Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 25 of 25) sorted by relevance

/Zephyr-latest/scripts/
Dgithub_helpers.py57 auth = nrc.authenticators('github.com')
58 if auth is not None:
59 return {'login_or_token': auth[0], 'password': auth[2]}
/Zephyr-latest/subsys/bluetooth/host/classic/
Dssp.c347 struct bt_hci_cp_auth_requested *auth; in conn_auth() local
352 buf = bt_hci_cmd_create(BT_HCI_OP_AUTH_REQUESTED, sizeof(*auth)); in conn_auth()
357 auth = net_buf_add(buf, sizeof(*auth)); in conn_auth()
358 auth->handle = sys_cpu_to_le16(conn->handle); in conn_auth()
662 #define BT_HCI_SET_NO_BONDING(auth) ((auth) & 0x01) argument
665 #define BT_HCI_SET_NO_MITM(auth) ((auth) & (~0x01)) argument
673 uint8_t auth; in bt_hci_io_capa_req() local
705 auth = BT_HCI_GENERAL_BONDING_MITM; in bt_hci_io_capa_req()
707 auth = BT_HCI_DEDICATED_BONDING_MITM; in bt_hci_io_capa_req()
711 auth = BT_HCI_GENERAL_BONDING; in bt_hci_io_capa_req()
[all …]
/Zephyr-latest/subsys/bluetooth/mesh/
Dbeacon.c70 const uint8_t *auth; member
100 return !memcmp(beacon->cache, params->auth, sizeof(beacon->cache)); in beacon_cache_match()
103 static void cache_add(const uint8_t auth[8], struct bt_mesh_beacon *beacon) in cache_add()
105 memcpy(beacon->cache, auth, sizeof(beacon->cache)); in cache_add()
156 net_buf_simple_add_mem(buf, sub->secure_beacon.auth, 8); in secure_beacon_create()
160 LOG_DBG("IV Index 0x%08x Auth %s", bt_mesh.iv_index, bt_hex(sub->secure_beacon.auth, 8)); in secure_beacon_create()
205 sub->priv_beacon.auth); in private_beacon_update()
236 net_buf_simple_add_mem(buf, sub->priv_beacon.auth, 8); in private_beacon_create()
536 if (memcmp(params->auth, net_auth, 8)) { in auth_match()
537 LOG_WRN("Invalid auth value. Received auth: %s", bt_hex(params->auth, 8)); in auth_match()
[all …]
Dprov.c141 memcpy(bt_mesh_prov_link.auth, str, size); in get_auth_string()
142 memset(bt_mesh_prov_link.auth + size, 0, in get_auth_string()
143 sizeof(bt_mesh_prov_link.auth) - size); in get_auth_string()
166 sys_put_be32(num, &bt_mesh_prov_link.auth[auth_size - sizeof(num)]); in get_auth_number()
167 memset(bt_mesh_prov_link.auth, 0, auth_size - sizeof(num)); in get_auth_number()
185 (void)memset(bt_mesh_prov_link.auth, 0, auth_size); in bt_mesh_prov_auth()
274 sys_put_be32(num, &bt_mesh_prov_link.auth[auth_size - sizeof(num)]); in bt_mesh_input_number()
294 memcpy(bt_mesh_prov_link.auth, str, strlen(str)); in bt_mesh_input_string()
Dcrypto.c647 const uint8_t *prov_rand, const uint8_t *auth, uint8_t *conf) in bt_mesh_prov_conf() argument
653 LOG_DBG("AuthValue %s", bt_hex(auth, auth_size)); in bt_mesh_prov_conf()
663 struct bt_mesh_sg sg[] = { { prov_rand, 16 }, { auth, 16 } }; in bt_mesh_prov_conf()
692 const uint8_t net_id[8], uint32_t iv_index, uint8_t auth[8]) in bt_mesh_beacon_auth()
709 memcpy(auth, tmp, 8); in bt_mesh_beacon_auth()
742 const uint8_t random[13], uint8_t auth[8]) in private_beacon_auth()
774 memcpy(auth, tmp, 8); in private_beacon_auth()
783 auth[i] ^= tmp[i]; in private_beacon_auth()
792 uint8_t auth[8]; in bt_mesh_beacon_decrypt() local
802 err = private_beacon_auth(pbk, out, random, auth); in bt_mesh_beacon_decrypt()
[all …]
Dcrypto.h84 const uint8_t net_id[8], uint32_t iv_index, uint8_t auth[8]);
137 const uint8_t *auth, uint8_t *conf);
155 const uint8_t random[13], uint8_t data[5], uint8_t auth[8]);
Dprovisionee.c194 memcpy(bt_mesh_prov_link.auth, bt_mesh_prov->static_val, in prov_start()
200 memset(bt_mesh_prov_link.auth + bt_mesh_prov->static_val_len, 0, in prov_start()
232 memcpy(&conf_key_input[32], bt_mesh_prov_link.auth, 32); in send_confirm()
233 LOG_DBG("AuthValue %s", bt_hex(bt_mesh_prov_link.auth, 32)); in send_confirm()
256 bt_mesh_prov_link.rand, bt_mesh_prov_link.auth, in send_confirm()
433 data, bt_mesh_prov_link.auth, conf_verify)) { in prov_random()
Dprovisioner.c338 memcpy(&conf_key_input[32], bt_mesh_prov_link.auth, 32); in send_confirm()
339 LOG_DBG("AuthValue %s", bt_hex(bt_mesh_prov_link.auth, 32)); in send_confirm()
362 bt_mesh_prov_link.rand, bt_mesh_prov_link.auth, in send_confirm()
642 data, bt_mesh_prov_link.auth, conf_verify)) { in prov_random()
765 memcpy(bt_mesh_prov_link.auth, static_val, in bt_mesh_auth_method_set_static()
770 memset(bt_mesh_prov_link.auth + size, 0, PROV_AUTH_MAX_LEN - size); in bt_mesh_auth_method_set_static()
Dsubnet.h49 uint8_t auth[8]; /* Beacon Authentication Value */ member
Dprov.h131 uint8_t auth[PROV_AUTH_MAX_LEN]; /* Authen value */ member
/Zephyr-latest/modules/
DKconfig.tinycrypt30 bool "HMAC (via SHA256) message auth support"
/Zephyr-latest/drivers/wifi/nrf_wifi/src/
Dwpa_supp_if.c282 if (frame_len < 24 + sizeof(mgmt->u.auth)) { in nrf_wifi_wpa_supp_event_proc_auth_resp()
289 memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); in nrf_wifi_wpa_supp_event_proc_auth_resp()
291 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); in nrf_wifi_wpa_supp_event_proc_auth_resp()
293 event.auth.auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction); in nrf_wifi_wpa_supp_event_proc_auth_resp()
295 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); in nrf_wifi_wpa_supp_event_proc_auth_resp()
297 if (frame_len > 24 + sizeof(mgmt->u.auth)) { in nrf_wifi_wpa_supp_event_proc_auth_resp()
298 event.auth.ies = mgmt->u.auth.variable; in nrf_wifi_wpa_supp_event_proc_auth_resp()
299 event.auth.ies_len = (frame_len - 24 - sizeof(mgmt->u.auth)); in nrf_wifi_wpa_supp_event_proc_auth_resp()
/Zephyr-latest/drivers/wifi/winc1500/
Dwifi_winc1500.c1016 void *auth; in winc1500_mgmt_connect() local
1024 auth = &psk; in winc1500_mgmt_connect()
1028 auth = NULL; in winc1500_mgmt_connect()
1046 security, auth, channel)) { in winc1500_mgmt_connect()
/Zephyr-latest/subsys/bluetooth/host/
Dsmp.c2714 static uint8_t get_auth(struct bt_smp *smp, uint8_t auth) in get_auth() argument
2719 auth &= BT_SMP_AUTH_MASK_SC; in get_auth()
2721 auth &= BT_SMP_AUTH_MASK; in get_auth()
2727 auth &= ~(BT_SMP_AUTH_MITM); in get_auth()
2729 auth |= BT_SMP_AUTH_MITM; in get_auth()
2733 auth |= BT_SMP_AUTH_BONDING; in get_auth()
2735 auth &= ~BT_SMP_AUTH_BONDING; in get_auth()
2739 auth |= BT_SMP_AUTH_KEYPRESS; in get_auth()
2741 auth &= ~BT_SMP_AUTH_KEYPRESS; in get_auth()
2745 auth |= BT_SMP_AUTH_CT2; in get_auth()
[all …]
/Zephyr-latest/tests/bsim/bluetooth/mesh/src/
Dtest_beacon.c437 uint8_t auth[8]; in beacon_create() local
450 err = bt_mesh_beacon_auth(&beacon_key, flags, net_id, iv_index, auth); in beacon_create()
465 net_buf_simple_add_mem(buf, auth, 8); in beacon_create()
1245 uint8_t auth[8]; in private_beacon_create() local
1262 random_val, data, auth); in private_beacon_create()
1268 net_buf_simple_add_mem(buf, auth, 8); in private_beacon_create()
/Zephyr-latest/subsys/bluetooth/host/classic/shell/
Dbredr.c543 SHELL_CMD_ARG(auth-pincode, NULL, "<pincode>", cmd_auth_pincode, 2, 0),
/Zephyr-latest/scripts/west_commands/
Dpatch.py483 gh = Github(auth=Auth.Token(args.tokenfile) if args.tokenfile else None)
/Zephyr-latest/subsys/bluetooth/host/shell/
Dbt.c5095 SHELL_CMD_ARG(auth, NULL,
5099 SHELL_CMD_ARG(auth-cancel, NULL, HELP_NONE, cmd_auth_cancel, 1, 0),
5100 SHELL_CMD_ARG(auth-passkey, NULL, "<passkey>", cmd_auth_passkey, 2, 0),
5102 SHELL_CMD_ARG(auth-passkey-notify, NULL, "<type>",
5105 SHELL_CMD_ARG(auth-passkey-confirm, NULL, HELP_NONE,
5107 SHELL_CMD_ARG(auth-pairing-confirm, NULL, HELP_NONE,
5110 SHELL_CMD_ARG(auth-oob-tk, NULL, "<tk>", cmd_auth_oob_tk, 2, 0),
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/
Dgap.rst320 :code:`bt auth all` command. After that, when you will set the security level, you will be asked to
322 :code:`bt auth-passkey-confirm`.
/Zephyr-latest/doc/security/
Dsensor-threat.rst250 [th-tls-client-auth]_.
382 .. [th-tls-client-auth]
/Zephyr-latest/modules/hostap/src/
Dsupp_main.c595 os_free((char *)data->auth.ies); in event_socket_handler()
/Zephyr-latest/subsys/bluetooth/mesh/shell/
Dshell.c1675 SHELL_CMD(auth-method, &auth_cmds, "Authentication methods", bt_mesh_shell_mdl_cmds_help),
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/
Dshell.rst407 ``mesh prov auth-method input <Action> <Size>``
421 ``mesh prov auth-method output <Action> <Size>``
435 ``mesh prov auth-method static <Val(1-16 hex)>``
442 ``mesh prov auth-method none``
/Zephyr-latest/doc/releases/
Drelease-notes-1.7.rst354 * ``ZEP-1547`` - Add support for H7 crypto function and CT2 SMP auth flag
/Zephyr-latest/samples/modules/tflite-micro/hello_world/train/
Dtrain_hello_world_model.ipynb118 …"Requirement already satisfied: google-auth-oauthlib<0.5,>=0.4.1 in /usr/local/lib/python3.6/dist-…
122 …"Requirement already satisfied: google-auth<2,>=1.6.3 in /usr/local/lib/python3.6/dist-packages (f…
124 …ts-oauthlib>=0.7.0 in /usr/local/lib/python3.6/dist-packages (from google-auth-oauthlib<0.5,>=0.4.…
129 …etools<5.0,>=2.0.0 in /usr/local/lib/python3.6/dist-packages (from google-auth<2,>=1.6.3->tensorbo…
130 …n_version >= \"3\" in /usr/local/lib/python3.6/dist-packages (from google-auth<2,>=1.6.3->tensorbo…
131 …sn1-modules>=0.2.1 in /usr/local/lib/python3.6/dist-packages (from google-auth<2,>=1.6.3->tensorbo…
133 …/local/lib/python3.6/dist-packages (from requests-oauthlib>=0.7.0->google-auth-oauthlib<0.5,>=0.4.…
134 …hon3.6/dist-packages (from rsa<5,>=3.1.4; python_version >= \"3\"->google-auth<2,>=1.6.3->tensorbo…