/kernel/linux/linux-5.10/arch/s390/kernel/ |
H A D | perf_cpum_cf_diag.c | 79 unsigned int caca:1; /* Counter auth. change alert */ 402 static size_t cf_diag_getctr(void *data, size_t sz, unsigned long auth) in cf_diag_getctr() argument 413 if (!(auth & cpumf_ctr_ctl[i])) in cf_diag_getctr() 443 static int cf_diag_diffctr(struct cf_diag_csd *csd, unsigned long auth) in cf_diag_diffctr() argument 449 auth &= (1 << CPUMF_LCCTL_ENABLE_SHIFT) - 1; in cf_diag_diffctr() 459 auth &= ~cpumf_ctr_ctl[ctrstart->set]; in cf_diag_diffctr() 467 "%s set %d ctr %d offset %zu auth %lx\n", in cf_diag_diffctr() 469 offset, auth); in cf_diag_diffctr() 470 } while (ctrstart->def && auth); in cf_diag_diffctr()
|
/kernel/linux/linux-5.10/drivers/gpu/drm/amd/display/modules/hdcp/ |
H A D | hdcp.c | 189 if (hdcp->auth.trans_input.hdcp1.create_session != UNKNOWN) { in reset_authentication() 198 memset(&hdcp->auth, 0, sizeof(struct mod_hdcp_authentication)); in reset_authentication() 202 if (hdcp->auth.trans_input.hdcp2.create_session == PASS) { in reset_authentication() 212 memset(&hdcp->auth, 0, sizeof(struct mod_hdcp_authentication)); in reset_authentication() 217 memset(&hdcp->auth, 0, sizeof(struct mod_hdcp_authentication)); in reset_authentication() 452 exec_status = execution(hdcp, &event_ctx, &hdcp->auth.trans_input); in mod_hdcp_process_event() 454 hdcp, &event_ctx, &hdcp->auth.trans_input, output); in mod_hdcp_process_event()
|
/kernel/linux/linux-6.6/drivers/gpu/drm/amd/display/modules/hdcp/ |
H A D | hdcp.c | 194 if (hdcp->auth.trans_input.hdcp1.create_session != UNKNOWN) { in reset_authentication() 203 memset(&hdcp->auth, 0, sizeof(struct mod_hdcp_authentication)); in reset_authentication() 207 if (hdcp->auth.trans_input.hdcp2.create_session == PASS) { in reset_authentication() 217 memset(&hdcp->auth, 0, sizeof(struct mod_hdcp_authentication)); in reset_authentication() 222 memset(&hdcp->auth, 0, sizeof(struct mod_hdcp_authentication)); in reset_authentication() 547 exec_status = execution(hdcp, &event_ctx, &hdcp->auth.trans_input); in mod_hdcp_process_event() 549 hdcp, &event_ctx, &hdcp->auth.trans_input, output); in mod_hdcp_process_event()
|
/third_party/ffmpeg/libavformat/ |
H A D | httpauth.c | 79 char *ptr = strstr(qop, "auth"); in choose_qop() 80 char *end = ptr + strlen("auth"); in choose_qop() 84 av_strlcpy(qop, "auth", size); in choose_qop() 188 if (!strcmp(digest->qop, "auth") || !strcmp(digest->qop, "auth-int")) { in make_digest_auth() 197 if (!strcmp(digest->qop, "") || !strcmp(digest->qop, "auth")) { in make_digest_auth() 198 } else if (!strcmp(digest->qop, "auth-int")) { in make_digest_auth() 199 /* qop=auth-int not supported */ in make_digest_auth() 240 char *ff_http_auth_create_response(HTTPAuthState *state, const char *auth, in ff_http_auth_create_response() argument 245 /* Clear the stale flag, we assume the auth i in ff_http_auth_create_response() [all...] |
/third_party/python/Lib/distutils/command/ |
H A D | register.py | 104 2. send the data as a Basic auth'ed POST. 161 auth = urllib.request.HTTPPasswordMgr() 163 auth.add_password(self.realm, host, username, password) 166 auth) 249 def post_to_server(self, data, auth=None): 286 urllib.request.HTTPBasicAuthHandler(password_mgr=auth)
|
/third_party/node/deps/npm/test/lib/commands/ |
H A D | owner.js | 9 const auth = { '//registry.npmjs.org/:_authToken': 'test-auth-token' } 164 config: { ...auth }, 197 config: { ...auth }, 227 config: { ...auth }, 250 config: { ...auth }, 264 config: { ...auth }, 286 config: { ...auth }, 342 config: { ...auth }, 369 config: { ...auth }, [all...] |
/kernel/linux/linux-5.10/net/ceph/ |
H A D | mon_client.c | 15 #include <linux/ceph/auth.h> 108 * Send an auth request. 133 ceph_auth_reset(monc->auth); in __close_session() 201 ret = ceph_auth_build_hello(monc->auth, in __open_session() 1027 int is_auth = ceph_auth_is_authenticated(monc->auth); in delayed_work() 1102 monc->auth = ceph_auth_init(cl->options->name, in ceph_monc_init() 1104 if (IS_ERR(monc->auth)) { in ceph_monc_init() 1105 err = PTR_ERR(monc->auth); in ceph_monc_init() 1108 monc->auth->want_keys = in ceph_monc_init() 1157 ceph_auth_destroy(monc->auth); in ceph_monc_init() [all...] |
/kernel/linux/linux-6.6/net/ceph/ |
H A D | mon_client.c | 15 #include <linux/ceph/auth.h> 173 * Send an auth request. 198 ceph_auth_reset(monc->auth); in __close_session() 272 ret = ceph_auth_build_hello(monc->auth, in __open_session() 1094 int is_auth = ceph_auth_is_authenticated(monc->auth); in delayed_work() 1169 monc->auth = ceph_auth_init(cl->options->name, cl->options->key, in ceph_monc_init() 1171 if (IS_ERR(monc->auth)) { in ceph_monc_init() 1172 err = PTR_ERR(monc->auth); in ceph_monc_init() 1175 monc->auth->want_keys = in ceph_monc_init() 1224 ceph_auth_destroy(monc->auth); in ceph_monc_init() [all...] |
/kernel/linux/common_modules/qos_auth/include/ |
H A D | auth_ctrl.h | 116 void get_auth_struct(struct auth_struct *auth); 117 void put_auth_struct(struct auth_struct *auth);
|
H A D | qos_ctrl.h | 120 void qos_switch(struct auth_struct *auth, int target_status); 124 void remove_qos_tasks(struct auth_struct *auth);
|
/third_party/node/benchmark/url/ |
H A D | whatwg-url-get-prop.js | 17 auth: `${obj.username}:${obj.password}`, 30 noDead.auth = `${obj.username}:${obj.password}`;
|
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | vrf-xfrm-tests.sh | 267 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 274 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 282 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 289 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 297 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 304 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 312 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 319 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
|
/kernel/linux/linux-5.10/net/sctp/ |
H A D | auth.c | 20 #include <net/sctp/auth.h> 416 chunk->auth = 1; in sctp_auth_asoc_init_active_key() 708 struct sk_buff *skb, struct sctp_auth_chunk *auth, in sctp_auth_calculate_hmac() 722 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac() 723 hmac_id = ntohs(auth->auth_hdr.hmac_id); in sctp_auth_calculate_hmac() 741 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac() 745 crypto_shash_tfm_digest(tfm, (u8 *)auth, end - (unsigned char *)auth, in sctp_auth_calculate_hmac() 707 sctp_auth_calculate_hmac(const struct sctp_association *asoc, struct sk_buff *skb, struct sctp_auth_chunk *auth, struct sctp_shared_key *ep_key, gfp_t gfp) sctp_auth_calculate_hmac() argument
|
/kernel/linux/linux-6.6/net/sctp/ |
H A D | auth.c | 20 #include <net/sctp/auth.h> 416 chunk->auth = 1; in sctp_auth_asoc_init_active_key() 708 struct sk_buff *skb, struct sctp_auth_chunk *auth, in sctp_auth_calculate_hmac() 722 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac() 723 hmac_id = ntohs(auth->auth_hdr.hmac_id); in sctp_auth_calculate_hmac() 741 digest = (u8 *)(&auth->auth_hdr + 1); in sctp_auth_calculate_hmac() 745 crypto_shash_tfm_digest(tfm, (u8 *)auth, end - (unsigned char *)auth, in sctp_auth_calculate_hmac() 707 sctp_auth_calculate_hmac(const struct sctp_association *asoc, struct sk_buff *skb, struct sctp_auth_chunk *auth, struct sctp_shared_key *ep_key, gfp_t gfp) sctp_auth_calculate_hmac() argument
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | vrf-xfrm-tests.sh | 267 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 274 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 282 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 289 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 297 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 304 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 312 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 319 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
|
/third_party/node/deps/undici/src/lib/ |
H A D | proxy-agent.js | 71 if (opts.auth && opts.token) { 72 throw new InvalidArgumentError('opts.auth cannot be used in combination with opts.token') 73 } else if (opts.auth) { 75 this[kProxyHeaders]['proxy-authorization'] = `Basic ${opts.auth}`
|
/kernel/linux/linux-5.10/drivers/net/wireless/quantenna/qtnfmac/ |
H A D | event.c | 560 struct cfg80211_external_auth_params auth = {0}; in qtnf_event_handle_external_auth() local 575 memcpy(auth.ssid.ssid, ev->ssid, len); in qtnf_event_handle_external_auth() 576 auth.ssid.ssid_len = len; in qtnf_event_handle_external_auth() 579 auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite); in qtnf_event_handle_external_auth() 580 ether_addr_copy(auth.bssid, ev->bssid); in qtnf_event_handle_external_auth() 581 auth.action = ev->action; in qtnf_event_handle_external_auth() 584 vif->netdev->name, auth.bssid, auth.action, in qtnf_event_handle_external_auth() 585 auth.key_mgmt_suite); in qtnf_event_handle_external_auth() 587 ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNE in qtnf_event_handle_external_auth() [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/quantenna/qtnfmac/ |
H A D | event.c | 561 struct cfg80211_external_auth_params auth = {0}; in qtnf_event_handle_external_auth() local 576 memcpy(auth.ssid.ssid, ev->ssid, len); in qtnf_event_handle_external_auth() 577 auth.ssid.ssid_len = len; in qtnf_event_handle_external_auth() 580 auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite); in qtnf_event_handle_external_auth() 581 ether_addr_copy(auth.bssid, ev->bssid); in qtnf_event_handle_external_auth() 582 auth.action = ev->action; in qtnf_event_handle_external_auth() 585 vif->netdev->name, auth.bssid, auth.action, in qtnf_event_handle_external_auth() 586 auth.key_mgmt_suite); in qtnf_event_handle_external_auth() 588 ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNE in qtnf_event_handle_external_auth() [all...] |
/kernel/linux/linux-5.10/net/bluetooth/ |
H A D | smp.c | 850 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument 863 bt_dev_dbg(hcon->hdev, "auth:%d lcl:%d rem:%d", auth, local_io, in tk_request() 872 if (!(auth & SMP_AUTH_MITM)) in tk_request() 1011 u8 stk[16], auth; in smp_random() local 1021 auth = 1; in smp_random() 1023 auth = 0; in smp_random() 1030 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random() 1137 u8 key_type, auth; in sc_add_ltk() local 1145 auth in sc_add_ltk() 1745 u8 key_size, auth, sec_level; smp_cmd_pairing_req() local 1936 u8 key_size, auth; smp_cmd_pairing_rsp() local 2058 u8 auth; fixup_sc_false_positive() local 2300 u8 sec_level, auth; smp_cmd_security_req() local [all...] |
/kernel/linux/linux-6.6/net/bluetooth/ |
H A D | smp.c | 851 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument 864 bt_dev_dbg(hcon->hdev, "auth:%u lcl:%u rem:%u", auth, local_io, in tk_request() 873 if (!(auth & SMP_AUTH_MITM)) in tk_request() 1012 u8 stk[16], auth; in smp_random() local 1022 auth = 1; in smp_random() 1024 auth = 0; in smp_random() 1031 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random() 1143 u8 key_type, auth; in sc_add_ltk() local 1151 auth in sc_add_ltk() 1751 u8 key_size, auth, sec_level; smp_cmd_pairing_req() local 1942 u8 key_size, auth; smp_cmd_pairing_rsp() local 2064 u8 auth; fixup_sc_false_positive() local 2306 u8 sec_level, auth; smp_cmd_security_req() local [all...] |
/kernel/linux/linux-5.10/net/sunrpc/ |
H A D | auth_null.c | 29 nul_destroy(struct rpc_auth *auth) in nul_destroy() argument 37 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in nul_lookup_cred() argument
|
/kernel/linux/linux-6.6/net/sunrpc/ |
H A D | auth_null.c | 29 nul_destroy(struct rpc_auth *auth) in nul_destroy() argument 37 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in nul_lookup_cred() argument
|
/test/xts/hats/useriam/userauth/src/ |
H A D | user_auth_type_test.cpp | 133 ScheduleMode auth = AUTH; in HWTEST_F() local 136 EXPECT_EQ(auth, 1); in HWTEST_F()
|
/third_party/node/test/parallel/ |
H A D | test-url-parse-query.js | 46 auth: undefined, 60 auth: undefined,
|
/third_party/curl/lib/ |
H A D | curl_sasl.c | 195 unsigned long auth = data->set.httpauth; in Curl_sasl_init() local 207 if(auth != CURLAUTH_BASIC) { in Curl_sasl_init() 212 if(auth & CURLAUTH_BASIC) in Curl_sasl_init() 214 if(auth & CURLAUTH_DIGEST) in Curl_sasl_init() 216 if(auth & CURLAUTH_NTLM) in Curl_sasl_init() 218 if(auth & CURLAUTH_BEARER) in Curl_sasl_init() 220 if(auth & CURLAUTH_GSSAPI) in Curl_sasl_init() 323 * Check if we have enough auth data and capabilities to authenticate.
|