| /lib/efi_loader/ |
| A D | efi_variable.c | 53 const struct efi_variable_authentication_2 *auth; in efi_variable_authenticate() local 75 auth = *data; in efi_variable_authenticate() 76 if (*data_size < (sizeof(auth->time_stamp) in efi_variable_authenticate() 77 + auth->auth_info.hdr.dwLength)) in efi_variable_authenticate() 83 memcpy(×tamp, &auth->time_stamp, sizeof(timestamp)); in efi_variable_authenticate() 88 *data += sizeof(auth->time_stamp) + auth->auth_info.hdr.dwLength; in efi_variable_authenticate() 89 *data_size -= (sizeof(auth->time_stamp) in efi_variable_authenticate() 90 + auth->auth_info.hdr.dwLength); in efi_variable_authenticate() 128 if (auth->auth_info.hdr.dwLength < sizeof(auth->auth_info)) in efi_variable_authenticate() 133 auth->auth_info.hdr.dwLength in efi_variable_authenticate() [all …]
|
| A D | efi_image_loader.c | 349 WIN_CERTIFICATE **auth, size_t *auth_len) in efi_image_parse() argument 490 if (authsz < sizeof(*auth)) { in efi_image_parse() 492 __func__, authsz, sizeof(*auth)); in efi_image_parse() 495 *auth = efi + authoff; in efi_image_parse() 500 *auth = NULL; in efi_image_parse() 589 u8 *auth, *wincerts_end; in efi_image_authenticate() local 655 auth = (u8 *)wincert + sizeof(*wincert); in efi_image_authenticate() 658 if (auth + sizeof(efi_guid_t) >= wincerts_end) in efi_image_authenticate() 668 auth); in efi_image_authenticate() 673 auth += sizeof(efi_guid_t); in efi_image_authenticate() [all …]
|
| A D | Kconfig | 139 violate the EFI spec since writing auth variables will return
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_ccm.data | 69 CCM* auth decrypt tag #1 73 CCM* auth decrypt tag #2 77 CCM* auth decrypt tag #3 1045 CCM auth decrypt tag NIST DVPT AES-128 #1 (P=0, N=7, A=0, T=4) 1049 CCM auth decrypt tag NIST DVPT AES-128 #2 (P=0, N=7, A=0, T=4) 1173 CCM auth decrypt tag NIST DVPT AES-192 #1 (P=0, N=7, A=0, T=4) 1177 CCM auth decrypt tag NIST DVPT AES-192 #2 (P=0, N=7, A=0, T=4) 1301 CCM auth decrypt tag NIST DVPT AES-256 #1 (P=0, N=7, A=0, T=4) 1305 CCM auth decrypt tag NIST DVPT AES-256 #2 (P=0, N=7, A=0, T=4) 1757 CCM* encrypt, no auth NIST VADT AES-256 #1 (P=24, N=13) [all …]
|
| A D | test_suite_ccm.function | 503 /* Skip auth data, provide full text */ 543 /* Provide auth data, skip full text */ 573 /* Provide too much auth data */ 596 /* Provide unexpected auth data */ 648 /* Provide incomplete auth data and finish */ 675 /* Provide complete auth data on first update_ad. 676 * Provide unexpected auth data on second update_ad */ 691 // pass full auth data 701 /* Provide incomplete auth data on first update_ad. 702 * Provide too much auth data on second update_ad */ [all …]
|
| /lib/crypto/ |
| A D | pkcs7_verify.c | 348 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local 409 auth = sig->auth_ids[0]; in pkcs7_verify_sig_chain() 410 if (auth) { in pkcs7_verify_sig_chain() 411 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 415 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain() 419 auth = sig->auth_ids[1]; in pkcs7_verify_sig_chain() 420 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 426 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain()
|
| A D | asymmetric_type.c | 459 void *auth = key->payload.data[asym_auth]; in asymmetric_key_destroy() local 467 subtype->destroy(data, auth); in asymmetric_key_destroy()
|
| /lib/ |
| A D | tpm-v1.c | 537 void *request_auth, const void *auth) in create_request_auth() argument 577 sha1_hmac(auth, DIGEST_LENGTH, hmac_data, sizeof(hmac_data), in create_request_auth() 600 const void *response_auth, const void *auth) in verify_response_auth() argument 641 sha1_hmac(auth, DIGEST_LENGTH, hmac_data, sizeof(hmac_data), in verify_response_auth() 844 u32 tpm1_find_key_sha1(struct udevice *dev, const u8 auth[20], in tpm1_find_key_sha1() 869 err = tpm1_get_pub_key_oiap(dev, key_handles[i], auth, buf, &buf_len); in tpm1_find_key_sha1()
|
| A D | tpm-v2.c | 412 u32 auth = priv->plat_hier_disabled ? HR_NV_INDEX + index : in tpm2_nv_write_value() local 421 tpm_u32(auth), /* Primary platform seed */ in tpm2_nv_write_value()
|
| /lib/lwip/lwip/src/netif/ppp/ |
| A D | auth.c | 736 int auth; in link_established() local 806 auth = 0; in link_established() 811 auth |= EAP_PEER; in link_established() 817 auth |= CHAP_PEER; in link_established() 823 auth |= PAP_PEER; in link_established() 832 auth |= EAP_WITHPEER; in link_established() 838 auth |= CHAP_WITHPEER; in link_established() 844 auth |= PAP_WITHPEER; in link_established() 849 pcb->auth_pending = auth; in link_established() 852 if (!auth) in link_established()
|
| /lib/lwip/lwip/src/apps/smtp/ |
| A D | smtp.c | 1057 u16_t auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_SP); in smtp_prepare_auth_or_mail() local 1058 if (auth == 0xFFFF) { in smtp_prepare_auth_or_mail() 1059 auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_EQ); in smtp_prepare_auth_or_mail() 1061 if (auth != 0xFFFF) { in smtp_prepare_auth_or_mail() 1062 u16_t crlf = pbuf_memfind(s->p, SMTP_CRLF, SMTP_CRLF_LEN, auth); in smtp_prepare_auth_or_mail() 1063 if ((crlf != 0xFFFF) && (crlf > auth)) { in smtp_prepare_auth_or_mail() 1065 u16_t copied = pbuf_copy_partial(s->p, s->tx_buf, (u16_t)(crlf - auth), auth); in smtp_prepare_auth_or_mail()
|
| /lib/lwip/lwip/src/apps/snmp/ |
| A D | snmp_msg.c | 800 snmpv3_auth_algo_t auth; in snmp_parse_inbound_frame() local 989 if (snmpv3_get_user((char *)request->msg_user_name, &auth, NULL, &priv, NULL)) { in snmp_parse_inbound_frame() 999 if ((auth != SNMP_V3_AUTH_ALGO_INVAL) || (priv != SNMP_V3_PRIV_ALGO_INVAL)) { in snmp_parse_inbound_frame() 1009 if ((auth == SNMP_V3_AUTH_ALGO_INVAL) || (priv != SNMP_V3_PRIV_ALGO_INVAL)) { in snmp_parse_inbound_frame() 1018 if ((auth == SNMP_V3_AUTH_ALGO_INVAL) || (priv == SNMP_V3_PRIV_ALGO_INVAL)) { in snmp_parse_inbound_frame() 1058 IF_PARSE_EXEC(snmpv3_get_user((char *)request->msg_user_name, &auth, key, NULL, NULL)); in snmp_parse_inbound_frame() 1059 IF_PARSE_EXEC(snmpv3_auth(&auth_stream, request->inbound_pbuf->tot_len, key, auth, hmac)); in snmp_parse_inbound_frame()
|
| /lib/lwip/lwip/src/ |
| A D | Filelists.mk | 98 PPPFILES=$(LWIPDIR)/netif/ppp/auth.c \
|
| A D | Filelists.cmake | 117 ${LWIP_DIR}/src/netif/ppp/auth.c
|
| /lib/lwip/lwip/doc/ |
| A D | ppp.txt | 26 Supported auth protocols:
|
| /lib/lwip/lwip/ |
| A D | CHANGELOG | 3124 * ppp_oe.c ppp_oe.h, auth.c chap.c fsm.c lcp.c ppp.c ppp.h,
|
| /lib/mbedtls/external/mbedtls/ |
| A D | ChangeLog | 4268 unless you allow third parties to pick trust CAs for client auth.
|