/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | mesh_rsn.c | 180 rsn->auth = wpa_init(addr, &conf, &cb, rsn); in __mesh_rsn_auth_init() 181 if (rsn->auth == NULL) { in __mesh_rsn_auth_init() 234 if (rsn->auth) in mesh_rsn_deinit() 235 wpa_deinit(rsn->auth); in mesh_rsn_deinit() 265 bss->wpa_auth = mesh_rsn->auth; in mesh_rsn_auth_init() 283 ie = wpa_auth_get_wpa_ie(mesh_rsn->auth, &ie_len); in mesh_rsn_auth_init()
|
H A D | mesh_rsn.h | 14 struct wpa_authenticator *auth; member
|
H A D | ibss_rsn.h | 40 struct wpa_state_machine *auth; member
|
/kernel/linux/linux-6.6/fs/ceph/ |
H A D | mds_client.c | 24 #include <linux/ceph/auth.h> 1378 /* choose auth mds */ in __choose_mds() 1380 dout("%s %p %llx.%llx frag %u mds%d (auth)\n", in __choose_mds() 1408 cap == ci->i_auth_cap ? "auth " : "", cap); in __choose_mds() 2158 * after dropping auth caps. It doesn't hurt because reply in trim_caps_cb() 2159 * of lock mds request will re-add auth caps. */ in trim_caps_cb() 3361 * For async create we will choose the auth MDS of frag in parent in __do_request() 3366 * And then the auth cap will be changed. in __do_request() 3396 dout("do_request session changed for auth cap %d -> %d\n", in __do_request() 3399 /* Remove the auth ca in __do_request() 5794 struct ceph_auth_handshake *auth = &s->s_auth; mds_get_authorizer() local 5821 struct ceph_auth_handshake *auth = &s->s_auth; mds_verify_authorizer_reply() local 5845 struct ceph_auth_handshake *auth = &s->s_auth; mds_get_auth_request() local 5865 struct ceph_auth_handshake *auth = &s->s_auth; mds_handle_auth_reply_more() local 5885 struct ceph_auth_handshake *auth = &s->s_auth; mds_handle_auth_done() local 5937 struct ceph_auth_handshake *auth = &s->s_auth; mds_sign_message() local 5945 struct ceph_auth_handshake *auth = &s->s_auth; mds_check_message_signature() local [all...] |
/third_party/lwip/src/apps/smtp/ |
H A D | smtp.c | 23 -> set both username and password as NULL if no auth needed 521 /* copy auth data, ensuring the first byte is always zero */ in smtp_send_mail_alloced() 1057 u16_t auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_SP); in smtp_prepare_auth_or_mail() local 1058 if (auth == 0xFFFF) { in smtp_prepare_auth_or_mail() 1059 auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_EQ); in smtp_prepare_auth_or_mail() 1061 if (auth != 0xFFFF) { in smtp_prepare_auth_or_mail() 1062 u16_t crlf = pbuf_memfind(s->p, SMTP_CRLF, SMTP_CRLF_LEN, auth); in smtp_prepare_auth_or_mail() 1063 if ((crlf != 0xFFFF) && (crlf > auth)) { in smtp_prepare_auth_or_mail() 1065 u16_t copied = pbuf_copy_partial(s->p, s->tx_buf, (u16_t)(crlf - auth), auth); in smtp_prepare_auth_or_mail() [all...] |
/kernel/linux/linux-5.10/net/sunrpc/ |
H A D | Makefile | 12 auth.o auth_null.o auth_unix.o \
|
/kernel/linux/linux-6.6/net/sunrpc/ |
H A D | Makefile | 12 auth.o auth_null.o auth_tls.o auth_unix.o \
|
/third_party/pulseaudio/src/pulsecore/ |
H A D | protocol-esound.h | 26 #include <pulsecore/auth-cookie.h>
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | mesh_rsn.h | 14 struct wpa_authenticator *auth; member
|
H A D | ibss_rsn.h | 40 struct wpa_state_machine *auth; member
|
/third_party/node/deps/npm/node_modules/https-proxy-agent/dist/ |
H A D | index.js | 102 const auth = `${decodeURIComponent(proxy.username)}:${decodeURIComponent(proxy.password)}`; 103 headers['Proxy-Authorization'] = `Basic ${Buffer.from(auth).toString('base64')}`;
|
/third_party/python/Lib/distutils/command/ |
H A D | upload.py | 156 auth = "Basic " + standard_b64encode(user_pass).decode('ascii') 188 'Authorization': auth,
|
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | cipher.c | 414 0, ctx->auth.alg, ctx->auth.mode, in handle_skcipher_req() 705 hash_parms.alg = ctx->auth.alg; in handle_ahash_req() 706 hash_parms.mode = ctx->auth.mode; in handle_ahash_req() 779 digestsize = spu->spu_digest_size(ctx->digestsize, ctx->auth.alg, in handle_ahash_req() 846 hash_parms.pad_len, ctx->auth.alg, in handle_ahash_req() 847 ctx->auth.mode, rctx->total_sent, in handle_ahash_req() 906 switch (ctx->auth.alg) { in spu_hmac_outer_hash() 959 if (ctx->auth.alg == HASH_ALG_MD5) { in ahash_req_done() 978 if (rctx->is_sw_hmac || ctx->auth in ahash_req_done() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/bcm/ |
H A D | cipher.c | 414 0, ctx->auth.alg, ctx->auth.mode, in handle_skcipher_req() 703 hash_parms.alg = ctx->auth.alg; in handle_ahash_req() 704 hash_parms.mode = ctx->auth.mode; in handle_ahash_req() 777 digestsize = spu->spu_digest_size(ctx->digestsize, ctx->auth.alg, in handle_ahash_req() 844 hash_parms.pad_len, ctx->auth.alg, in handle_ahash_req() 845 ctx->auth.mode, rctx->total_sent, in handle_ahash_req() 904 switch (ctx->auth.alg) { in spu_hmac_outer_hash() 957 if (ctx->auth.alg == HASH_ALG_MD5) { in ahash_req_done() 976 if (rctx->is_sw_hmac || ctx->auth in ahash_req_done() [all...] |
/kernel/linux/linux-5.10/net/sctp/ |
H A D | Makefile | 14 output.o input.o debug.o stream.o auth.o \
|
/kernel/linux/linux-5.10/include/linux/sunrpc/ |
H A D | auth_gss.h | 17 #include <linux/sunrpc/auth.h>
|
/kernel/linux/linux-6.6/fs/smb/server/ |
H A D | Makefile | 7 ksmbd-y := unicode.o auth.o vfs.o vfs_cache.o server.o ndr.o \
|
/kernel/linux/linux-6.6/include/linux/sunrpc/ |
H A D | auth_gss.h | 17 #include <linux/sunrpc/auth.h>
|
/kernel/linux/linux-6.6/net/sctp/ |
H A D | Makefile | 14 output.o input.o debug.o stream.o auth.o \
|
/third_party/skia/third_party/externals/freetype/builds/unix/ |
H A D | detect.mk | 24 $(wildcard /hurd/auth))
|
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | atmel-sha.c | 2144 struct atmel_sha_authenc_ctx *auth; in atmel_sha_authenc_spawn() local 2184 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in atmel_sha_authenc_spawn() 2185 if (!auth) { in atmel_sha_authenc_spawn() 2189 auth->tfm = tfm; in atmel_sha_authenc_spawn() 2191 return auth; in atmel_sha_authenc_spawn() 2200 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth) in atmel_sha_authenc_free() argument 2202 if (auth) in atmel_sha_authenc_free() 2203 crypto_free_ahash(auth->tfm); in atmel_sha_authenc_free() 2204 kfree(auth); in atmel_sha_authenc_free() 2208 atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, const u8 *key, unsigned int keylen, u32 flags) atmel_sha_authenc_setkey() argument 2219 atmel_sha_authenc_schedule(struct ahash_request *req, struct atmel_sha_authenc_ctx *auth, atmel_aes_authenc_fn_t cb, struct atmel_aes_dev *aes_dev) atmel_sha_authenc_schedule() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | atmel-sha.c | 2170 struct atmel_sha_authenc_ctx *auth; in atmel_sha_authenc_spawn() local 2210 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in atmel_sha_authenc_spawn() 2211 if (!auth) { in atmel_sha_authenc_spawn() 2215 auth->tfm = tfm; in atmel_sha_authenc_spawn() 2217 return auth; in atmel_sha_authenc_spawn() 2226 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth) in atmel_sha_authenc_free() argument 2228 if (auth) in atmel_sha_authenc_free() 2229 crypto_free_ahash(auth->tfm); in atmel_sha_authenc_free() 2230 kfree(auth); in atmel_sha_authenc_free() 2234 atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, const u8 *key, unsigned int keylen, u32 flags) atmel_sha_authenc_setkey() argument 2245 atmel_sha_authenc_schedule(struct ahash_request *req, struct atmel_sha_authenc_ctx *auth, atmel_aes_authenc_fn_t cb, struct atmel_aes_dev *aes_dev) atmel_sha_authenc_schedule() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/qce/ |
H A D | common.c | 156 __be32 auth[SHA256_DIGEST_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_ahash() local 190 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 192 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 195 qce_write_array(qce, REG_AUTH_IV0, (u32 *)auth, iv_words); in qce_setup_regs_ahash()
|
/third_party/node/test/parallel/ |
H A D | test-crypto-authenticated.js | 43 auth: / auth/, 158 assert.throws(function() { decrypt.final('hex'); }, errMessages.auth); 197 assert.throws(function() { decrypt.final('ascii'); }, errMessages.auth);
|
/third_party/curl/tests/server/ |
H A D | rtspd.c | 106 bool auth; /* Authorization header present in the incoming request */ member 516 if(!req->auth && strstr(req->reqbuf, "Authorization:")) { in ProcessRequest() 517 req->auth = TRUE; /* Authorization: header present! */ in ProcessRequest() 582 /* If authentication is required and no auth was provided, end now. This in ProcessRequest() 586 if(req->auth_req && !req->auth) in ProcessRequest() 680 req->auth = FALSE; in get_request()
|