/kernel/linux/linux-5.10/include/net/sctp/ |
H A D | auth.h | 93 struct sk_buff *skb, struct sctp_auth_chunk *auth,
|
/kernel/linux/linux-5.10/include/linux/ceph/ |
H A D | mon_client.h | 77 struct ceph_auth_client *auth; member
|
/kernel/linux/linux-6.6/include/linux/ceph/ |
H A D | mon_client.h | 77 struct ceph_auth_client *auth; member
|
/kernel/linux/linux-6.6/include/net/sctp/ |
H A D | auth.h | 93 struct sk_buff *skb, struct sctp_auth_chunk *auth,
|
/kernel/linux/linux-6.6/drivers/net/wireless/quantenna/qtnfmac/ |
H A D | commands.h | 55 struct cfg80211_external_auth_params *auth);
|
/kernel/linux/linux-6.6/net/sunrpc/ |
H A D | sunrpc_syms.c | 21 #include <linux/sunrpc/auth.h>
|
/third_party/curl/lib/ |
H A D | http_digest.c | 93 struct auth *authp; in Curl_output_digest()
|
H A D | cf-h1-proxy.c | 301 char *auth = Curl_copy_header_value(header); in on_resp_header() local 302 if(!auth) in on_resp_header() 305 CURL_TRC_CF(data, cf, "CONNECT: fwd auth header '%s'", header); in on_resp_header() 306 result = Curl_http_input_auth(data, proxy, auth); in on_resp_header() 308 free(auth); in on_resp_header() 405 /* proxy auth was requested and there was proxy auth available, in recv_CONNECT_resp() 486 when we have no auth problem, we must ignore the in recv_CONNECT_resp()
|
/third_party/skia/infra/bots/task_drivers/compile_wasm_gm_tests/ |
H A D | compile_wasm_gm_tests.go | 15 "go.skia.org/infra/go/auth" 78 ts, err := auth_steps.Init(ctx, isLocal, auth.ScopeUserinfoEmail, storage.ScopeReadOnly)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_eke_common.h | 112 const struct wpabuf *msgs, u8 *auth);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_eke_common.h | 112 const struct wpabuf *msgs, u8 *auth);
|
/third_party/ntfs-3g/ntfsprogs/ |
H A D | ntfsusermap.c | 344 unsigned long long auth; in decodesid() local 353 auth = get6h(sid, 2); in decodesid() 355 sprintf(&str[strlen(str)], "-%I64u", auth); in decodesid() 357 sprintf(&str[strlen(str)], "-%llu", auth); in decodesid()
|
/third_party/node/deps/npm/test/lib/commands/ |
H A D | profile.js | 45 tfa: { pending: false, mode: 'auth-and-writes' }, 490 /npm profile enable-2fa \[auth-and-writes|auth-only\]/, 495 t.test('invalid two factor auth mode', async t => { 500 'should throw invalid auth mode error' 509 profile.exec(['enable-2fa', 'auth-only']), 521 profile.exec(['enable-2fa', 'auth-only']), 533 t.match(pass, 'bar', 'should use password for basic auth') 542 // mock legacy basic auth style 546 return { auth [all...] |
/third_party/python/Lib/ |
H A D | nntplib.py | 951 auth = credentials.authenticators(self.host) 952 if auth: 953 user = auth[0] 954 password = auth[2]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_eke.c | 511 u8 *auth; in eap_eke_process_confirm() local 596 auth = wpabuf_put(resp, data->sess.prf_len); in eap_eke_process_confirm() 597 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) { in eap_eke_process_confirm() 602 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len); in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_eke.c | 309 u8 *auth; in eap_eke_build_confirm() local 349 auth = wpabuf_put(msg, data->sess.prf_len); in eap_eke_build_confirm() 350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) { in eap_eke_build_confirm() 355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len); in eap_eke_build_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_eke.c | 511 u8 *auth; in eap_eke_process_confirm() local 596 auth = wpabuf_put(resp, data->sess.prf_len); in eap_eke_process_confirm() 597 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) { in eap_eke_process_confirm() 602 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len); in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_eke.c | 309 u8 *auth; in eap_eke_build_confirm() local 349 auth = wpabuf_put(msg, data->sess.prf_len); in eap_eke_build_confirm() 350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) { in eap_eke_build_confirm() 355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len); in eap_eke_build_confirm()
|
/foundation/communication/dsoftbus/tests/core/transmission/trans_channel/tcp_direct/unittest/ |
H A D | trans_server_tcp_direct_test.cpp | 196 AuthManager *auth = GetAuthManagerByAuthId(authId); in TestDelAuthManager() local 197 if (auth != NULL) { in TestDelAuthManager() 198 DelAuthManager(auth, AUTH_LINK_TYPE_MAX); in TestDelAuthManager() 246 * @tc.desc: GetCipherFlagByAuthId, transmission tcp direct listener get cipher flag by auth id.
|
/kernel/linux/linux-5.10/net/ipv4/ |
H A D | ah4.c | 507 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah_init_state() 512 aalg_desc->uinfo.auth.icv_fullbits / 8); in ah_init_state() 516 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah_init_state()
|
/kernel/linux/linux-5.10/net/ipv6/ |
H A D | ah6.c | 706 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah6_init_state() 710 aalg_desc->uinfo.auth.icv_fullbits/8); in ah6_init_state() 714 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah6_init_state()
|
/kernel/linux/linux-6.6/drivers/acpi/ |
H A D | pfr_update.c | 278 const struct efi_image_auth *auth; in applicable_image() local 305 auth = data + size; in applicable_image() 306 size += sizeof(u64) + auth->auth_info.hdr.len; in applicable_image()
|
/third_party/vixl/test/ |
H A D | test-api.cc | 484 CPUFeatures auth(CPUFeatures::kPAuth, in TEST() 492 CPUFeaturesScope inner(&outer, auth); in TEST() 494 VIXL_CHECK(cpu.Has(auth.With(CPUFeatures::kCRC32, in TEST()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 3603 struct ieee80211_mgmt *auth; in wpa_pasn_build_auth_header() local 3608 auth = wpabuf_put(buf, offsetof(struct ieee80211_mgmt, in wpa_pasn_build_auth_header() 3609 u.auth.variable)); in wpa_pasn_build_auth_header() 3611 auth->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) | in wpa_pasn_build_auth_header() 3614 os_memcpy(auth->da, dst, ETH_ALEN); in wpa_pasn_build_auth_header() 3615 os_memcpy(auth->sa, src, ETH_ALEN); in wpa_pasn_build_auth_header() 3616 os_memcpy(auth->bssid, bssid, ETH_ALEN); in wpa_pasn_build_auth_header() 3617 auth->seq_ctrl = 0; in wpa_pasn_build_auth_header() 3619 auth->u.auth in wpa_pasn_build_auth_header() [all...] |
/kernel/linux/linux-5.10/drivers/net/wireless/marvell/libertas/ |
H A D | cfg.c | 342 * Add auth type TLV. 351 struct mrvl_ie_auth_type *auth = (void *) tlv; in lbs_add_auth_type_tlv() local 356 * 01 auth type in lbs_add_auth_type_tlv() 358 auth->header.type = cpu_to_le16(TLV_TYPE_AUTH_TYPE); in lbs_add_auth_type_tlv() 359 auth->header.len = cpu_to_le16(sizeof(*auth)-sizeof(auth->header)); in lbs_add_auth_type_tlv() 360 auth->auth = cpu_to_le16(lbs_auth_to_authtype(auth_type)); in lbs_add_auth_type_tlv() 361 return sizeof(*auth); in lbs_add_auth_type_tlv() [all...] |