/third_party/skia/third_party/externals/freetype/builds/ |
H A D | toplevel.mk | 138 $(wildcard /hurd/auth))
|
/third_party/pulseaudio/src/modules/x11/ |
H A D | module-x11-publish.c | 39 #include <pulsecore/auth-cookie.h>
|
/third_party/pulseaudio/src/pulsecore/ |
H A D | protocol-native.h | 31 #include <pulsecore/auth-cookie.h>
|
/third_party/skia/infra/bots/task_drivers/canary/ |
H A D | canary.go | 17 "go.skia.org/infra/go/auth" 64 ts, err := auth_steps.Init(ctx, *local, auth.ScopeUserinfoEmail, datastore.ScopeDatastore)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.h | 306 const u8 *auth; member
|
H A D | eap_eke_common.c | 687 const struct wpabuf *msgs, u8 *auth) in eap_eke_auth() 695 wpabuf_head(msgs), wpabuf_len(msgs), auth); in eap_eke_auth() 686 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) eap_eke_auth() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | ikev2_common.h | 306 const u8 *auth; member
|
H A D | eap_eke_common.c | 687 const struct wpabuf *msgs, u8 *auth) in eap_eke_auth() 695 wpabuf_head(msgs), wpabuf_len(msgs), auth); in eap_eke_auth() 686 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) eap_eke_auth() argument
|
/kernel/linux/linux-5.10/drivers/net/wireless/quantenna/qtnfmac/ |
H A D | cfg80211.c | 695 struct cfg80211_external_auth_params *auth) in qtnf_external_auth() 701 !ether_addr_equal(vif->bssid, auth->bssid)) in qtnf_external_auth() 702 pr_warn("unexpected bssid: %pM", auth->bssid); in qtnf_external_auth() 704 ret = qtnf_cmd_send_external_auth(vif, auth); in qtnf_external_auth() 706 pr_err("VIF%u.%u: failed to report external auth\n", in qtnf_external_auth() 694 qtnf_external_auth(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_external_auth_params *auth) qtnf_external_auth() argument
|
/kernel/linux/linux-5.10/fs/nfs/ |
H A D | super.c | 619 struct rpc_auth *auth = nfss->client->cl_auth; in nfs_show_stats() local 661 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor); in nfs_show_stats() 662 if (auth->au_flavor) in nfs_show_stats() 663 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor); in nfs_show_stats() 788 "NFS: specified auth flavors not supported by server\n"); in nfs_verify_authflavors() 793 dfprintk(MOUNT, "NFS: using auth flavor %u\n", ctx->selected_flavor); in nfs_verify_authflavors() 882 dfprintk(MOUNT, "NFS: using auth flavor %u\n", in nfs_try_mount_request() 911 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", flavor); in nfs_try_mount_request() 927 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", RPC_AUTH_UNIX); in nfs_try_mount_request()
|
/kernel/linux/linux-6.6/fs/nfs/ |
H A D | super.c | 650 struct rpc_auth *auth = nfss->client->cl_auth; in nfs_show_stats() local 692 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor); in nfs_show_stats() 693 if (auth->au_flavor) in nfs_show_stats() 694 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor); in nfs_show_stats() 808 "NFS: specified auth flavors not supported by server\n"); in nfs_verify_authflavors() 813 dfprintk(MOUNT, "NFS: using auth flavor %u\n", ctx->selected_flavor); in nfs_verify_authflavors() 901 dfprintk(MOUNT, "NFS: using auth flavor %u\n", in nfs_try_mount_request() 930 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", flavor); in nfs_try_mount_request() 946 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", RPC_AUTH_UNIX); in nfs_try_mount_request()
|
/kernel/linux/linux-6.6/drivers/target/iscsi/ |
H A D | iscsi_target_nego.c | 112 pr_err("Unable to locate struct se_node_acl for CHAP auth\n"); in iscsi_get_node_auth() 134 struct iscsi_node_auth *auth; in iscsi_handle_authentication() local 136 auth = iscsi_get_node_auth(conn); in iscsi_handle_authentication() 137 if (!auth) in iscsi_handle_authentication() 148 return chap_main_loop(conn, auth, in_buf, out_buf, in iscsi_handle_authentication()
|
/kernel/linux/linux-6.6/drivers/net/wireless/quantenna/qtnfmac/ |
H A D | cfg80211.c | 695 struct cfg80211_external_auth_params *auth) in qtnf_external_auth() 701 !ether_addr_equal(vif->bssid, auth->bssid)) in qtnf_external_auth() 702 pr_warn("unexpected bssid: %pM", auth->bssid); in qtnf_external_auth() 704 ret = qtnf_cmd_send_external_auth(vif, auth); in qtnf_external_auth() 706 pr_err("VIF%u.%u: failed to report external auth\n", in qtnf_external_auth() 694 qtnf_external_auth(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_external_auth_params *auth) qtnf_external_auth() argument
|
/foundation/communication/dsoftbus/core/transmission/trans_channel/tcp_direct/src/ |
H A D | trans_tcp_direct_p2p.c | 533 TRANS_LOGE(TRANS_CTRL, "VerifyP2p send auth data fail"); in VerifyP2p() 613 AuthConnInfo auth; in OpenAuthConn() local 614 (void)memset_s(&auth, sizeof(AuthConnInfo), 0, sizeof(AuthConnInfo)); in OpenAuthConn() 620 ret = AuthGetHmlConnInfo(uuid, &auth, isMeta); in OpenAuthConn() 624 ret = AuthGetP2pConnInfo(uuid, &auth, isMeta); in OpenAuthConn() 627 ret = AuthGetPreferConnInfo(uuid, &auth, isMeta); in OpenAuthConn() 631 if (AuthOpenConn(&auth, reqId, &cb, isMeta) != SOFTBUS_OK) { in OpenAuthConn() 632 TRANS_LOGE(TRANS_CTRL, "open auth conn fail"); in OpenAuthConn() 647 TRANS_LOGE(TRANS_CTRL, "send auth data fail"); in SendVerifyP2pFailRsp() 678 TRANS_LOGE(TRANS_CTRL, "send auth dat in SendVerifyP2pRsp() [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | xfrm_policy.sh | 53 ip -net $ns xfrm state add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet 54 ip -net $ns xfrm state add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet
|
/kernel/linux/linux-5.10/drivers/net/wireless/intel/ipw2x00/ |
H A D | libipw.h | 804 struct libipw_auth * auth); 806 struct libipw_deauth * auth);
|
/kernel/linux/linux-5.10/drivers/net/wireless/ath/ath6kl/ |
H A D | core.h | 418 u8 auth; member 945 u8 keymgmt, u8 ucipher, u8 auth,
|
/kernel/linux/linux-5.10/net/ceph/ |
H A D | debugfs.c | 13 #include <linux/ceph/auth.h> 412 client->monc.auth->global_id); in ceph_debugfs_client_init()
|
/kernel/linux/linux-6.6/drivers/net/wireless/intel/ipw2x00/ |
H A D | libipw.h | 803 struct libipw_auth * auth); 805 struct libipw_deauth * auth);
|
/kernel/linux/linux-6.6/drivers/net/wireless/ath/ath6kl/ |
H A D | core.h | 418 u8 auth; member 945 u8 keymgmt, u8 ucipher, u8 auth,
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | xfrm_policy.sh | 53 ip -net $ns xfrm state add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet 54 ip -net $ns xfrm state add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet
|
/kernel/linux/linux-6.6/net/ipv6/ |
H A D | ah6.c | 711 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah6_init_state() 717 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah6_init_state()
|
/kernel/linux/linux-6.6/net/ceph/ |
H A D | debugfs.c | 13 #include <linux/ceph/auth.h> 412 client->monc.auth->global_id); in ceph_debugfs_client_init()
|
/kernel/linux/linux-6.6/net/ipv4/ |
H A D | ah4.c | 516 if (aalg_desc->uinfo.auth.icv_fullbits/8 != in ah_init_state() 522 ahp->icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8; in ah_init_state()
|
/third_party/node/lib/ |
H A D | _http_client.js | 314 if (options.auth && !this.getHeader('Authorization')) { 316 Buffer.from(options.auth).toString('base64'));
|