/third_party/python/Lib/distutils/command/ |
H A D | upload.py | 156 auth = "Basic " + standard_b64encode(user_pass).decode('ascii') 188 'Authorization': auth,
|
/third_party/lwip/src/apps/smtp/ |
H A D | smtp.c | 23 -> set both username and password as NULL if no auth needed 521 /* copy auth data, ensuring the first byte is always zero */ in smtp_send_mail_alloced() 1057 u16_t auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_SP); in smtp_prepare_auth_or_mail() local 1058 if (auth == 0xFFFF) { in smtp_prepare_auth_or_mail() 1059 auth = pbuf_strstr(s->p, SMTP_KEYWORD_AUTH_EQ); in smtp_prepare_auth_or_mail() 1061 if (auth != 0xFFFF) { in smtp_prepare_auth_or_mail() 1062 u16_t crlf = pbuf_memfind(s->p, SMTP_CRLF, SMTP_CRLF_LEN, auth); in smtp_prepare_auth_or_mail() 1063 if ((crlf != 0xFFFF) && (crlf > auth)) { in smtp_prepare_auth_or_mail() 1065 u16_t copied = pbuf_copy_partial(s->p, s->tx_buf, (u16_t)(crlf - auth), auth); in smtp_prepare_auth_or_mail() [all...] |
/kernel/linux/linux-5.10/net/sctp/ |
H A D | Makefile | 14 output.o input.o debug.o stream.o auth.o \
|
/kernel/linux/linux-5.10/include/linux/sunrpc/ |
H A D | auth_gss.h | 17 #include <linux/sunrpc/auth.h>
|
/kernel/linux/linux-6.6/fs/smb/server/ |
H A D | Makefile | 7 ksmbd-y := unicode.o auth.o vfs.o vfs_cache.o server.o ndr.o \
|
/kernel/linux/linux-6.6/include/linux/sunrpc/ |
H A D | auth_gss.h | 17 #include <linux/sunrpc/auth.h>
|
/kernel/linux/linux-6.6/net/sctp/ |
H A D | Makefile | 14 output.o input.o debug.o stream.o auth.o \
|
/third_party/skia/third_party/externals/freetype/builds/unix/ |
H A D | detect.mk | 24 $(wildcard /hurd/auth))
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | ibss_rsn.h | 40 struct wpa_state_machine *auth; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | ibss_rsn.h | 40 struct wpa_state_machine *auth; member
|
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | cipher.c | 414 0, ctx->auth.alg, ctx->auth.mode, in handle_skcipher_req() 705 hash_parms.alg = ctx->auth.alg; in handle_ahash_req() 706 hash_parms.mode = ctx->auth.mode; in handle_ahash_req() 779 digestsize = spu->spu_digest_size(ctx->digestsize, ctx->auth.alg, in handle_ahash_req() 846 hash_parms.pad_len, ctx->auth.alg, in handle_ahash_req() 847 ctx->auth.mode, rctx->total_sent, in handle_ahash_req() 906 switch (ctx->auth.alg) { in spu_hmac_outer_hash() 959 if (ctx->auth.alg == HASH_ALG_MD5) { in ahash_req_done() 978 if (rctx->is_sw_hmac || ctx->auth in ahash_req_done() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/bcm/ |
H A D | cipher.c | 414 0, ctx->auth.alg, ctx->auth.mode, in handle_skcipher_req() 703 hash_parms.alg = ctx->auth.alg; in handle_ahash_req() 704 hash_parms.mode = ctx->auth.mode; in handle_ahash_req() 777 digestsize = spu->spu_digest_size(ctx->digestsize, ctx->auth.alg, in handle_ahash_req() 844 hash_parms.pad_len, ctx->auth.alg, in handle_ahash_req() 845 ctx->auth.mode, rctx->total_sent, in handle_ahash_req() 904 switch (ctx->auth.alg) { in spu_hmac_outer_hash() 957 if (ctx->auth.alg == HASH_ALG_MD5) { in ahash_req_done() 976 if (rctx->is_sw_hmac || ctx->auth in ahash_req_done() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/qce/ |
H A D | common.c | 156 __be32 auth[SHA256_DIGEST_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_ahash() local 190 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 192 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 195 qce_write_array(qce, REG_AUTH_IV0, (u32 *)auth, iv_words); in qce_setup_regs_ahash()
|
/third_party/node/test/parallel/ |
H A D | test-crypto-authenticated.js | 43 auth: / auth/, 158 assert.throws(function() { decrypt.final('hex'); }, errMessages.auth); 197 assert.throws(function() { decrypt.final('ascii'); }, errMessages.auth);
|
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | atmel-sha.c | 2144 struct atmel_sha_authenc_ctx *auth; in atmel_sha_authenc_spawn() local 2184 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in atmel_sha_authenc_spawn() 2185 if (!auth) { in atmel_sha_authenc_spawn() 2189 auth->tfm = tfm; in atmel_sha_authenc_spawn() 2191 return auth; in atmel_sha_authenc_spawn() 2200 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth) in atmel_sha_authenc_free() argument 2202 if (auth) in atmel_sha_authenc_free() 2203 crypto_free_ahash(auth->tfm); in atmel_sha_authenc_free() 2204 kfree(auth); in atmel_sha_authenc_free() 2208 atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, const u8 *key, unsigned int keylen, u32 flags) atmel_sha_authenc_setkey() argument 2219 atmel_sha_authenc_schedule(struct ahash_request *req, struct atmel_sha_authenc_ctx *auth, atmel_aes_authenc_fn_t cb, struct atmel_aes_dev *aes_dev) atmel_sha_authenc_schedule() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | atmel-sha.c | 2170 struct atmel_sha_authenc_ctx *auth; in atmel_sha_authenc_spawn() local 2210 auth = kzalloc(sizeof(*auth), GFP_KERNEL); in atmel_sha_authenc_spawn() 2211 if (!auth) { in atmel_sha_authenc_spawn() 2215 auth->tfm = tfm; in atmel_sha_authenc_spawn() 2217 return auth; in atmel_sha_authenc_spawn() 2226 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth) in atmel_sha_authenc_free() argument 2228 if (auth) in atmel_sha_authenc_free() 2229 crypto_free_ahash(auth->tfm); in atmel_sha_authenc_free() 2230 kfree(auth); in atmel_sha_authenc_free() 2234 atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, const u8 *key, unsigned int keylen, u32 flags) atmel_sha_authenc_setkey() argument 2245 atmel_sha_authenc_schedule(struct ahash_request *req, struct atmel_sha_authenc_ctx *auth, atmel_aes_authenc_fn_t cb, struct atmel_aes_dev *aes_dev) atmel_sha_authenc_schedule() argument [all...] |
/foundation/communication/dsoftbus/core/transmission/trans_channel/udp_negotiation/src/ |
H A D | trans_udp_negotiation.c | 482 TRANS_LOGE(TRANS_CTRL, "get peer uuid by auth id failed, ret=%{public}d.", ret); in SetPeerDeviceIdByAuth() 897 AuthConnInfo auth; in UdpOpenAuthConn() local 898 (void)memset_s(&auth, sizeof(AuthConnInfo), 0, sizeof(AuthConnInfo)); in UdpOpenAuthConn() 903 ret = AuthGetHmlConnInfo(peerUdid, &auth, isMeta); in UdpOpenAuthConn() 906 ret = AuthGetP2pConnInfo(peerUdid, &auth, isMeta); in UdpOpenAuthConn() 909 ret = AuthGetPreferConnInfo(peerUdid, &auth, isMeta); in UdpOpenAuthConn() 912 ret = AuthGetPreferConnInfo(peerUdid, &auth, true); in UdpOpenAuthConn() 923 ret = AuthOpenConn(&auth, requestId, &cb, isMeta); in UdpOpenAuthConn() 974 TRANS_LOGE(TRANS_CTRL, "open auth conn fail"); in OpenAuthConnForUdpNegotiation() 1173 TRANS_LOGE(TRANS_CTRL, "register udp callback to auth faile in TransUdpChannelInit() [all...] |
/foundation/communication/dsoftbus/core/transmission/trans_channel/proxy/src/ |
H A D | softbus_proxychannel_message.c | 203 TRANS_LOGE(TRANS_CTRL, "get auth handle fail"); in GetAuthIdByHandshakeMsg() 220 TRANS_LOGE(TRANS_CTRL, "get auth handle fail"); in GetAuthIdReDecrypt() 244 int32_t TransProxyParseMessage(char *data, int32_t len, ProxyMessage *msg, AuthHandle *auth) in TransProxyParseMessage() argument 258 ret = GetAuthIdByHandshakeMsg(msg->connId, msg->msgHead.cipher, auth, in TransProxyParseMessage() 261 ret = TransProxyGetAuthId(msg->msgHead.myId, auth); in TransProxyParseMessage() 263 if (ret != SOFTBUS_OK || auth->authId == AUTH_INVALID_ID) { in TransProxyParseMessage() 268 msg->authHandle = (*auth); in TransProxyParseMessage() 275 if (AuthDecrypt(auth, (uint8_t *)msg->data, (uint32_t)msg->dateLen, decData, &decDataLen) != SOFTBUS_OK && in TransProxyParseMessage() 276 GetAuthIdReDecrypt(auth, msg, decData, &decDataLen) != SOFTBUS_OK) { in TransProxyParseMessage()
|
/test/xts/device_attest/services/core/attest/ |
H A D | attest_service_auth.c | 37 ATTEST_LOG_WARN("[IsAuthStatusChg] Load auth status failed or status file not exist"); in IsAuthStatusChg() 67 ATTEST_LOG_ERROR("[IsAuthStatusChg] Check auth result failed"); in IsAuthStatusChg() 86 ATTEST_LOG_ERROR("[FlushAuthResult] write auth status failed"); in FlushAuthResult() 361 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Too few parameter of auth status"); in UnpackAuthStatusResp() 365 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Parse auth result failed"); in UnpackAuthStatusResp() 377 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Parse auth type failed"); in UnpackAuthStatusResp() 467 ATTEST_LOG_ERROR("[CheckAuthResult] auth result is ATTEST_ERR."); in CheckAuthResult() 521 ATTEST_LOG_ERROR("[ParseInfoByBase64] Invalid auth status file format"); in ParseInfoByBase64() 581 ATTEST_LOG_ERROR("[DecodeAuthStatus] Invalid auth status file format"); in DecodeAuthStatus() 655 void DestroyAuthResult(AuthResult** auth) in DestroyAuthResult() argument [all...] |
/test/xts/device_attest_lite/services/core/attest/ |
H A D | attest_service_auth.c | 39 ATTEST_LOG_WARN("[IsAuthStatusChg] Load auth status failed or status file not exist"); in IsAuthStatusChg() 69 ATTEST_LOG_ERROR("[IsAuthStatusChg] Check auth result failed"); in IsAuthStatusChg() 88 ATTEST_LOG_ERROR("[FlushAuthResult] write auth status failed"); in FlushAuthResult() 385 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Too few parameter of auth status"); in UnpackAuthStatusResp() 389 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Parse auth result failed"); in UnpackAuthStatusResp() 401 ATTEST_LOG_ERROR("[UnpackAuthStatusResp] Parse auth type failed"); in UnpackAuthStatusResp() 491 ATTEST_LOG_ERROR("[CheckAuthResult] auth result is ATTEST_ERR."); in CheckAuthResult() 545 ATTEST_LOG_ERROR("[ParseInfoByBase64] Invalid auth status file format"); in ParseInfoByBase64() 605 ATTEST_LOG_ERROR("[DecodeAuthStatus] Invalid auth status file format"); in DecodeAuthStatus() 675 void DestroyAuthResult(AuthResult** auth) in DestroyAuthResult() argument [all...] |
/third_party/curl/tests/server/ |
H A D | rtspd.c | 106 bool auth; /* Authorization header present in the incoming request */ member 516 if(!req->auth && strstr(req->reqbuf, "Authorization:")) { in ProcessRequest() 517 req->auth = TRUE; /* Authorization: header present! */ in ProcessRequest() 582 /* If authentication is required and no auth was provided, end now. This in ProcessRequest() 586 if(req->auth_req && !req->auth) in ProcessRequest() 680 req->auth = FALSE; in get_request()
|
/third_party/python/Lib/ |
H A D | smtplib.py | 69 OLDSTYLE_AUTH = re.compile(r"auth=(.*)", re.I) 469 # we have to take the old-style auth advertisement into account, 472 # 2) There are some servers that only advertise the auth methods we 477 self.esmtp_features["auth"] = self.esmtp_features.get("auth", "") \ 489 if feature == "auth": 616 def auth(self, mechanism, authobject, *, initial_response_ok=True): member in SMTP 620 be used - the valid values are those listed in the 'auth' 635 # RFC 4954 allows auth methods to provide an initial response. Not all 715 if not self.has_extn("auth") [all...] |
/device/soc/hisilicon/hi3861v100/sdk_liteos/app/demo/src/ |
H A D | wifi_sta.c | 87 * set assoc_req.auth as HI_WIFI_SECURITY_WPA2PSK, in hi_wifi_start_connect() 90 assoc_req.auth = HI_WIFI_SECURITY_OPEN; in hi_wifi_start_connect()
|
/foundation/communication/dsoftbus/core/authentication/include/ |
H A D | auth_session_message.h | 65 const AuthManager *auth, int32_t flagRelay, AuthLinkType type, const DeviceMessageParse *messageParse);
|
/kernel/linux/common_modules/tzdriver/core/ |
H A D | Makefile | 10 EXTRA_CFLAGS += -I$(KERNEL_DIR)/drivers/tzdriver/auth
|