Home
last modified time | relevance | path

Searched refs:auth (Results 126 - 150 of 665) sorted by relevance

12345678910>>...27

/kernel/linux/common_modules/qos_auth/include/
H A Dqos_ctrl.h120 void qos_switch(struct auth_struct *auth, int target_status);
124 void remove_qos_tasks(struct auth_struct *auth);
/third_party/node/benchmark/url/
H A Dwhatwg-url-get-prop.js17 auth: `${obj.username}:${obj.password}`,
30 noDead.auth = `${obj.username}:${obj.password}`;
/third_party/node/deps/npm/test/lib/commands/
H A Downer.js9 const auth = { '//registry.npmjs.org/:_authToken': 'test-auth-token' }
164 config: { ...auth },
197 config: { ...auth },
227 config: { ...auth },
250 config: { ...auth },
264 config: { ...auth },
286 config: { ...auth },
342 config: { ...auth },
369 config: { ...auth },
[all...]
/kernel/linux/linux-5.10/net/ceph/
H A Dmon_client.c15 #include <linux/ceph/auth.h>
108 * Send an auth request.
133 ceph_auth_reset(monc->auth); in __close_session()
201 ret = ceph_auth_build_hello(monc->auth, in __open_session()
1027 int is_auth = ceph_auth_is_authenticated(monc->auth); in delayed_work()
1102 monc->auth = ceph_auth_init(cl->options->name, in ceph_monc_init()
1104 if (IS_ERR(monc->auth)) { in ceph_monc_init()
1105 err = PTR_ERR(monc->auth); in ceph_monc_init()
1108 monc->auth->want_keys = in ceph_monc_init()
1157 ceph_auth_destroy(monc->auth); in ceph_monc_init()
[all...]
/kernel/linux/linux-6.6/net/ceph/
H A Dmon_client.c15 #include <linux/ceph/auth.h>
173 * Send an auth request.
198 ceph_auth_reset(monc->auth); in __close_session()
272 ret = ceph_auth_build_hello(monc->auth, in __open_session()
1094 int is_auth = ceph_auth_is_authenticated(monc->auth); in delayed_work()
1169 monc->auth = ceph_auth_init(cl->options->name, cl->options->key, in ceph_monc_init()
1171 if (IS_ERR(monc->auth)) { in ceph_monc_init()
1172 err = PTR_ERR(monc->auth); in ceph_monc_init()
1175 monc->auth->want_keys = in ceph_monc_init()
1224 ceph_auth_destroy(monc->auth); in ceph_monc_init()
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/
H A Dkey_backup.h46 int32_t TryRestoreKey(const std::shared_ptr<BaseKey> &baseKey, const UserAuth &auth);
48 const UserAuth &auth,
90 int32_t DoResotreKeyMix(std::shared_ptr<BaseKey> &baseKey, const UserAuth &auth, const std::string &keyDir,
H A Dfscrypt_key_v1.h45 bool DecryptClassE(const UserAuth &auth, bool &isSupport, bool &eBufferStatue, uint32_t user = 0,
47 bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user = 0, uint32_t status = 0);
/third_party/node/deps/undici/src/lib/
H A Dproxy-agent.js71 if (opts.auth && opts.token) {
72 throw new InvalidArgumentError('opts.auth cannot be used in combination with opts.token')
73 } else if (opts.auth) {
75 this[kProxyHeaders]['proxy-authorization'] = `Basic ${opts.auth}`
/foundation/communication/dsoftbus/core/authentication/src/
H A Dauth_session_message.c489 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 ", udid is null update local auth state=%{public}d", in UpdateLocalAuthState()
495 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState()
500 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState()
530 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState()
535 const AuthManager *auth, int32_t flagRelay, AuthLinkType type, const DeviceMessageParse *messageParse) in PostDeviceMessage()
537 AUTH_CHECK_AND_RETURN_RET_LOGE(auth != NULL, SOFTBUS_INVALID_PARAM, AUTH_FSM, "auth is NULL"); in PostDeviceMessage()
548 msg = PackVerifyDeviceMessage(auth->uuid); in PostDeviceMessage()
550 msg = PackKeepaliveMessage(auth->uuid, messageParse->cycle); in PostDeviceMessage()
560 if (EncryptInner(&auth in PostDeviceMessage()
534 PostDeviceMessage( const AuthManager *auth, int32_t flagRelay, AuthLinkType type, const DeviceMessageParse *messageParse) PostDeviceMessage() argument
[all...]
/kernel/linux/linux-5.10/tools/testing/selftests/net/
H A Dvrf-xfrm-tests.sh267 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
274 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
282 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
289 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
297 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
304 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
312 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
319 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
/kernel/linux/linux-5.10/net/sctp/
H A Dauth.c20 #include <net/sctp/auth.h>
416 chunk->auth = 1; in sctp_auth_asoc_init_active_key()
708 struct sk_buff *skb, struct sctp_auth_chunk *auth, in sctp_auth_calculate_hmac()
722 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac()
723 hmac_id = ntohs(auth->auth_hdr.hmac_id); in sctp_auth_calculate_hmac()
741 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
745 crypto_shash_tfm_digest(tfm, (u8 *)auth, end - (unsigned char *)auth, in sctp_auth_calculate_hmac()
707 sctp_auth_calculate_hmac(const struct sctp_association *asoc, struct sk_buff *skb, struct sctp_auth_chunk *auth, struct sctp_shared_key *ep_key, gfp_t gfp) sctp_auth_calculate_hmac() argument
/kernel/linux/linux-6.6/net/sctp/
H A Dauth.c20 #include <net/sctp/auth.h>
416 chunk->auth = 1; in sctp_auth_asoc_init_active_key()
708 struct sk_buff *skb, struct sctp_auth_chunk *auth, in sctp_auth_calculate_hmac()
722 key_id = ntohs(auth->auth_hdr.shkey_id); in sctp_auth_calculate_hmac()
723 hmac_id = ntohs(auth->auth_hdr.hmac_id); in sctp_auth_calculate_hmac()
741 digest = (u8 *)(&auth->auth_hdr + 1); in sctp_auth_calculate_hmac()
745 crypto_shash_tfm_digest(tfm, (u8 *)auth, end - (unsigned char *)auth, in sctp_auth_calculate_hmac()
707 sctp_auth_calculate_hmac(const struct sctp_association *asoc, struct sk_buff *skb, struct sctp_auth_chunk *auth, struct sctp_shared_key *ep_key, gfp_t gfp) sctp_auth_calculate_hmac() argument
/kernel/linux/linux-6.6/tools/testing/selftests/net/
H A Dvrf-xfrm-tests.sh267 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
274 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
282 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
289 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
297 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
304 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
312 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
319 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
/foundation/communication/bluetooth/frameworks/inner/src/
H A Dbluetooth_socket.cpp84 impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth);
86 impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth,
362 ClientSocket::impl::impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth) in impl() argument
369 auth_(auth), in impl()
388 ClientSocket::impl::impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth, in impl() argument
397 auth_(auth), in impl()
403 ClientSocket::ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth) in ClientSocket() argument
404 : pimpl(new ClientSocket::impl(bda, uuid, type, auth)) in ClientSocket()
411 ClientSocket::ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth, in ClientSocket() argument
413 : pimpl(new ClientSocket::impl(bda, uuid, type, auth, observe in ClientSocket()
[all...]
/kernel/linux/linux-5.10/drivers/net/wireless/quantenna/qtnfmac/
H A Devent.c560 struct cfg80211_external_auth_params auth = {0}; in qtnf_event_handle_external_auth() local
575 memcpy(auth.ssid.ssid, ev->ssid, len); in qtnf_event_handle_external_auth()
576 auth.ssid.ssid_len = len; in qtnf_event_handle_external_auth()
579 auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite); in qtnf_event_handle_external_auth()
580 ether_addr_copy(auth.bssid, ev->bssid); in qtnf_event_handle_external_auth()
581 auth.action = ev->action; in qtnf_event_handle_external_auth()
584 vif->netdev->name, auth.bssid, auth.action, in qtnf_event_handle_external_auth()
585 auth.key_mgmt_suite); in qtnf_event_handle_external_auth()
587 ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNE in qtnf_event_handle_external_auth()
[all...]
/kernel/linux/linux-6.6/drivers/net/wireless/quantenna/qtnfmac/
H A Devent.c561 struct cfg80211_external_auth_params auth = {0}; in qtnf_event_handle_external_auth() local
576 memcpy(auth.ssid.ssid, ev->ssid, len); in qtnf_event_handle_external_auth()
577 auth.ssid.ssid_len = len; in qtnf_event_handle_external_auth()
580 auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite); in qtnf_event_handle_external_auth()
581 ether_addr_copy(auth.bssid, ev->bssid); in qtnf_event_handle_external_auth()
582 auth.action = ev->action; in qtnf_event_handle_external_auth()
585 vif->netdev->name, auth.bssid, auth.action, in qtnf_event_handle_external_auth()
586 auth.key_mgmt_suite); in qtnf_event_handle_external_auth()
588 ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNE in qtnf_event_handle_external_auth()
[all...]
/kernel/linux/linux-5.10/net/sunrpc/
H A Dauth_null.c29 nul_destroy(struct rpc_auth *auth) in nul_destroy() argument
37 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in nul_lookup_cred() argument
/kernel/linux/linux-6.6/net/sunrpc/
H A Dauth_null.c29 nul_destroy(struct rpc_auth *auth) in nul_destroy() argument
37 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) in nul_lookup_cred() argument
/test/xts/hats/useriam/userauth/src/
H A Duser_auth_type_test.cpp133 ScheduleMode auth = AUTH; in HWTEST_F() local
136 EXPECT_EQ(auth, 1); in HWTEST_F()
/third_party/node/test/parallel/
H A Dtest-url-parse-query.js46 auth: undefined,
60 auth: undefined,
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/
H A Dfscrypt_key_v1.cpp228 bool FscryptKeyV1::DecryptClassE(const UserAuth &auth, bool &isSupport, in DecryptClassE() argument
238 if ((auth.token.IsEmpty() && auth.secret.IsEmpty()) || eSecretFBE.IsEmpty()) { in DecryptClassE()
251 if (KeyBackup::GetInstance().TryRestoreUeceKey(shared_from_this(), auth, eSecretFBE, decryptedKey) != 0) { in DecryptClassE()
267 bool FscryptKeyV1::EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) in EncryptClassE() argument
282 if (!EncryptKeyBlob(auth, dir_ + PATH_LATEST, eSecretFBE, encryptedKey)) { in EncryptClassE()
/foundation/communication/dsoftbus/core/bus_center/lnn/lane_hub/lane_manager/src/
H A Dlnn_lane_link_p2p.c83 AuthChannel auth; member
96 AuthChannel auth; member
332 if ((type == ASYNC_RESULT_AUTH && item->auth.requestId == requestId) || in GetP2pLinkedReqByReqId()
358 authHandle.authId = item->auth.authHandle.authId; in RecycleLinkedListResource()
359 authHandle.type = item->auth.authHandle.type; in RecycleLinkedListResource()
448 if (item->auth.requestId != authRequestId) { in GetP2pLinkDownParam()
454 item->auth.authHandle = authHandle; in GetP2pLinkDownParam()
473 if (item->auth.requestId == authRequestId) { in DelP2pLinkedByAuthReqId()
484 LNN_LOGI(LNN_LANE, "auth open fail to disconnect wifidirect, authRequestId=%{public}u, reason=%{public}d", in OnConnOpenFailedForDisconnect()
518 LNN_LOGI(LNN_LANE, "auth opene in OnConnOpenedForDisconnect()
[all...]
/foundation/communication/ipc/ipc/native/test/unittest/common/
H A Dipc_process_skeleton_unittest.cpp1383 std::shared_ptr<CommAuthInfo> auth = in HWTEST_F() local
1386 bool ret = skeleton->IsSameRemoteObject(stubObject.GetRefPtr(), pid, uid, tokenId, deviceId, auth); in HWTEST_F()
1405 std::shared_ptr<CommAuthInfo> auth = in HWTEST_F() local
1408 bool ret = skeleton->IsSameRemoteObject(nullptr, pid, uid, tokenId, deviceId, auth); in HWTEST_F()
1427 std::shared_ptr<CommAuthInfo> auth = in HWTEST_F() local
1430 bool ret = skeleton->IsSameRemoteObject(stubObject.GetRefPtr(), 0, uid, tokenId, deviceId, auth); in HWTEST_F()
1449 std::shared_ptr<CommAuthInfo> auth = in HWTEST_F() local
1452 bool ret = skeleton->IsSameRemoteObject(stubObject.GetRefPtr(), pid, 0, tokenId, deviceId, auth); in HWTEST_F()
1471 std::shared_ptr<CommAuthInfo> auth = in HWTEST_F() local
1474 bool ret = skeleton->IsSameRemoteObject(stubObject.GetRefPtr(), pid, uid, 0, deviceId, auth); in HWTEST_F()
1493 std::shared_ptr<CommAuthInfo> auth = HWTEST_F() local
1516 std::shared_ptr<CommAuthInfo> auth = HWTEST_F() local
1562 std::shared_ptr<CommAuthInfo> auth = HWTEST_F() local
1588 std::shared_ptr<CommAuthInfo> auth = HWTEST_F() local
[all...]
/kernel/linux/linux-5.10/net/bluetooth/
H A Dsmp.c850 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument
863 bt_dev_dbg(hcon->hdev, "auth:%d lcl:%d rem:%d", auth, local_io, in tk_request()
872 if (!(auth & SMP_AUTH_MITM)) in tk_request()
1011 u8 stk[16], auth; in smp_random() local
1021 auth = 1; in smp_random()
1023 auth = 0; in smp_random()
1030 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random()
1137 u8 key_type, auth; in sc_add_ltk() local
1145 auth in sc_add_ltk()
1745 u8 key_size, auth, sec_level; smp_cmd_pairing_req() local
1936 u8 key_size, auth; smp_cmd_pairing_rsp() local
2058 u8 auth; fixup_sc_false_positive() local
2300 u8 sec_level, auth; smp_cmd_security_req() local
[all...]
/kernel/linux/linux-6.6/net/bluetooth/
H A Dsmp.c851 static int tk_request(struct l2cap_conn *conn, u8 remote_oob, u8 auth, in tk_request() argument
864 bt_dev_dbg(hcon->hdev, "auth:%u lcl:%u rem:%u", auth, local_io, in tk_request()
873 if (!(auth & SMP_AUTH_MITM)) in tk_request()
1012 u8 stk[16], auth; in smp_random() local
1022 auth = 1; in smp_random()
1024 auth = 0; in smp_random()
1031 SMP_STK, auth, stk, smp->enc_key_size, ediv, rand); in smp_random()
1143 u8 key_type, auth; in sc_add_ltk() local
1151 auth in sc_add_ltk()
1751 u8 key_size, auth, sec_level; smp_cmd_pairing_req() local
1942 u8 key_size, auth; smp_cmd_pairing_rsp() local
2064 u8 auth; fixup_sc_false_positive() local
2306 u8 sec_level, auth; smp_cmd_security_req() local
[all...]

Completed in 26 milliseconds

12345678910>>...27