Home
last modified time | relevance | path

Searched refs:auth (Results 276 - 300 of 665) sorted by relevance

1...<<11121314151617181920>>...27

/kernel/linux/linux-5.10/include/net/sctp/
H A Dauth.h93 struct sk_buff *skb, struct sctp_auth_chunk *auth,
/kernel/linux/linux-5.10/include/linux/ceph/
H A Dmon_client.h77 struct ceph_auth_client *auth; member
/kernel/linux/linux-6.6/include/linux/ceph/
H A Dmon_client.h77 struct ceph_auth_client *auth; member
/kernel/linux/linux-6.6/include/net/sctp/
H A Dauth.h93 struct sk_buff *skb, struct sctp_auth_chunk *auth,
/kernel/linux/linux-6.6/drivers/net/wireless/quantenna/qtnfmac/
H A Dcommands.h55 struct cfg80211_external_auth_params *auth);
/kernel/linux/linux-6.6/net/sunrpc/
H A Dsunrpc_syms.c21 #include <linux/sunrpc/auth.h>
/third_party/curl/lib/
H A Dhttp_digest.c93 struct auth *authp; in Curl_output_digest()
H A Dcf-h1-proxy.c301 char *auth = Curl_copy_header_value(header); in on_resp_header() local
302 if(!auth) in on_resp_header()
305 CURL_TRC_CF(data, cf, "CONNECT: fwd auth header '%s'", header); in on_resp_header()
306 result = Curl_http_input_auth(data, proxy, auth); in on_resp_header()
308 free(auth); in on_resp_header()
405 /* proxy auth was requested and there was proxy auth available, in recv_CONNECT_resp()
486 when we have no auth problem, we must ignore the in recv_CONNECT_resp()
/third_party/skia/infra/bots/task_drivers/compile_wasm_gm_tests/
H A Dcompile_wasm_gm_tests.go15 "go.skia.org/infra/go/auth"
78 ts, err := auth_steps.Init(ctx, isLocal, auth.ScopeUserinfoEmail, storage.ScopeReadOnly)
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_eke_common.h112 const struct wpabuf *msgs, u8 *auth);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_eke_common.h112 const struct wpabuf *msgs, u8 *auth);
/third_party/ntfs-3g/ntfsprogs/
H A Dntfsusermap.c344 unsigned long long auth; in decodesid() local
353 auth = get6h(sid, 2); in decodesid()
355 sprintf(&str[strlen(str)], "-%I64u", auth); in decodesid()
357 sprintf(&str[strlen(str)], "-%llu", auth); in decodesid()
/third_party/node/deps/npm/test/lib/commands/
H A Dprofile.js45 tfa: { pending: false, mode: 'auth-and-writes' },
490 /npm profile enable-2fa \[auth-and-writes|auth-only\]/,
495 t.test('invalid two factor auth mode', async t => {
500 'should throw invalid auth mode error'
509 profile.exec(['enable-2fa', 'auth-only']),
521 profile.exec(['enable-2fa', 'auth-only']),
533 t.match(pass, 'bar', 'should use password for basic auth')
542 // mock legacy basic auth style
546 return { auth
[all...]
/third_party/python/Lib/
H A Dnntplib.py951 auth = credentials.authenticators(self.host)
952 if auth:
953 user = auth[0]
954 password = auth[2]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_eke.c511 u8 *auth; in eap_eke_process_confirm() local
596 auth = wpabuf_put(resp, data->sess.prf_len); in eap_eke_process_confirm()
597 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) { in eap_eke_process_confirm()
602 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len); in eap_eke_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_eke.c309 u8 *auth; in eap_eke_build_confirm() local
349 auth = wpabuf_put(msg, data->sess.prf_len); in eap_eke_build_confirm()
350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) { in eap_eke_build_confirm()
355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len); in eap_eke_build_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_eke.c511 u8 *auth; in eap_eke_process_confirm() local
596 auth = wpabuf_put(resp, data->sess.prf_len); in eap_eke_process_confirm()
597 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth) < 0) { in eap_eke_process_confirm()
602 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len); in eap_eke_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_eke.c309 u8 *auth; in eap_eke_build_confirm() local
349 auth = wpabuf_put(msg, data->sess.prf_len); in eap_eke_build_confirm()
350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) { in eap_eke_build_confirm()
355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len); in eap_eke_build_confirm()
/foundation/communication/dsoftbus/tests/core/transmission/trans_channel/tcp_direct/unittest/
H A Dtrans_server_tcp_direct_test.cpp196 AuthManager *auth = GetAuthManagerByAuthId(authId); in TestDelAuthManager() local
197 if (auth != NULL) { in TestDelAuthManager()
198 DelAuthManager(auth, AUTH_LINK_TYPE_MAX); in TestDelAuthManager()
246 * @tc.desc: GetCipherFlagByAuthId, transmission tcp direct listener get cipher flag by auth id.
/kernel/linux/linux-5.10/net/ipv4/
H A Dah4.c507 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah_init_state()
512 aalg_desc->uinfo.auth.icv_fullbits / 8); in ah_init_state()
516 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah_init_state()
/kernel/linux/linux-5.10/net/ipv6/
H A Dah6.c706 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah6_init_state()
710 aalg_desc->uinfo.auth.icv_fullbits/8); in ah6_init_state()
714 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah6_init_state()
/kernel/linux/linux-6.6/drivers/acpi/
H A Dpfr_update.c278 const struct efi_image_auth *auth; in applicable_image() local
305 auth = data + size; in applicable_image()
306 size += sizeof(u64) + auth->auth_info.hdr.len; in applicable_image()
/third_party/vixl/test/
H A Dtest-api.cc484 CPUFeatures auth(CPUFeatures::kPAuth, in TEST()
492 CPUFeaturesScope inner(&outer, auth); in TEST()
494 VIXL_CHECK(cpu.Has(auth.With(CPUFeatures::kCRC32, in TEST()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Dwpa_common.c3603 struct ieee80211_mgmt *auth; in wpa_pasn_build_auth_header() local
3608 auth = wpabuf_put(buf, offsetof(struct ieee80211_mgmt, in wpa_pasn_build_auth_header()
3609 u.auth.variable)); in wpa_pasn_build_auth_header()
3611 auth->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) | in wpa_pasn_build_auth_header()
3614 os_memcpy(auth->da, dst, ETH_ALEN); in wpa_pasn_build_auth_header()
3615 os_memcpy(auth->sa, src, ETH_ALEN); in wpa_pasn_build_auth_header()
3616 os_memcpy(auth->bssid, bssid, ETH_ALEN); in wpa_pasn_build_auth_header()
3617 auth->seq_ctrl = 0; in wpa_pasn_build_auth_header()
3619 auth->u.auth in wpa_pasn_build_auth_header()
[all...]
/kernel/linux/linux-5.10/drivers/net/wireless/marvell/libertas/
H A Dcfg.c342 * Add auth type TLV.
351 struct mrvl_ie_auth_type *auth = (void *) tlv; in lbs_add_auth_type_tlv() local
356 * 01 auth type in lbs_add_auth_type_tlv()
358 auth->header.type = cpu_to_le16(TLV_TYPE_AUTH_TYPE); in lbs_add_auth_type_tlv()
359 auth->header.len = cpu_to_le16(sizeof(*auth)-sizeof(auth->header)); in lbs_add_auth_type_tlv()
360 auth->auth = cpu_to_le16(lbs_auth_to_authtype(auth_type)); in lbs_add_auth_type_tlv()
361 return sizeof(*auth); in lbs_add_auth_type_tlv()
[all...]

Completed in 22 milliseconds

1...<<11121314151617181920>>...27