/Zephyr-latest/scripts/ |
D | github_helpers.py | 57 auth = nrc.authenticators('github.com') 58 if auth is not None: 59 return {'login_or_token': auth[0], 'password': auth[2]}
|
/Zephyr-latest/subsys/bluetooth/host/classic/ |
D | ssp.c | 347 struct bt_hci_cp_auth_requested *auth; in conn_auth() local 352 buf = bt_hci_cmd_create(BT_HCI_OP_AUTH_REQUESTED, sizeof(*auth)); in conn_auth() 357 auth = net_buf_add(buf, sizeof(*auth)); in conn_auth() 358 auth->handle = sys_cpu_to_le16(conn->handle); in conn_auth() 662 #define BT_HCI_SET_NO_BONDING(auth) ((auth) & 0x01) argument 665 #define BT_HCI_SET_NO_MITM(auth) ((auth) & (~0x01)) argument 673 uint8_t auth; in bt_hci_io_capa_req() local 705 auth = BT_HCI_GENERAL_BONDING_MITM; in bt_hci_io_capa_req() 707 auth = BT_HCI_DEDICATED_BONDING_MITM; in bt_hci_io_capa_req() 711 auth = BT_HCI_GENERAL_BONDING; in bt_hci_io_capa_req() [all …]
|
/Zephyr-latest/subsys/bluetooth/mesh/ |
D | beacon.c | 70 const uint8_t *auth; member 100 return !memcmp(beacon->cache, params->auth, sizeof(beacon->cache)); in beacon_cache_match() 103 static void cache_add(const uint8_t auth[8], struct bt_mesh_beacon *beacon) in cache_add() 105 memcpy(beacon->cache, auth, sizeof(beacon->cache)); in cache_add() 156 net_buf_simple_add_mem(buf, sub->secure_beacon.auth, 8); in secure_beacon_create() 160 LOG_DBG("IV Index 0x%08x Auth %s", bt_mesh.iv_index, bt_hex(sub->secure_beacon.auth, 8)); in secure_beacon_create() 205 sub->priv_beacon.auth); in private_beacon_update() 236 net_buf_simple_add_mem(buf, sub->priv_beacon.auth, 8); in private_beacon_create() 536 if (memcmp(params->auth, net_auth, 8)) { in auth_match() 537 LOG_WRN("Invalid auth value. Received auth: %s", bt_hex(params->auth, 8)); in auth_match() [all …]
|
D | prov.c | 141 memcpy(bt_mesh_prov_link.auth, str, size); in get_auth_string() 142 memset(bt_mesh_prov_link.auth + size, 0, in get_auth_string() 143 sizeof(bt_mesh_prov_link.auth) - size); in get_auth_string() 166 sys_put_be32(num, &bt_mesh_prov_link.auth[auth_size - sizeof(num)]); in get_auth_number() 167 memset(bt_mesh_prov_link.auth, 0, auth_size - sizeof(num)); in get_auth_number() 185 (void)memset(bt_mesh_prov_link.auth, 0, auth_size); in bt_mesh_prov_auth() 274 sys_put_be32(num, &bt_mesh_prov_link.auth[auth_size - sizeof(num)]); in bt_mesh_input_number() 294 memcpy(bt_mesh_prov_link.auth, str, strlen(str)); in bt_mesh_input_string()
|
D | crypto.c | 647 const uint8_t *prov_rand, const uint8_t *auth, uint8_t *conf) in bt_mesh_prov_conf() argument 653 LOG_DBG("AuthValue %s", bt_hex(auth, auth_size)); in bt_mesh_prov_conf() 663 struct bt_mesh_sg sg[] = { { prov_rand, 16 }, { auth, 16 } }; in bt_mesh_prov_conf() 692 const uint8_t net_id[8], uint32_t iv_index, uint8_t auth[8]) in bt_mesh_beacon_auth() 709 memcpy(auth, tmp, 8); in bt_mesh_beacon_auth() 742 const uint8_t random[13], uint8_t auth[8]) in private_beacon_auth() 774 memcpy(auth, tmp, 8); in private_beacon_auth() 783 auth[i] ^= tmp[i]; in private_beacon_auth() 792 uint8_t auth[8]; in bt_mesh_beacon_decrypt() local 802 err = private_beacon_auth(pbk, out, random, auth); in bt_mesh_beacon_decrypt() [all …]
|
D | crypto.h | 84 const uint8_t net_id[8], uint32_t iv_index, uint8_t auth[8]); 137 const uint8_t *auth, uint8_t *conf); 155 const uint8_t random[13], uint8_t data[5], uint8_t auth[8]);
|
D | provisionee.c | 194 memcpy(bt_mesh_prov_link.auth, bt_mesh_prov->static_val, in prov_start() 200 memset(bt_mesh_prov_link.auth + bt_mesh_prov->static_val_len, 0, in prov_start() 232 memcpy(&conf_key_input[32], bt_mesh_prov_link.auth, 32); in send_confirm() 233 LOG_DBG("AuthValue %s", bt_hex(bt_mesh_prov_link.auth, 32)); in send_confirm() 256 bt_mesh_prov_link.rand, bt_mesh_prov_link.auth, in send_confirm() 433 data, bt_mesh_prov_link.auth, conf_verify)) { in prov_random()
|
D | provisioner.c | 338 memcpy(&conf_key_input[32], bt_mesh_prov_link.auth, 32); in send_confirm() 339 LOG_DBG("AuthValue %s", bt_hex(bt_mesh_prov_link.auth, 32)); in send_confirm() 362 bt_mesh_prov_link.rand, bt_mesh_prov_link.auth, in send_confirm() 642 data, bt_mesh_prov_link.auth, conf_verify)) { in prov_random() 765 memcpy(bt_mesh_prov_link.auth, static_val, in bt_mesh_auth_method_set_static() 770 memset(bt_mesh_prov_link.auth + size, 0, PROV_AUTH_MAX_LEN - size); in bt_mesh_auth_method_set_static()
|
D | subnet.h | 49 uint8_t auth[8]; /* Beacon Authentication Value */ member
|
D | prov.h | 131 uint8_t auth[PROV_AUTH_MAX_LEN]; /* Authen value */ member
|
/Zephyr-latest/modules/ |
D | Kconfig.tinycrypt | 30 bool "HMAC (via SHA256) message auth support"
|
/Zephyr-latest/drivers/wifi/nrf_wifi/src/ |
D | wpa_supp_if.c | 282 if (frame_len < 24 + sizeof(mgmt->u.auth)) { in nrf_wifi_wpa_supp_event_proc_auth_resp() 289 memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); in nrf_wifi_wpa_supp_event_proc_auth_resp() 291 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); in nrf_wifi_wpa_supp_event_proc_auth_resp() 293 event.auth.auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction); in nrf_wifi_wpa_supp_event_proc_auth_resp() 295 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); in nrf_wifi_wpa_supp_event_proc_auth_resp() 297 if (frame_len > 24 + sizeof(mgmt->u.auth)) { in nrf_wifi_wpa_supp_event_proc_auth_resp() 298 event.auth.ies = mgmt->u.auth.variable; in nrf_wifi_wpa_supp_event_proc_auth_resp() 299 event.auth.ies_len = (frame_len - 24 - sizeof(mgmt->u.auth)); in nrf_wifi_wpa_supp_event_proc_auth_resp()
|
/Zephyr-latest/drivers/wifi/winc1500/ |
D | wifi_winc1500.c | 1016 void *auth; in winc1500_mgmt_connect() local 1024 auth = &psk; in winc1500_mgmt_connect() 1028 auth = NULL; in winc1500_mgmt_connect() 1046 security, auth, channel)) { in winc1500_mgmt_connect()
|
/Zephyr-latest/subsys/bluetooth/host/ |
D | smp.c | 2714 static uint8_t get_auth(struct bt_smp *smp, uint8_t auth) in get_auth() argument 2719 auth &= BT_SMP_AUTH_MASK_SC; in get_auth() 2721 auth &= BT_SMP_AUTH_MASK; in get_auth() 2727 auth &= ~(BT_SMP_AUTH_MITM); in get_auth() 2729 auth |= BT_SMP_AUTH_MITM; in get_auth() 2733 auth |= BT_SMP_AUTH_BONDING; in get_auth() 2735 auth &= ~BT_SMP_AUTH_BONDING; in get_auth() 2739 auth |= BT_SMP_AUTH_KEYPRESS; in get_auth() 2741 auth &= ~BT_SMP_AUTH_KEYPRESS; in get_auth() 2745 auth |= BT_SMP_AUTH_CT2; in get_auth() [all …]
|
/Zephyr-latest/tests/bsim/bluetooth/mesh/src/ |
D | test_beacon.c | 437 uint8_t auth[8]; in beacon_create() local 450 err = bt_mesh_beacon_auth(&beacon_key, flags, net_id, iv_index, auth); in beacon_create() 465 net_buf_simple_add_mem(buf, auth, 8); in beacon_create() 1245 uint8_t auth[8]; in private_beacon_create() local 1262 random_val, data, auth); in private_beacon_create() 1268 net_buf_simple_add_mem(buf, auth, 8); in private_beacon_create()
|
/Zephyr-latest/subsys/bluetooth/host/classic/shell/ |
D | bredr.c | 543 SHELL_CMD_ARG(auth-pincode, NULL, "<pincode>", cmd_auth_pincode, 2, 0),
|
/Zephyr-latest/scripts/west_commands/ |
D | patch.py | 483 gh = Github(auth=Auth.Token(args.tokenfile) if args.tokenfile else None)
|
/Zephyr-latest/subsys/bluetooth/host/shell/ |
D | bt.c | 5095 SHELL_CMD_ARG(auth, NULL, 5099 SHELL_CMD_ARG(auth-cancel, NULL, HELP_NONE, cmd_auth_cancel, 1, 0), 5100 SHELL_CMD_ARG(auth-passkey, NULL, "<passkey>", cmd_auth_passkey, 2, 0), 5102 SHELL_CMD_ARG(auth-passkey-notify, NULL, "<type>", 5105 SHELL_CMD_ARG(auth-passkey-confirm, NULL, HELP_NONE, 5107 SHELL_CMD_ARG(auth-pairing-confirm, NULL, HELP_NONE, 5110 SHELL_CMD_ARG(auth-oob-tk, NULL, "<tk>", cmd_auth_oob_tk, 2, 0),
|
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/ |
D | gap.rst | 320 :code:`bt auth all` command. After that, when you will set the security level, you will be asked to 322 :code:`bt auth-passkey-confirm`.
|
/Zephyr-latest/doc/security/ |
D | sensor-threat.rst | 250 [th-tls-client-auth]_. 382 .. [th-tls-client-auth]
|
/Zephyr-latest/modules/hostap/src/ |
D | supp_main.c | 595 os_free((char *)data->auth.ies); in event_socket_handler()
|
/Zephyr-latest/subsys/bluetooth/mesh/shell/ |
D | shell.c | 1675 SHELL_CMD(auth-method, &auth_cmds, "Authentication methods", bt_mesh_shell_mdl_cmds_help),
|
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/ |
D | shell.rst | 407 ``mesh prov auth-method input <Action> <Size>`` 421 ``mesh prov auth-method output <Action> <Size>`` 435 ``mesh prov auth-method static <Val(1-16 hex)>`` 442 ``mesh prov auth-method none``
|
/Zephyr-latest/doc/releases/ |
D | release-notes-1.7.rst | 354 * ``ZEP-1547`` - Add support for H7 crypto function and CT2 SMP auth flag
|
/Zephyr-latest/samples/modules/tflite-micro/hello_world/train/ |
D | train_hello_world_model.ipynb | 118 …"Requirement already satisfied: google-auth-oauthlib<0.5,>=0.4.1 in /usr/local/lib/python3.6/dist-… 122 …"Requirement already satisfied: google-auth<2,>=1.6.3 in /usr/local/lib/python3.6/dist-packages (f… 124 …ts-oauthlib>=0.7.0 in /usr/local/lib/python3.6/dist-packages (from google-auth-oauthlib<0.5,>=0.4.… 129 …etools<5.0,>=2.0.0 in /usr/local/lib/python3.6/dist-packages (from google-auth<2,>=1.6.3->tensorbo… 130 …n_version >= \"3\" in /usr/local/lib/python3.6/dist-packages (from google-auth<2,>=1.6.3->tensorbo… 131 …sn1-modules>=0.2.1 in /usr/local/lib/python3.6/dist-packages (from google-auth<2,>=1.6.3->tensorbo… 133 …/local/lib/python3.6/dist-packages (from requests-oauthlib>=0.7.0->google-auth-oauthlib<0.5,>=0.4.… 134 …hon3.6/dist-packages (from rsa<5,>=3.1.4; python_version >= \"3\"->google-auth<2,>=1.6.3->tensorbo…
|