provide full text */
543 /* Provide auth data, skip full text */
573 /* Provide too much auth data */
596 /* Provide unexpected auth data */
648 /* Provide incomplete auth data and finish */
675 /* Provide complete auth data on first update_ad.
676 * Provide unexpected auth data on second update_ad */
691 // pass full auth data
701 /* Provide incomplete auth data on first update_ad.
702 * Provide too much auth data on second update_ad */
[all …]
/lib/crypto/
A Dpkcs7_verify.c348 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local
409 auth = sig->auth_ids[0]; in pkcs7_verify_sig_chain()
410 if (auth) { in pkcs7_verify_sig_chain()
411 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain()
415 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain()
419 auth = sig->auth_ids[1]; in pkcs7_verify_sig_chain()
420 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain()
426 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain()
A Dasymmetric_type.c459 void *auth = key->payload.data[asym_auth]; in asymmetric_key_destroy() local
467 subtype->destroy(data, auth); in asymmetric_key_destroy()
/lib/
A Dtpm-v1.c537 void *request_auth, const void *auth) in create_request_auth() argument
577 sha1_hmac(auth, DIGEST_LENGTH, hmac_data, sizeof(hmac_data), in create_request_auth()
600 const void *response_auth, const void *auth) in verify_response_auth() argument
641 sha1_hmac(auth, DIGEST_LENGTH, hmac_data, sizeof(hmac_data), in verify_response_auth()
844 u32 tpm1_find_key_sha1(struct udevice *dev, const u8 auth[20], in tpm1_find_key_sha1()
869 err = tpm1_get_pub_key_oiap(dev, key_handles[i], auth, buf, &buf_len); in tpm1_find_key_sha1()
A Dtpm-v2.c412 u32 auth = priv->plat_hier_disabled ? HR_NV_INDEX + index : in tpm2_nv_write_value() local
421 tpm_u32(auth), /* Primary platform seed */ in tpm2_nv_write_value()
/lib/lwip/lwip/src/netif/ppp/
A Dauth.c736 int auth; in link_established() local
806 auth = 0; in link_established()
811 auth |= EAP_PEER; in link_established()
817 auth |= CHAP_PEER; in link_established()
823 auth |= PAP_PEER; in link_established()
832 auth |= EAP_WITHPEER; in link_established()
838 auth |= CHAP_WITHPEER; in link_established()
844 auth |= PAP_WITHPEER; in link_established()
849 pcb->auth_pending = auth; in link_established()
852 if (!auth) in link_established()
/lib/lwip/lwip/src/apps/smtp/
A Dsmtp.c1057 u16_t auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_SP); in smtp_prepare_auth_or_mail() local
1058 if (auth == 0xFFFF) { in smtp_prepare_auth_or_mail()
1059 auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_EQ); in smtp_prepare_auth_or_mail()
1061 if (auth != 0xFFFF) { in smtp_prepare_auth_or_mail()
1062 u16_t crlf = pbuf_memfind(s->p, SMTP_CRLF, SMTP_CRLF_LEN, auth); in smtp_prepare_auth_or_mail()
1063 if ((crlf != 0xFFFF) && (crlf > auth)) { in smtp_prepare_auth_or_mail()
1065 u16_t copied = pbuf_copy_partial(s->p, s->tx_buf, (u16_t)(crlf - auth), auth); in smtp_prepare_auth_or_mail()
/lib/lwip/lwip/src/apps/snmp/
A Dsnmp_msg.c800 snmpv3_auth_algo_t auth; in snmp_parse_inbound_frame() local
989 if (snmpv3_get_user((char *)request->msg_user_name, &auth, NULL, &priv, NULL)) { in snmp_parse_inbound_frame()
999 if ((auth != SNMP_V3_AUTH_ALGO_INVAL) || (priv != SNMP_V3_PRIV_ALGO_INVAL)) { in snmp_parse_inbound_frame()
1009 if ((auth == SNMP_V3_AUTH_ALGO_INVAL) || (priv != SNMP_V3_PRIV_ALGO_INVAL)) { in snmp_parse_inbound_frame()
1018 if ((auth == SNMP_V3_AUTH_ALGO_INVAL) || (priv == SNMP_V3_PRIV_ALGO_INVAL)) { in snmp_parse_inbound_frame()
1058 IF_PARSE_EXEC(snmpv3_get_user((char *)request->msg_user_name, &auth, key, NULL, NULL)); in snmp_parse_inbound_frame()
1059 IF_PARSE_EXEC(snmpv3_auth(&auth_stream, request->inbound_pbuf->tot_len, key, auth, hmac)); in snmp_parse_inbound_frame()
/lib/lwip/lwip/src/
A DFilelists.mk98 PPPFILES=$(LWIPDIR)/netif/ppp/auth.c \
A DFilelists.cmake117 ${LWIP_DIR}/src/netif/ppp/auth.c
/lib/lwip/lwip/doc/
A Dppp.txt26 Supported auth protocols:
/lib/lwip/lwip/
A DCHANGELOG3124 * ppp_oe.c ppp_oe.h, auth.c chap.c fsm.c lcp.c ppp.c ppp.h,
/lib/mbedtls/external/mbedtls/
A DChangeLog4268 unless you allow third parties to pick trust CAs for client auth.

Completed in 68 milliseconds