/kernel/linux/linux-5.10/drivers/crypto/qce/ |
H A D | common.c | 152 __be32 auth[SHA256_DIGEST_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_ahash() local 186 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 188 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 191 qce_write_array(qce, REG_AUTH_IV0, (u32 *)auth, iv_words); in qce_setup_regs_ahash()
|
/kernel/linux/linux-5.10/fs/ubifs/ |
H A D | auth.c | 67 struct ubifs_auth_node *auth = node; in ubifs_prepare_auth_node() local 82 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node() 86 auth->ch.node_type = UBIFS_AUTH_NODE; in ubifs_prepare_auth_node() 87 ubifs_prepare_node(c, auth, ubifs_auth_node_sz(c), 0); in ubifs_prepare_auth_node()
|
/kernel/linux/linux-6.6/fs/ubifs/ |
H A D | auth.c | 66 struct ubifs_auth_node *auth = node; in ubifs_prepare_auth_node() local 81 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node() 85 auth->ch.node_type = UBIFS_AUTH_NODE; in ubifs_prepare_auth_node() 86 ubifs_prepare_node(c, auth, ubifs_auth_node_sz(c), 0); in ubifs_prepare_auth_node()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_sake.c | 23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm() 351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_sake.c | 22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm() 353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_sake.c | 23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm() 351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_sake.c | 22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm() 353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
|
/kernel/linux/linux-6.6/arch/s390/kernel/ |
H A D | perf_cpum_cf.c | 361 unsigned int caca:1; /* Counter auth. change alert */ 515 static size_t cfdiag_getctr(void *data, size_t sz, unsigned long auth, in cfdiag_getctr() argument 527 if (!(auth & cpumf_ctr_ctl[i])) in cfdiag_getctr() 554 static int cfdiag_diffctr(struct cpu_cf_events *cpuhw, unsigned long auth) in cfdiag_diffctr() argument 560 auth &= (1 << CPUMF_LCCTL_ENABLE_SHIFT) - 1; in cfdiag_diffctr() 570 auth &= ~cpumf_ctr_ctl[ctrstart->set]; in cfdiag_diffctr() 577 } while (ctrstart->def && auth); in cfdiag_diffctr() 1744 unsigned long auth = 0; in get_authctrsets() local 1749 auth |= cpumf_ctr_ctl[i]; in get_authctrsets() 1751 return auth; in get_authctrsets() [all...] |
/third_party/python/Lib/xmlrpc/ |
H A D | client.py | 1229 auth, host = urllib.parse._splituser(host) 1231 if auth: 1232 auth = urllib.parse.unquote_to_bytes(auth) 1233 auth = base64.encodebytes(auth).decode("utf-8") 1234 auth = "".join(auth.split()) # get rid of whitespace 1236 ("Authorization", "Basic " + auth)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius_client.c | 251 int sock, int sock6, int auth); 1064 int sock, int sock6, int auth) in radius_change_server() 1083 auth ? "Authentication" : "Accounting", in radius_change_server() 1089 if (auth) in radius_change_server() 1104 if (auth) in radius_change_server() 1115 if ((auth && entry->msg_type != RADIUS_AUTH) || in radius_change_server() 1116 (!auth && entry->msg_type != RADIUS_ACCT)) in radius_change_server() 1157 "RADIUS: No server socket available (af=%d sock=%d sock6=%d auth=%d", in radius_change_server() 1158 nserv->addr.af, sock, sock6, auth); in radius_change_server() 1231 if (auth) in radius_change_server() 1061 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) radius_change_server() argument [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | http.c | 164 { "none", "No auth method set, autodetect", 0, AV_OPT_TYPE_CONST, { .i64 = HTTP_AUTH_NONE }, 0, 0, D | E, "auth_type"}, 185 const char *hoststr, const char *auth, 206 char auth[1024], proxyauth[1024] = ""; in http_open_cnx_internal() local 212 av_url_split(proto, sizeof(proto), auth, sizeof(auth), in http_open_cnx_internal() 254 /* Reassemble the request URL without auth string - we don't in http_open_cnx_internal() 255 * want to leak the auth to the proxy. */ in http_open_cnx_internal() 274 h, path, local_path, hoststr, auth, proxyauth); in http_open_cnx_internal() 437 * might use a different auth mechanism. */ in http_open_cnx() 1400 const char *hoststr, const char *auth, in http_connect() 1399 http_connect(URLContext *h, const char *path, const char *local_path, const char *hoststr, const char *auth, const char *proxyauth) http_connect() argument 2048 char auth[1024], pathbuf[1024], *path; http_proxy_open() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | pasn_supplicant.c | 52 wpa_printf(MSG_DEBUG, "PASN: Auth work timeout - stopping auth"); in wpas_pasn_auth_work_timeout() 60 wpa_printf(MSG_DEBUG, "PASN: Cancel pasn-start-auth work"); in wpas_pasn_cancel_auth_work() 63 radio_remove_works(wpa_s, "pasn-start-auth", 0); in wpas_pasn_cancel_auth_work() 313 "PASN: FILS: ERP EAP-Initiate/Re-auth unavailable"); in wpas_pasn_fils_build_auth() 439 "PASN: FILS auth without PFS not supported"); in wpas_pasn_wd_fils_auth() 1111 wpa_printf(MSG_DEBUG, "PASN: Failed building 1st auth frame"); in wpas_pasn_start() 1120 wpa_printf(MSG_DEBUG, "PASN: Failed sending 1st auth frame"); in wpas_pasn_start() 1260 if (radio_work_pending(wpa_s, "pasn-start-auth")) { in wpas_pasn_auth_start() 1295 if (radio_add_work(wpa_s, bss->freq, "pasn-start-auth", 1, in wpas_pasn_auth_start() 1359 len < offsetof(struct ieee80211_mgmt, u.auth in wpas_pasn_auth_rx() [all...] |
H A D | mesh_rsn.h | 14 struct wpa_authenticator *auth; member
|
H A D | mesh_rsn.c | 180 rsn->auth = wpa_init(addr, &conf, &cb, rsn); in __mesh_rsn_auth_init() 181 if (rsn->auth == NULL) { in __mesh_rsn_auth_init() 234 if (rsn->auth) in mesh_rsn_deinit() 235 wpa_deinit(rsn->auth); in mesh_rsn_deinit() 265 bss->wpa_auth = mesh_rsn->auth; in mesh_rsn_auth_init() 283 ie = wpa_auth_get_wpa_ie(mesh_rsn->auth, &ie_len); in mesh_rsn_auth_init()
|
/foundation/distributeddatamgr/datamgr_service/services/distributeddataservice/app/src/session_manager/ |
H A D | session_manager.h | 53 bool GetAuthParams(const SessionPoint &from, std::string &bundleName, int32_t &auth) const;
|
/kernel/linux/linux-5.10/net/sunrpc/ |
H A D | Makefile | 12 auth.o auth_null.o auth_unix.o \
|
/kernel/linux/linux-6.6/net/sunrpc/ |
H A D | Makefile | 12 auth.o auth_null.o auth_tls.o auth_unix.o \
|
/third_party/pulseaudio/src/pulsecore/ |
H A D | protocol-esound.h | 26 #include <pulsecore/auth-cookie.h>
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | mesh_rsn.h | 14 struct wpa_authenticator *auth; member
|
H A D | mesh_rsn.c | 177 rsn->auth = wpa_init(addr, &conf, &cb, rsn); in __mesh_rsn_auth_init() 178 if (rsn->auth == NULL) { in __mesh_rsn_auth_init() 223 if (rsn->auth) in mesh_rsn_deinit() 224 wpa_deinit(rsn->auth); in mesh_rsn_deinit() 254 bss->wpa_auth = mesh_rsn->auth; in mesh_rsn_auth_init() 272 ie = wpa_auth_get_wpa_ie(mesh_rsn->auth, &ie_len); in mesh_rsn_auth_init()
|
/kernel/linux/linux-5.10/drivers/staging/rtl8192e/ |
H A D | rtllib_softmac.c | 776 struct rtllib_authentication *auth; in rtllib_authentication_req() local 788 auth = skb_put(skb, sizeof(struct rtllib_authentication)); in rtllib_authentication_req() 790 auth->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_AUTH); in rtllib_authentication_req() 792 auth->header.frame_ctl |= cpu_to_le16(RTLLIB_FCTL_WEP); in rtllib_authentication_req() 794 auth->header.duration_id = cpu_to_le16(0x013a); in rtllib_authentication_req() 795 ether_addr_copy(auth->header.addr1, beacon->bssid); in rtllib_authentication_req() 796 ether_addr_copy(auth->header.addr2, ieee->dev->dev_addr); in rtllib_authentication_req() 797 ether_addr_copy(auth->header.addr3, beacon->bssid); in rtllib_authentication_req() 799 auth->algorithm = WLAN_AUTH_OPEN; in rtllib_authentication_req() 801 auth in rtllib_authentication_req() 1023 struct rtllib_authentication *auth; rtllib_auth_resp() local [all...] |
/third_party/curl/lib/ |
H A D | socks.c | 60 CONNECT_AUTH_INIT, /* 6 setup outgoing auth buffer */ 61 CONNECT_AUTH_SEND, /* 7 send auth */ 62 CONNECT_AUTH_READ, /* 8 read auth response */ 589 const unsigned char auth = data->set.socks5auth; in do_SOCKS5() local 593 DEBUGASSERT(auth & (CURLAUTH_BASIC | CURLAUTH_GSSAPI)); in do_SOCKS5() 607 if(auth & ~(CURLAUTH_BASIC | CURLAUTH_GSSAPI)) in do_SOCKS5() 610 auth); in do_SOCKS5() 611 if(!(auth & CURLAUTH_BASIC)) in do_SOCKS5() 612 /* disable username/password auth */ in do_SOCKS5() 615 if(auth in do_SOCKS5() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | ieee802_11.c | 309 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; in send_auth_reply() 321 reply->u.auth.auth_alg = host_to_le16(auth_alg); in send_auth_reply() 322 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); in send_auth_reply() 323 reply->u.auth.status_code = host_to_le16(resp); in send_auth_reply() 326 os_memcpy(reply->u.auth.variable, ies, ies_len); in send_auth_reply() 354 "auth-ft-finish"); in handle_auth_ft_finish() 996 pos = mgmt->u.auth.variable; in handle_auth_sae() 1000 "auth-sae-reflection-attack"); in handle_auth_sae() 1049 pos = mgmt->u.auth.variable; in handle_auth_sae() 1118 pos = mgmt->u.auth in handle_auth_sae() [all...] |
/base/useriam/user_auth_framework/frameworks/js/napi/user_auth_icon/ |
H A D | user_auth_icon.js | 128 this.info('face auth available.'); 134 this.info('finger auth available.'); 147 this.info('current auth trust level is supported.'); 151 this.error(`current auth trust level is not supported, error = ${t}.`); 198 this.error('auth timeout.'); 210 this.info('auth before start.'); 212 this.info('auth start success.'); 217 this.error(`auth catch error, code: ${g.code}, message: ${g.message}`); 221 this.error('auth error.');
|
/test/xts/device_attest/interfaces/kits/napi/src/ |
H A D | devattest_napi.cpp | 33 static napi_value GenerateDevAttestHandle(napi_env env, int32_t auth, int32_t software, string ticketStr, in GenerateDevAttestHandle() argument 42 napi_create_int32(env, auth, &authResult); in GenerateDevAttestHandle()
|