/kernel/linux/common_modules/qos_auth/include/ |
H A D | qos_ctrl.h | 120 void qos_switch(struct auth_struct *auth, int target_status); 124 void remove_qos_tasks(struct auth_struct *auth);
|
/third_party/node/benchmark/url/ |
H A D | whatwg-url-get-prop.js | 17 auth: `${obj.username}:${obj.password}`, 30 noDead.auth = `${obj.username}:${obj.password}`;
|
/third_party/node/deps/npm/test/lib/commands/ |
H A D | owner.js | 9 const auth = { '//registry.npmjs.org/:_authToken': 'test-auth-token' } 164 config: { ...auth }, 197 config: { ...auth }, 227 config: { ...auth }, 250 config: { ...auth }, 264 config: { ...auth }, 286 config: { ...auth }, 342 config: { ...auth }, 369 config: { ...auth }, [all...] |
/kernel/linux/linux-5.10/net/ceph/ |
H A D | mon_client.c | 15 #include <linux/ceph/auth.h> 108 * Send an auth request. 133 ceph_auth_reset(monc->auth); in __close_session() 201 ret = ceph_auth_build_hello(monc->auth, in __open_session() 1027 int is_auth = ceph_auth_is_authenticated(monc->auth); in delayed_work() 1102 monc->auth = ceph_auth_init(cl->options->name, in ceph_monc_init() 1104 if (IS_ERR(monc->auth)) { in ceph_monc_init() 1105 err = PTR_ERR(monc->auth); in ceph_monc_init() 1108 monc->auth->want_keys = in ceph_monc_init() 1157 ceph_auth_destroy(monc->auth); in ceph_monc_init() [all...] |
/kernel/linux/linux-6.6/net/ceph/ |
H A D | mon_client.c | 15 #include <linux/ceph/auth.h> 173 * Send an auth request. 198 ceph_auth_reset(monc->auth); in __close_session() 272 ret = ceph_auth_build_hello(monc->auth, in __open_session() 1094 int is_auth = ceph_auth_is_authenticated(monc->auth); in delayed_work() 1169 monc->auth = ceph_auth_init(cl->options->name, cl->options->key, in ceph_monc_init() 1171 if (IS_ERR(monc->auth)) { in ceph_monc_init() 1172 err = PTR_ERR(monc->auth); in ceph_monc_init() 1175 monc->auth->want_keys = in ceph_monc_init() 1224 ceph_auth_destroy(monc->auth); in ceph_monc_init() [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/ |
H A D | key_backup.h | 46 int32_t TryRestoreKey(const std::shared_ptr<BaseKey> &baseKey, const UserAuth &auth); 48 const UserAuth &auth, 90 int32_t DoResotreKeyMix(std::shared_ptr<BaseKey> &baseKey, const UserAuth &auth, const std::string &keyDir,
|
H A D | fscrypt_key_v1.h | 45 bool DecryptClassE(const UserAuth &auth, bool &isSupport, bool &eBufferStatue, uint32_t user = 0, 47 bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user = 0, uint32_t status = 0);
|
/third_party/node/deps/undici/src/lib/ |
H A D | proxy-agent.js | 71 if (opts.auth && opts.token) { 72 throw new InvalidArgumentError('opts.auth cannot be used in combination with opts.token') 73 } else if (opts.auth) { 75 this[kProxyHeaders]['proxy-authorization'] = `Basic ${opts.auth}`
|
/foundation/communication/dsoftbus/core/authentication/src/ |
H A D | auth_session_message.c | 489 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 ", udid is null update local auth state=%{public}d", in UpdateLocalAuthState() 495 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState() 500 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState() 530 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState() 535 const AuthManager *auth, int32_t flagRelay, AuthLinkType type, const DeviceMessageParse *messageParse) in PostDeviceMessage() 537 AUTH_CHECK_AND_RETURN_RET_LOGE(auth != NULL, SOFTBUS_INVALID_PARAM, AUTH_FSM, "auth is NULL"); in PostDeviceMessage() 548 msg = PackVerifyDeviceMessage(auth->uuid); in PostDeviceMessage() 550 msg = PackKeepaliveMessage(auth->uuid, messageParse->cycle); in PostDeviceMessage() 560 if (EncryptInner(&auth in PostDeviceMessage() 534 PostDeviceMessage( const AuthManager *auth, int32_t flagRelay, AuthLinkType type, const DeviceMessageParse *messageParse) PostDeviceMessage() argument [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | vrf-xfrm-tests.sh | 267 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 274 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 282 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 289 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 297 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 304 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 312 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 319 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
|
/kernel/linux/linux-5.10/net/sctp/ |
H A D | auth.c | 20 #include <net/sctp/auth.h> 416 chunk->auth = 1; in sctp_auth_asoc_init_active_key() 708 struct sk_buff *skb, struct sctp_auth_chunk *auth, in sctp_auth_calculate_hmac() 722 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac() 723 hmac_id = ntohs(auth->auth_hdr.hmac_id); in sctp_auth_calculate_hmac() 741 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac() 745 crypto_shash_tfm_digest(tfm, (u8 *)auth, end - (unsigned char *)auth, in sctp_auth_calculate_hmac() 707 sctp_auth_calculate_hmac(const struct sctp_association *asoc, struct sk_buff *skb, struct sctp_auth_chunk *auth, struct sctp_shared_key *ep_key, gfp_t gfp) sctp_auth_calculate_hmac() argument
|
/kernel/linux/linux-6.6/net/sctp/ |
H A D | auth.c | 20 #include <net/sctp/auth.h> 416 chunk->auth = 1; in sctp_auth_asoc_init_active_key() 708 struct sk_buff *skb, struct sctp_auth_chunk *auth, in sctp_auth_calculate_hmac() 722 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac() 723 hmac_id = ntohs(auth->auth_hdr.hmac_id); in sctp_auth_calculate_hmac() 741 digest = (u8 *)(&auth->auth_hdr + 1); in sctp_auth_calculate_hmac() 745 crypto_shash_tfm_digest(tfm, (u8 *)auth, end - (unsigned char *)auth, in sctp_auth_calculate_hmac() 707 sctp_auth_calculate_hmac(const struct sctp_association *asoc, struct sk_buff *skb, struct sctp_auth_chunk *auth, struct sctp_shared_key *ep_key, gfp_t gfp) sctp_auth_calculate_hmac() argument
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | vrf-xfrm-tests.sh | 267 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 274 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 282 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 289 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 297 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 304 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 312 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 319 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
|
/foundation/communication/bluetooth/frameworks/inner/src/ |
H A D | bluetooth_socket.cpp | 84 impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth); 86 impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth, 362 ClientSocket::impl::impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth) in impl() argument 369 auth_(auth), in impl() 388 ClientSocket::impl::impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth, in impl() argument 397 auth_(auth), in impl() 403 ClientSocket::ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth) in ClientSocket() argument 404 : pimpl(new ClientSocket::impl(bda, uuid, type, auth)) in ClientSocket() 411 ClientSocket::ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth, in ClientSocket() argument 413 : pimpl(new ClientSocket::impl(bda, uuid, type, auth, observe in ClientSocket() [all...] |
/kernel/linux/linux-5.10/drivers/net/wireless/quantenna/qtnfmac/ |
H A D | event.c | 560 struct cfg80211_external_auth_params auth = {0}; in qtnf_event_handle_external_auth() local 575 memcpy(auth.ssid.ssid, ev->ssid, len); in qtnf_event_handle_external_auth() 576 auth.ssid.ssid_len = len; in qtnf_event_handle_external_auth() 579 auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite); in qtnf_event_handle_external_auth() 580 ether_addr_copy(auth.bssid, ev->bssid); in qtnf_event_handle_external_auth() 581 auth.action = ev->action; in qtnf_event_handle_external_auth() 584 vif->netdev->name, auth.bssid, auth.action, in qtnf_event_handle_external_auth() 585 auth.key_mgmt_suite); in qtnf_event_handle_external_auth() 587 ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNE in qtnf_event_handle_external_auth() [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/quantenna/qtnfmac/ |
H A D | event.c | 561 struct cfg80211_external_auth_params auth = {0}; in qtnf_event_handle_external_auth() local 576 memcpy(auth.ssid.ssid, ev->ssid, len); in qtnf_event_handle_external_auth() 577 auth.ssid.ssid_len = len; in qtnf_event_handle_external_auth() 580 auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite); in qtnf_event_handle_external_auth() 581 ether_addr_copy(auth.bssid, ev->bssid); in qtnf_event_handle_external_auth() 582 auth.action = ev->action; in qtnf_event_handle_external_auth() 585 vif->netdev->name, auth.bssid, auth.action, in qtnf_event_handle_external_auth() 586 auth.key_mgmt_suite); in qtnf_event_handle_external_auth() 588 ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNE in qtnf_event_handle_external_auth() [all...] |
/kernel/linux/linux-5.10/net/sunrpc/ |
H A D | auth_null.c | 29 nul_destroy(struct rpc_auth *auth) in nul_destroy() argument 37 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in nul_lookup_cred() argument
|
/kernel/linux/linux-6.6/net/sunrpc/ |
H A D | auth_null.c | 29 nul_destroy(struct rpc_auth *auth) in nul_destroy() argument 37 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in nul_lookup_cred() argument
|
/test/xts/hats/useriam/userauth/src/ |
H A D | user_auth_type_test.cpp | 133 ScheduleMode auth = AUTH; in HWTEST_F() local 136 EXPECT_EQ(auth, 1); in HWTEST_F()
|
/third_party/node/test/parallel/ |
H A D | test-url-parse-query.js | 46 auth: undefined, 60 auth: undefined,
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | fscrypt_key_v1.cpp | 228 bool FscryptKeyV1::DecryptClassE(const UserAuth &auth, bool &isSupport, in DecryptClassE() argument 238 if ((auth.token.IsEmpty() && auth.secret.IsEmpty()) || eSecretFBE.IsEmpty()) { in DecryptClassE() 251 if (KeyBackup::GetInstance().TryRestoreUeceKey(shared_from_this(), auth, eSecretFBE, decryptedKey) != 0) { in DecryptClassE() 267 bool FscryptKeyV1::EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) in EncryptClassE() argument 282 if (!EncryptKeyBlob(auth, dir_ + PATH_LATEST, eSecretFBE, encryptedKey)) { in EncryptClassE()
|
/foundation/communication/dsoftbus/core/bus_center/lnn/lane_hub/lane_manager/src/ |
H A D | lnn_lane_link_p2p.c | 83 AuthChannel auth; member 96 AuthChannel auth; member 332 if ((type == ASYNC_RESULT_AUTH && item->auth.requestId == requestId) || in GetP2pLinkedReqByReqId() 358 authHandle.authId = item->auth.authHandle.authId; in RecycleLinkedListResource() 359 authHandle.type = item->auth.authHandle.type; in RecycleLinkedListResource() 448 if (item->auth.requestId != authRequestId) { in GetP2pLinkDownParam() 454 item->auth.authHandle = authHandle; in GetP2pLinkDownParam() 473 if (item->auth.requestId == authRequestId) { in DelP2pLinkedByAuthReqId() 484 LNN_LOGI(LNN_LANE, "auth open fail to disconnect wifidirect, authRequestId=%{public}u, reason=%{public}d", in OnConnOpenFailedForDisconnect() 518 LNN_LOGI(LNN_LANE, "auth opene in OnConnOpenedForDisconnect() [all...] |
/foundation/communication/ipc/ipc/native/test/unittest/common/ |
H A D | ipc_process_skeleton_unittest.cpp | 1383 std::shared_ptr<CommAuthInfo> auth = in HWTEST_F() local 1386 bool ret = skeleton->IsSameRemoteObject(stubObject.GetRefPtr(), pid, uid, tokenId, deviceId, auth); in HWTEST_F() 1405 std::shared_ptr<CommAuthInfo> auth = in HWTEST_F() local 1408 bool ret = skeleton->IsSameRemoteObject(nullptr, pid, uid, tokenId, deviceId, auth); in HWTEST_F() 1427 std::shared_ptr<CommAuthInfo> auth = in HWTEST_F() local 1430 bool ret = skeleton->IsSameRemoteObject(stubObject.GetRefPtr(), 0, uid, tokenId, deviceId, auth); in HWTEST_F() 1449 std::shared_ptr<CommAuthInfo> auth = in HWTEST_F() local 1452 bool ret = skeleton->IsSameRemoteObject(stubObject.GetRefPtr(), pid, 0, tokenId, deviceId, auth); in HWTEST_F() 1471 std::shared_ptr<CommAuthInfo> auth = in HWTEST_F() local 1474 bool ret = skeleton->IsSameRemoteObject(stubObject.GetRefPtr(), pid, uid, 0, deviceId, auth); in HWTEST_F() 1493 std::shared_ptr<CommAuthInfo> auth = HWTEST_F() local 1516 std::shared_ptr<CommAuthInfo> auth = HWTEST_F() local 1562 std::shared_ptr<CommAuthInfo> auth = HWTEST_F() local 1588 std::shared_ptr<CommAuthInfo> auth = HWTEST_F() local [all...] |
/kernel/linux/linux-5.10/net/bluetooth/ |
H A D | smp.c | 850 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument 863 bt_dev_dbg(hcon->hdev, "auth:%d lcl:%d rem:%d", auth, local_io, in tk_request() 872 if (!(auth & SMP_AUTH_MITM)) in tk_request() 1011 u8 stk[16], auth; in smp_random() local 1021 auth = 1; in smp_random() 1023 auth = 0; in smp_random() 1030 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random() 1137 u8 key_type, auth; in sc_add_ltk() local 1145 auth in sc_add_ltk() 1745 u8 key_size, auth, sec_level; smp_cmd_pairing_req() local 1936 u8 key_size, auth; smp_cmd_pairing_rsp() local 2058 u8 auth; fixup_sc_false_positive() local 2300 u8 sec_level, auth; smp_cmd_security_req() local [all...] |
/kernel/linux/linux-6.6/net/bluetooth/ |
H A D | smp.c | 851 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument 864 bt_dev_dbg(hcon->hdev, "auth:%u lcl:%u rem:%u", auth, local_io, in tk_request() 873 if (!(auth & SMP_AUTH_MITM)) in tk_request() 1012 u8 stk[16], auth; in smp_random() local 1022 auth = 1; in smp_random() 1024 auth = 0; in smp_random() 1031 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random() 1143 u8 key_type, auth; in sc_add_ltk() local 1151 auth in sc_add_ltk() 1751 u8 key_size, auth, sec_level; smp_cmd_pairing_req() local 1942 u8 key_size, auth; smp_cmd_pairing_rsp() local 2064 u8 auth; fixup_sc_false_positive() local 2306 u8 sec_level, auth; smp_cmd_security_req() local [all...] |