Home
last modified time | relevance | path

Searched refs:auth (Results 201 - 225 of 668) sorted by relevance

12345678910>>...27

/kernel/linux/linux-5.10/drivers/crypto/qce/
H A Dcommon.c152 __be32 auth[SHA256_DIGEST_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_ahash() local
186 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash()
188 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash()
191 qce_write_array(qce, REG_AUTH_IV0, (u32 *)auth, iv_words); in qce_setup_regs_ahash()
/kernel/linux/linux-5.10/fs/ubifs/
H A Dauth.c67 struct ubifs_auth_node *auth = node; in ubifs_prepare_auth_node() local
82 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node()
86 auth->ch.node_type = UBIFS_AUTH_NODE; in ubifs_prepare_auth_node()
87 ubifs_prepare_node(c, auth, ubifs_auth_node_sz(c), 0); in ubifs_prepare_auth_node()
/kernel/linux/linux-6.6/fs/ubifs/
H A Dauth.c66 struct ubifs_auth_node *auth = node; in ubifs_prepare_auth_node() local
81 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node()
85 auth->ch.node_type = UBIFS_AUTH_NODE; in ubifs_prepare_auth_node()
86 ubifs_prepare_node(c, auth, ubifs_auth_node_sz(c), 0); in ubifs_prepare_auth_node()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_sake.c23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_sake.c22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm()
353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_sake.c23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_sake.c22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm()
353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
/kernel/linux/linux-6.6/arch/s390/kernel/
H A Dperf_cpum_cf.c361 unsigned int caca:1; /* Counter auth. change alert */
515 static size_t cfdiag_getctr(void *data, size_t sz, unsigned long auth, in cfdiag_getctr() argument
527 if (!(auth & cpumf_ctr_ctl[i])) in cfdiag_getctr()
554 static int cfdiag_diffctr(struct cpu_cf_events *cpuhw, unsigned long auth) in cfdiag_diffctr() argument
560 auth &= (1 << CPUMF_LCCTL_ENABLE_SHIFT) - 1; in cfdiag_diffctr()
570 auth &= ~cpumf_ctr_ctl[ctrstart->set]; in cfdiag_diffctr()
577 } while (ctrstart->def && auth); in cfdiag_diffctr()
1744 unsigned long auth = 0; in get_authctrsets() local
1749 auth |= cpumf_ctr_ctl[i]; in get_authctrsets()
1751 return auth; in get_authctrsets()
[all...]
/third_party/python/Lib/xmlrpc/
H A Dclient.py1229 auth, host = urllib.parse._splituser(host)
1231 if auth:
1232 auth = urllib.parse.unquote_to_bytes(auth)
1233 auth = base64.encodebytes(auth).decode("utf-8")
1234 auth = "".join(auth.split()) # get rid of whitespace
1236 ("Authorization", "Basic " + auth)
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
H A Dradius_client.c251 int sock, int sock6, int auth);
1064 int sock, int sock6, int auth) in radius_change_server()
1083 auth ? "Authentication" : "Accounting", in radius_change_server()
1089 if (auth) in radius_change_server()
1104 if (auth) in radius_change_server()
1115 if ((auth && entry->msg_type != RADIUS_AUTH) || in radius_change_server()
1116 (!auth && entry->msg_type != RADIUS_ACCT)) in radius_change_server()
1157 "RADIUS: No server socket available (af=%d sock=%d sock6=%d auth=%d", in radius_change_server()
1158 nserv->addr.af, sock, sock6, auth); in radius_change_server()
1231 if (auth) in radius_change_server()
1061 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) radius_change_server() argument
[all...]
/third_party/ffmpeg/libavformat/
H A Dhttp.c164 { "none", "No auth method set, autodetect", 0, AV_OPT_TYPE_CONST, { .i64 = HTTP_AUTH_NONE }, 0, 0, D | E, "auth_type"},
185 const char *hoststr, const char *auth,
206 char auth[1024], proxyauth[1024] = ""; in http_open_cnx_internal() local
212 av_url_split(proto, sizeof(proto), auth, sizeof(auth), in http_open_cnx_internal()
254 /* Reassemble the request URL without auth string - we don't in http_open_cnx_internal()
255 * want to leak the auth to the proxy. */ in http_open_cnx_internal()
274 h, path, local_path, hoststr, auth, proxyauth); in http_open_cnx_internal()
437 * might use a different auth mechanism. */ in http_open_cnx()
1400 const char *hoststr, const char *auth, in http_connect()
1399 http_connect(URLContext *h, const char *path, const char *local_path, const char *hoststr, const char *auth, const char *proxyauth) http_connect() argument
2048 char auth[1024], pathbuf[1024], *path; http_proxy_open() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dpasn_supplicant.c52 wpa_printf(MSG_DEBUG, "PASN: Auth work timeout - stopping auth"); in wpas_pasn_auth_work_timeout()
60 wpa_printf(MSG_DEBUG, "PASN: Cancel pasn-start-auth work"); in wpas_pasn_cancel_auth_work()
63 radio_remove_works(wpa_s, "pasn-start-auth", 0); in wpas_pasn_cancel_auth_work()
313 "PASN: FILS: ERP EAP-Initiate/Re-auth unavailable"); in wpas_pasn_fils_build_auth()
439 "PASN: FILS auth without PFS not supported"); in wpas_pasn_wd_fils_auth()
1111 wpa_printf(MSG_DEBUG, "PASN: Failed building 1st auth frame"); in wpas_pasn_start()
1120 wpa_printf(MSG_DEBUG, "PASN: Failed sending 1st auth frame"); in wpas_pasn_start()
1260 if (radio_work_pending(wpa_s, "pasn-start-auth")) { in wpas_pasn_auth_start()
1295 if (radio_add_work(wpa_s, bss->freq, "pasn-start-auth", 1, in wpas_pasn_auth_start()
1359 len < offsetof(struct ieee80211_mgmt, u.auth in wpas_pasn_auth_rx()
[all...]
H A Dmesh_rsn.h14 struct wpa_authenticator *auth; member
H A Dmesh_rsn.c180 rsn->auth = wpa_init(addr, &conf, &cb, rsn); in __mesh_rsn_auth_init()
181 if (rsn->auth == NULL) { in __mesh_rsn_auth_init()
234 if (rsn->auth) in mesh_rsn_deinit()
235 wpa_deinit(rsn->auth); in mesh_rsn_deinit()
265 bss->wpa_auth = mesh_rsn->auth; in mesh_rsn_auth_init()
283 ie = wpa_auth_get_wpa_ie(mesh_rsn->auth, &ie_len); in mesh_rsn_auth_init()
/foundation/distributeddatamgr/datamgr_service/services/distributeddataservice/app/src/session_manager/
H A Dsession_manager.h53 bool GetAuthParams(const SessionPoint &from, std::string &bundleName, int32_t &auth) const;
/kernel/linux/linux-5.10/net/sunrpc/
H A DMakefile12 auth.o auth_null.o auth_unix.o \
/kernel/linux/linux-6.6/net/sunrpc/
H A DMakefile12 auth.o auth_null.o auth_tls.o auth_unix.o \
/third_party/pulseaudio/src/pulsecore/
H A Dprotocol-esound.h26 #include <pulsecore/auth-cookie.h>
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dmesh_rsn.h14 struct wpa_authenticator *auth; member
H A Dmesh_rsn.c177 rsn->auth = wpa_init(addr, &conf, &cb, rsn); in __mesh_rsn_auth_init()
178 if (rsn->auth == NULL) { in __mesh_rsn_auth_init()
223 if (rsn->auth) in mesh_rsn_deinit()
224 wpa_deinit(rsn->auth); in mesh_rsn_deinit()
254 bss->wpa_auth = mesh_rsn->auth; in mesh_rsn_auth_init()
272 ie = wpa_auth_get_wpa_ie(mesh_rsn->auth, &ie_len); in mesh_rsn_auth_init()
/kernel/linux/linux-5.10/drivers/staging/rtl8192e/
H A Drtllib_softmac.c776 struct rtllib_authentication *auth; in rtllib_authentication_req() local
788 auth = skb_put(skb, sizeof(struct rtllib_authentication)); in rtllib_authentication_req()
790 auth->header.frame_ctl = cpu_to_le16(RTLLIB_STYPE_AUTH); in rtllib_authentication_req()
792 auth->header.frame_ctl |= cpu_to_le16(RTLLIB_FCTL_WEP); in rtllib_authentication_req()
794 auth->header.duration_id = cpu_to_le16(0x013a); in rtllib_authentication_req()
795 ether_addr_copy(auth->header.addr1, beacon->bssid); in rtllib_authentication_req()
796 ether_addr_copy(auth->header.addr2, ieee->dev->dev_addr); in rtllib_authentication_req()
797 ether_addr_copy(auth->header.addr3, beacon->bssid); in rtllib_authentication_req()
799 auth->algorithm = WLAN_AUTH_OPEN; in rtllib_authentication_req()
801 auth in rtllib_authentication_req()
1023 struct rtllib_authentication *auth; rtllib_auth_resp() local
[all...]
/third_party/curl/lib/
H A Dsocks.c60 CONNECT_AUTH_INIT, /* 6 setup outgoing auth buffer */
61 CONNECT_AUTH_SEND, /* 7 send auth */
62 CONNECT_AUTH_READ, /* 8 read auth response */
589 const unsigned char auth = data->set.socks5auth; in do_SOCKS5() local
593 DEBUGASSERT(auth & (CURLAUTH_BASIC | CURLAUTH_GSSAPI)); in do_SOCKS5()
607 if(auth & ~(CURLAUTH_BASIC | CURLAUTH_GSSAPI)) in do_SOCKS5()
610 auth); in do_SOCKS5()
611 if(!(auth & CURLAUTH_BASIC)) in do_SOCKS5()
612 /* disable username/password auth */ in do_SOCKS5()
615 if(auth in do_SOCKS5()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dieee802_11.c309 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; in send_auth_reply()
321 reply->u.auth.auth_alg = host_to_le16(auth_alg); in send_auth_reply()
322 reply->u.auth.auth_transaction = host_to_le16(auth_transaction); in send_auth_reply()
323 reply->u.auth.status_code = host_to_le16(resp); in send_auth_reply()
326 os_memcpy(reply->u.auth.variable, ies, ies_len); in send_auth_reply()
354 "auth-ft-finish"); in handle_auth_ft_finish()
996 pos = mgmt->u.auth.variable; in handle_auth_sae()
1000 "auth-sae-reflection-attack"); in handle_auth_sae()
1049 pos = mgmt->u.auth.variable; in handle_auth_sae()
1118 pos = mgmt->u.auth in handle_auth_sae()
[all...]
/base/useriam/user_auth_framework/frameworks/js/napi/user_auth_icon/
H A Duser_auth_icon.js128 this.info('face auth available.');
134 this.info('finger auth available.');
147 this.info('current auth trust level is supported.');
151 this.error(`current auth trust level is not supported, error = ${t}.`);
198 this.error('auth timeout.');
210 this.info('auth before start.');
212 this.info('auth start success.');
217 this.error(`auth catch error, code: ${g.code}, message: ${g.message}`);
221 this.error('auth error.');
/test/xts/device_attest/interfaces/kits/napi/src/
H A Ddevattest_napi.cpp33 static napi_value GenerateDevAttestHandle(napi_env env, int32_t auth, int32_t software, string ticketStr, in GenerateDevAttestHandle() argument
42 napi_create_int32(env, auth, &authResult); in GenerateDevAttestHandle()

Completed in 24 milliseconds

12345678910>>...27