Home
last modified time | relevance | path

Searched refs:auth (Results 226 - 250 of 665) sorted by relevance

12345678910>>...27

/third_party/python/Lib/distutils/command/
H A Dupload.py156 auth = "Basic " + standard_b64encode(user_pass).decode('ascii')
188 'Authorization': auth,
/third_party/lwip/src/apps/smtp/
H A Dsmtp.c23 -> set both username and password as NULL if no auth needed
521 /* copy auth data, ensuring the first byte is always zero */ in smtp_send_mail_alloced()
1057 u16_t auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_SP); in smtp_prepare_auth_or_mail() local
1058 if (auth == 0xFFFF) { in smtp_prepare_auth_or_mail()
1059 auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_EQ); in smtp_prepare_auth_or_mail()
1061 if (auth != 0xFFFF) { in smtp_prepare_auth_or_mail()
1062 u16_t crlf = pbuf_memfind(s->p, SMTP_CRLF, SMTP_CRLF_LEN, auth); in smtp_prepare_auth_or_mail()
1063 if ((crlf != 0xFFFF) && (crlf > auth)) { in smtp_prepare_auth_or_mail()
1065 u16_t copied = pbuf_copy_partial(s->p, s->tx_buf, (u16_t)(crlf - auth), auth); in smtp_prepare_auth_or_mail()
[all...]
/kernel/linux/linux-5.10/net/sctp/
H A DMakefile14 output.o input.o debug.o stream.o auth.o \
/kernel/linux/linux-5.10/include/linux/sunrpc/
H A Dauth_gss.h17 #include <linux/sunrpc/auth.h>
/kernel/linux/linux-6.6/fs/smb/server/
H A DMakefile7 ksmbd-y := unicode.o auth.o vfs.o vfs_cache.o server.o ndr.o \
/kernel/linux/linux-6.6/include/linux/sunrpc/
H A Dauth_gss.h17 #include <linux/sunrpc/auth.h>
/kernel/linux/linux-6.6/net/sctp/
H A DMakefile14 output.o input.o debug.o stream.o auth.o \
/third_party/skia/third_party/externals/freetype/builds/unix/
H A Ddetect.mk24 $(wildcard /hurd/auth))
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dibss_rsn.h40 struct wpa_state_machine *auth; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dibss_rsn.h40 struct wpa_state_machine *auth; member
/kernel/linux/linux-5.10/drivers/crypto/bcm/
H A Dcipher.c414 0, ctx->auth.alg, ctx->auth.mode, in handle_skcipher_req()
705 hash_parms.alg = ctx->auth.alg; in handle_ahash_req()
706 hash_parms.mode = ctx->auth.mode; in handle_ahash_req()
779 digestsize = spu->spu_digest_size(ctx->digestsize, ctx->auth.alg, in handle_ahash_req()
846 hash_parms.pad_len, ctx->auth.alg, in handle_ahash_req()
847 ctx->auth.mode, rctx->total_sent, in handle_ahash_req()
906 switch (ctx->auth.alg) { in spu_hmac_outer_hash()
959 if (ctx->auth.alg == HASH_ALG_MD5) { in ahash_req_done()
978 if (rctx->is_sw_hmac || ctx->auth in ahash_req_done()
[all...]
/kernel/linux/linux-6.6/drivers/crypto/bcm/
H A Dcipher.c414 0, ctx->auth.alg, ctx->auth.mode, in handle_skcipher_req()
703 hash_parms.alg = ctx->auth.alg; in handle_ahash_req()
704 hash_parms.mode = ctx->auth.mode; in handle_ahash_req()
777 digestsize = spu->spu_digest_size(ctx->digestsize, ctx->auth.alg, in handle_ahash_req()
844 hash_parms.pad_len, ctx->auth.alg, in handle_ahash_req()
845 ctx->auth.mode, rctx->total_sent, in handle_ahash_req()
904 switch (ctx->auth.alg) { in spu_hmac_outer_hash()
957 if (ctx->auth.alg == HASH_ALG_MD5) { in ahash_req_done()
976 if (rctx->is_sw_hmac || ctx->auth in ahash_req_done()
[all...]
/kernel/linux/linux-6.6/drivers/crypto/qce/
H A Dcommon.c156 __be32 auth[SHA256_DIGEST_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_ahash() local
190 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash()
192 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash()
195 qce_write_array(qce, REG_AUTH_IV0, (u32 *)auth, iv_words); in qce_setup_regs_ahash()
/third_party/node/test/parallel/
H A Dtest-crypto-authenticated.js43 auth: / auth/,
158 assert.throws(function() { decrypt.final('hex'); }, errMessages.auth);
197 assert.throws(function() { decrypt.final('ascii'); }, errMessages.auth);
/kernel/linux/linux-5.10/drivers/crypto/
H A Datmel-sha.c2144 struct atmel_sha_authenc_ctx *auth; in atmel_sha_authenc_spawn() local
2184 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in atmel_sha_authenc_spawn()
2185 if (!auth) { in atmel_sha_authenc_spawn()
2189 auth->tfm = tfm; in atmel_sha_authenc_spawn()
2191 return auth; in atmel_sha_authenc_spawn()
2200 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth) in atmel_sha_authenc_free() argument
2202 if (auth) in atmel_sha_authenc_free()
2203 crypto_free_ahash(auth->tfm); in atmel_sha_authenc_free()
2204 kfree(auth); in atmel_sha_authenc_free()
2208 atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, const u8 *key, unsigned int keylen, u32 flags) atmel_sha_authenc_setkey() argument
2219 atmel_sha_authenc_schedule(struct ahash_request *req, struct atmel_sha_authenc_ctx *auth, atmel_aes_authenc_fn_t cb, struct atmel_aes_dev *aes_dev) atmel_sha_authenc_schedule() argument
[all...]
/kernel/linux/linux-6.6/drivers/crypto/
H A Datmel-sha.c2170 struct atmel_sha_authenc_ctx *auth; in atmel_sha_authenc_spawn() local
2210 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in atmel_sha_authenc_spawn()
2211 if (!auth) { in atmel_sha_authenc_spawn()
2215 auth->tfm = tfm; in atmel_sha_authenc_spawn()
2217 return auth; in atmel_sha_authenc_spawn()
2226 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth) in atmel_sha_authenc_free() argument
2228 if (auth) in atmel_sha_authenc_free()
2229 crypto_free_ahash(auth->tfm); in atmel_sha_authenc_free()
2230 kfree(auth); in atmel_sha_authenc_free()
2234 atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, const u8 *key, unsigned int keylen, u32 flags) atmel_sha_authenc_setkey() argument
2245 atmel_sha_authenc_schedule(struct ahash_request *req, struct atmel_sha_authenc_ctx *auth, atmel_aes_authenc_fn_t cb, struct atmel_aes_dev *aes_dev) atmel_sha_authenc_schedule() argument
[all...]
/foundation/communication/dsoftbus/core/transmission/trans_channel/udp_negotiation/src/
H A Dtrans_udp_negotiation.c482 TRANS_LOGE(TRANS_CTRL, "get peer uuid by auth id failed, ret=%{public}d.", ret); in SetPeerDeviceIdByAuth()
897 AuthConnInfo auth; in UdpOpenAuthConn() local
898 (void)memset_s(&auth, sizeof(AuthConnInfo), 0, sizeof(AuthConnInfo)); in UdpOpenAuthConn()
903 ret = AuthGetHmlConnInfo(peerUdid, &auth, isMeta); in UdpOpenAuthConn()
906 ret = AuthGetP2pConnInfo(peerUdid, &auth, isMeta); in UdpOpenAuthConn()
909 ret = AuthGetPreferConnInfo(peerUdid, &auth, isMeta); in UdpOpenAuthConn()
912 ret = AuthGetPreferConnInfo(peerUdid, &auth, true); in UdpOpenAuthConn()
923 ret = AuthOpenConn(&auth, requestId, &cb, isMeta); in UdpOpenAuthConn()
974 TRANS_LOGE(TRANS_CTRL, "open auth conn fail"); in OpenAuthConnForUdpNegotiation()
1173 TRANS_LOGE(TRANS_CTRL, "register udp callback to auth faile in TransUdpChannelInit()
[all...]
/foundation/communication/dsoftbus/core/transmission/trans_channel/proxy/src/
H A Dsoftbus_proxychannel_message.c203 TRANS_LOGE(TRANS_CTRL, "get auth handle fail"); in GetAuthIdByHandshakeMsg()
220 TRANS_LOGE(TRANS_CTRL, "get auth handle fail"); in GetAuthIdReDecrypt()
244 int32_t TransProxyParseMessage(char *data, int32_t len, ProxyMessage *msg, AuthHandle *auth) in TransProxyParseMessage() argument
258 ret = GetAuthIdByHandshakeMsg(msg->connId, msg->msgHead.cipher, auth, in TransProxyParseMessage()
261 ret = TransProxyGetAuthId(msg->msgHead.myId, auth); in TransProxyParseMessage()
263 if (ret != SOFTBUS_OK || auth->authId == AUTH_INVALID_ID) { in TransProxyParseMessage()
268 msg->authHandle = (*auth); in TransProxyParseMessage()
275 if (AuthDecrypt(auth, (uint8_t *)msg->data, (uint32_t)msg->dateLen, decData, &decDataLen) != SOFTBUS_OK && in TransProxyParseMessage()
276 GetAuthIdReDecrypt(auth, msg, decData, &decDataLen) != SOFTBUS_OK) { in TransProxyParseMessage()
/test/xts/device_attest/services/core/attest/
H A Dattest_service_auth.c37 ATTEST_LOG_WARN("[IsAuthStatusChg] Load auth status failed or status file not exist"); in IsAuthStatusChg()
67 ATTEST_LOG_ERROR("[IsAuthStatusChg] Check auth result failed"); in IsAuthStatusChg()
86 ATTEST_LOG_ERROR("[FlushAuthResult] write auth status failed"); in FlushAuthResult()
361 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Too few parameter of auth status"); in UnpackAuthStatusResp()
365 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Parse auth result failed"); in UnpackAuthStatusResp()
377 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Parse auth type failed"); in UnpackAuthStatusResp()
467 ATTEST_LOG_ERROR("[CheckAuthResult] auth result is ATTEST_ERR."); in CheckAuthResult()
521 ATTEST_LOG_ERROR("[ParseInfoByBase64] Invalid auth status file format"); in ParseInfoByBase64()
581 ATTEST_LOG_ERROR("[DecodeAuthStatus] Invalid auth status file format"); in DecodeAuthStatus()
655 void DestroyAuthResult(AuthResult** auth) in DestroyAuthResult() argument
[all...]
/test/xts/device_attest_lite/services/core/attest/
H A Dattest_service_auth.c39 ATTEST_LOG_WARN("[IsAuthStatusChg] Load auth status failed or status file not exist"); in IsAuthStatusChg()
69 ATTEST_LOG_ERROR("[IsAuthStatusChg] Check auth result failed"); in IsAuthStatusChg()
88 ATTEST_LOG_ERROR("[FlushAuthResult] write auth status failed"); in FlushAuthResult()
385 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Too few parameter of auth status"); in UnpackAuthStatusResp()
389 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Parse auth result failed"); in UnpackAuthStatusResp()
401 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Parse auth type failed"); in UnpackAuthStatusResp()
491 ATTEST_LOG_ERROR("[CheckAuthResult] auth result is ATTEST_ERR."); in CheckAuthResult()
545 ATTEST_LOG_ERROR("[ParseInfoByBase64] Invalid auth status file format"); in ParseInfoByBase64()
605 ATTEST_LOG_ERROR("[DecodeAuthStatus] Invalid auth status file format"); in DecodeAuthStatus()
675 void DestroyAuthResult(AuthResult** auth) in DestroyAuthResult() argument
[all...]
/third_party/curl/tests/server/
H A Drtspd.c106 bool auth; /* Authorization header present in the incoming request */ member
516 if(!req->auth && strstr(req->reqbuf, "Authorization:")) { in ProcessRequest()
517 req->auth = TRUE; /* Authorization: header present! */ in ProcessRequest()
582 /* If authentication is required and no auth was provided, end now. This in ProcessRequest()
586 if(req->auth_req && !req->auth) in ProcessRequest()
680 req->auth = FALSE; in get_request()
/third_party/python/Lib/
H A Dsmtplib.py69 OLDSTYLE_AUTH = re.compile(r"auth=(.*)", re.I)
469 # we have to take the old-style auth advertisement into account,
472 # 2) There are some servers that only advertise the auth methods we
477 self.esmtp_features["auth"] = self.esmtp_features.get("auth", "") \
489 if feature == "auth":
616 def auth(self, mechanism, authobject, *, initial_response_ok=True): member in SMTP
620 be used - the valid values are those listed in the 'auth'
635 # RFC 4954 allows auth methods to provide an initial response. Not all
715 if not self.has_extn("auth")
[all...]
/device/soc/hisilicon/hi3861v100/sdk_liteos/app/demo/src/
H A Dwifi_sta.c87 * set assoc_req.auth as HI_WIFI_SECURITY_WPA2PSK, in hi_wifi_start_connect()
90 assoc_req.auth = HI_WIFI_SECURITY_OPEN; in hi_wifi_start_connect()
/foundation/communication/dsoftbus/core/authentication/include/
H A Dauth_session_message.h65 const AuthManager *auth, int32_t flagRelay, AuthLinkType type, const DeviceMessageParse *messageParse);
/kernel/linux/common_modules/tzdriver/core/
H A DMakefile10 EXTRA_CFLAGS += -I$(KERNEL_DIR)/drivers/tzdriver/auth

Completed in 26 milliseconds

12345678910>>...27