Home
last modified time | relevance | path

Searched refs:auth (Results 176 - 200 of 597) sorted by relevance

12345678910>>...24

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dmesh_rsn.c180 rsn->auth = wpa_init(addr, &conf, &cb, rsn); in __mesh_rsn_auth_init()
181 if (rsn->auth == NULL) { in __mesh_rsn_auth_init()
234 if (rsn->auth) in mesh_rsn_deinit()
235 wpa_deinit(rsn->auth); in mesh_rsn_deinit()
265 bss->wpa_auth = mesh_rsn->auth; in mesh_rsn_auth_init()
283 ie = wpa_auth_get_wpa_ie(mesh_rsn->auth, &ie_len); in mesh_rsn_auth_init()
H A Dmesh_rsn.h14 struct wpa_authenticator *auth; member
H A Dibss_rsn.h40 struct wpa_state_machine *auth; member
/kernel/linux/linux-6.6/fs/ceph/
H A Dmds_client.c24 #include <linux/ceph/auth.h>
1378 /* choose auth mds */ in __choose_mds()
1380 dout("%s %p %llx.%llx frag %u mds%d (auth)\n", in __choose_mds()
1408 cap == ci->i_auth_cap ? "auth " : "", cap); in __choose_mds()
2158 * after dropping auth caps. It doesn't hurt because reply in trim_caps_cb()
2159 * of lock mds request will re-add auth caps. */ in trim_caps_cb()
3361 * For async create we will choose the auth MDS of frag in parent in __do_request()
3366 * And then the auth cap will be changed. in __do_request()
3396 dout("do_request session changed for auth cap %d -> %d\n", in __do_request()
3399 /* Remove the auth ca in __do_request()
5794 struct ceph_auth_handshake *auth = &s->s_auth; mds_get_authorizer() local
5821 struct ceph_auth_handshake *auth = &s->s_auth; mds_verify_authorizer_reply() local
5845 struct ceph_auth_handshake *auth = &s->s_auth; mds_get_auth_request() local
5865 struct ceph_auth_handshake *auth = &s->s_auth; mds_handle_auth_reply_more() local
5885 struct ceph_auth_handshake *auth = &s->s_auth; mds_handle_auth_done() local
5937 struct ceph_auth_handshake *auth = &s->s_auth; mds_sign_message() local
5945 struct ceph_auth_handshake *auth = &s->s_auth; mds_check_message_signature() local
[all...]
/third_party/lwip/src/apps/smtp/
H A Dsmtp.c23 -> set both username and password as NULL if no auth needed
521 /* copy auth data, ensuring the first byte is always zero */ in smtp_send_mail_alloced()
1057 u16_t auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_SP); in smtp_prepare_auth_or_mail() local
1058 if (auth == 0xFFFF) { in smtp_prepare_auth_or_mail()
1059 auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_EQ); in smtp_prepare_auth_or_mail()
1061 if (auth != 0xFFFF) { in smtp_prepare_auth_or_mail()
1062 u16_t crlf = pbuf_memfind(s->p, SMTP_CRLF, SMTP_CRLF_LEN, auth); in smtp_prepare_auth_or_mail()
1063 if ((crlf != 0xFFFF) && (crlf > auth)) { in smtp_prepare_auth_or_mail()
1065 u16_t copied = pbuf_copy_partial(s->p, s->tx_buf, (u16_t)(crlf - auth), auth); in smtp_prepare_auth_or_mail()
[all...]
/kernel/linux/linux-5.10/net/sunrpc/
H A DMakefile12 auth.o auth_null.o auth_unix.o \
/kernel/linux/linux-6.6/net/sunrpc/
H A DMakefile12 auth.o auth_null.o auth_tls.o auth_unix.o \
/third_party/pulseaudio/src/pulsecore/
H A Dprotocol-esound.h26 #include <pulsecore/auth-cookie.h>
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dmesh_rsn.h14 struct wpa_authenticator *auth; member
H A Dibss_rsn.h40 struct wpa_state_machine *auth; member
/third_party/node/deps/npm/node_modules/https-proxy-agent/dist/
H A Dindex.js102 const auth = `${decodeURIComponent(proxy.username)}:${decodeURIComponent(proxy.password)}`;
103 headers['Proxy-Authorization'] = `Basic ${Buffer.from(auth).toString('base64')}`;
/third_party/python/Lib/distutils/command/
H A Dupload.py156 auth = "Basic " + standard_b64encode(user_pass).decode('ascii')
188 'Authorization': auth,
/kernel/linux/linux-5.10/drivers/crypto/bcm/
H A Dcipher.c414 0, ctx->auth.alg, ctx->auth.mode, in handle_skcipher_req()
705 hash_parms.alg = ctx->auth.alg; in handle_ahash_req()
706 hash_parms.mode = ctx->auth.mode; in handle_ahash_req()
779 digestsize = spu->spu_digest_size(ctx->digestsize, ctx->auth.alg, in handle_ahash_req()
846 hash_parms.pad_len, ctx->auth.alg, in handle_ahash_req()
847 ctx->auth.mode, rctx->total_sent, in handle_ahash_req()
906 switch (ctx->auth.alg) { in spu_hmac_outer_hash()
959 if (ctx->auth.alg == HASH_ALG_MD5) { in ahash_req_done()
978 if (rctx->is_sw_hmac || ctx->auth in ahash_req_done()
[all...]
/kernel/linux/linux-6.6/drivers/crypto/bcm/
H A Dcipher.c414 0, ctx->auth.alg, ctx->auth.mode, in handle_skcipher_req()
703 hash_parms.alg = ctx->auth.alg; in handle_ahash_req()
704 hash_parms.mode = ctx->auth.mode; in handle_ahash_req()
777 digestsize = spu->spu_digest_size(ctx->digestsize, ctx->auth.alg, in handle_ahash_req()
844 hash_parms.pad_len, ctx->auth.alg, in handle_ahash_req()
845 ctx->auth.mode, rctx->total_sent, in handle_ahash_req()
904 switch (ctx->auth.alg) { in spu_hmac_outer_hash()
957 if (ctx->auth.alg == HASH_ALG_MD5) { in ahash_req_done()
976 if (rctx->is_sw_hmac || ctx->auth in ahash_req_done()
[all...]
/kernel/linux/linux-5.10/net/sctp/
H A DMakefile14 output.o input.o debug.o stream.o auth.o \
/kernel/linux/linux-5.10/include/linux/sunrpc/
H A Dauth_gss.h17 #include <linux/sunrpc/auth.h>
/kernel/linux/linux-6.6/fs/smb/server/
H A DMakefile7 ksmbd-y := unicode.o auth.o vfs.o vfs_cache.o server.o ndr.o \
/kernel/linux/linux-6.6/include/linux/sunrpc/
H A Dauth_gss.h17 #include <linux/sunrpc/auth.h>
/kernel/linux/linux-6.6/net/sctp/
H A DMakefile14 output.o input.o debug.o stream.o auth.o \
/third_party/skia/third_party/externals/freetype/builds/unix/
H A Ddetect.mk24 $(wildcard /hurd/auth))
/kernel/linux/linux-5.10/drivers/crypto/
H A Datmel-sha.c2144 struct atmel_sha_authenc_ctx *auth; in atmel_sha_authenc_spawn() local
2184 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in atmel_sha_authenc_spawn()
2185 if (!auth) { in atmel_sha_authenc_spawn()
2189 auth->tfm = tfm; in atmel_sha_authenc_spawn()
2191 return auth; in atmel_sha_authenc_spawn()
2200 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth) in atmel_sha_authenc_free() argument
2202 if (auth) in atmel_sha_authenc_free()
2203 crypto_free_ahash(auth->tfm); in atmel_sha_authenc_free()
2204 kfree(auth); in atmel_sha_authenc_free()
2208 atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, const u8 *key, unsigned int keylen, u32 flags) atmel_sha_authenc_setkey() argument
2219 atmel_sha_authenc_schedule(struct ahash_request *req, struct atmel_sha_authenc_ctx *auth, atmel_aes_authenc_fn_t cb, struct atmel_aes_dev *aes_dev) atmel_sha_authenc_schedule() argument
[all...]
/kernel/linux/linux-6.6/drivers/crypto/
H A Datmel-sha.c2170 struct atmel_sha_authenc_ctx *auth; in atmel_sha_authenc_spawn() local
2210 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in atmel_sha_authenc_spawn()
2211 if (!auth) { in atmel_sha_authenc_spawn()
2215 auth->tfm = tfm; in atmel_sha_authenc_spawn()
2217 return auth; in atmel_sha_authenc_spawn()
2226 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth) in atmel_sha_authenc_free() argument
2228 if (auth) in atmel_sha_authenc_free()
2229 crypto_free_ahash(auth->tfm); in atmel_sha_authenc_free()
2230 kfree(auth); in atmel_sha_authenc_free()
2234 atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, const u8 *key, unsigned int keylen, u32 flags) atmel_sha_authenc_setkey() argument
2245 atmel_sha_authenc_schedule(struct ahash_request *req, struct atmel_sha_authenc_ctx *auth, atmel_aes_authenc_fn_t cb, struct atmel_aes_dev *aes_dev) atmel_sha_authenc_schedule() argument
[all...]
/kernel/linux/linux-6.6/drivers/crypto/qce/
H A Dcommon.c156 __be32 auth[SHA256_DIGEST_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_ahash() local
190 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash()
192 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash()
195 qce_write_array(qce, REG_AUTH_IV0, (u32 *)auth, iv_words); in qce_setup_regs_ahash()
/third_party/node/test/parallel/
H A Dtest-crypto-authenticated.js43 auth: / auth/,
158 assert.throws(function() { decrypt.final('hex'); }, errMessages.auth);
197 assert.throws(function() { decrypt.final('ascii'); }, errMessages.auth);
/third_party/curl/tests/server/
H A Drtspd.c106 bool auth; /* Authorization header present in the incoming request */ member
516 if(!req->auth && strstr(req->reqbuf, "Authorization:")) { in ProcessRequest()
517 req->auth = TRUE; /* Authorization: header present! */ in ProcessRequest()
582 /* If authentication is required and no auth was provided, end now. This in ProcessRequest()
586 if(req->auth_req && !req->auth) in ProcessRequest()
680 req->auth = FALSE; in get_request()

Completed in 28 milliseconds

12345678910>>...24