/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius.h | 268 int auth);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_ndis.c | 1717 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; in wpa_driver_ndis_get_wpa_capability() 1722 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; in wpa_driver_ndis_get_wpa_capability() 1740 "enc 0x%x auth 0x%x", in wpa_driver_ndis_get_wpa_capability() 1741 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); in wpa_driver_ndis_get_wpa_capability() 1777 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " in wpa_driver_ndis_get_capability() 1781 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d", in wpa_driver_ndis_get_capability() 1786 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; in wpa_driver_ndis_get_capability() 1789 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; in wpa_driver_ndis_get_capability() 1828 "enc 0x%x auth 0x%x", in wpa_driver_ndis_get_capability() 1829 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); in wpa_driver_ndis_get_capability() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_ndis.c | 1729 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; in wpa_driver_ndis_get_wpa_capability() 1734 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; in wpa_driver_ndis_get_wpa_capability() 1752 "enc 0x%x auth 0x%x", in wpa_driver_ndis_get_wpa_capability() 1753 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); in wpa_driver_ndis_get_wpa_capability() 1789 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " in wpa_driver_ndis_get_capability() 1793 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d", in wpa_driver_ndis_get_capability() 1798 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; in wpa_driver_ndis_get_capability() 1801 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; in wpa_driver_ndis_get_capability() 1840 "enc 0x%x auth 0x%x", in wpa_driver_ndis_get_capability() 1841 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); in wpa_driver_ndis_get_capability() [all...] |
/kernel/linux/linux-5.10/include/net/sctp/ |
H A D | structs.h | 47 #include <net/sctp/auth.h> /* We need auth specific structs */ 572 /* In case of auth enabled, this will point to the shkey */ 654 auth:1, /* IN: was auth'ed | OUT: needs auth */ member 721 /* pointer to the auth chunk for this packet */ 722 struct sctp_chunk *auth; member
|
/kernel/linux/linux-5.10/drivers/gpu/drm/ |
H A D | drm_ioc32.c | 255 int auth; /* Is client authenticated? */ member 282 c32.auth = client.auth; in compat_drm_getclient() 999 DRM_DEBUG("comm=\"%s\", pid=%d, dev=0x%lx, auth=%d, %s\n", in drm_compat_ioctl()
|
/kernel/linux/linux-6.6/include/net/sctp/ |
H A D | structs.h | 47 #include <net/sctp/auth.h> /* We need auth specific structs */ 578 /* In case of auth enabled, this will point to the shkey */ 660 auth:1, /* IN: was auth'ed | OUT: needs auth */ member 728 /* pointer to the auth chunk for this packet */ 729 struct sctp_chunk *auth; member
|
/kernel/linux/linux-6.6/drivers/gpu/drm/ |
H A D | drm_ioc32.c | 254 int auth; /* Is client authenticated? */ member 281 c32.auth = client.auth; in compat_drm_getclient() 990 drm_dbg_core(dev, "comm=\"%s\", pid=%d, dev=0x%lx, auth=%d, %s\n", in drm_compat_ioctl()
|
/third_party/curl/lib/ |
H A D | urldata.h | 501 in a CONNECT request with auth, so that 522 BIT(authneg); /* TRUE when the auth phase has started, which means 523 that we are creating a request with an auth header, 524 but it is not the final request in the auth 1019 struct negotiatedata negotiate; /* state data for host Negotiate auth */ 1020 struct negotiatedata proxyneg; /* state data for proxy Negotiate auth */ 1130 unsigned long proxyauthavail; /* what proxy auth types were announced */ 1131 unsigned long httpauthavail; /* what host auth types were announced */ 1228 struct auth { struct 1234 BIT(done); /* TRUE when the auth phas [all...] |
H A D | urlapi.c | 796 const char *auth, size_t authlen, in parse_authority() 808 uc = parse_hostname_login(u, auth, authlen, flags, &offset); in parse_authority() 812 result = Curl_dyn_addn(host, auth + offset, authlen - offset); in parse_authority() 795 parse_authority(struct Curl_URL *u, const char *auth, size_t authlen, unsigned int flags, struct dynbuf *host, bool has_scheme) parse_authority() argument
|
H A D | easy.c | 1059 memset(&data->state.authhost, 0, sizeof(struct auth)); in curl_easy_reset() 1060 memset(&data->state.authproxy, 0, sizeof(struct auth)); in curl_easy_reset()
|
/third_party/ntfs-3g/ntfsprogs/ |
H A D | ntfssecaudit.c | 505 1, /* auth count */ 518 2, /* auth count */ 532 1, /* auth count */ 962 u64 auth; in showsid() local 973 auth = get6h(attr,off+2); in showsid() 978 && (auth < 100)) { in showsid() 984 switch (auth) { in showsid() 1057 switch (auth) { in showsid() 1082 switch (auth) { in showsid() 1114 printf("%llx",(long long)auth); in showsid() 1169 u64 auth; showownership() local [all...] |
/kernel/linux/linux-5.10/net/ceph/ |
H A D | osd_client.c | 21 #include <linux/ceph/auth.h> 5531 struct ceph_auth_client *ac = osdc->client->monc.auth; in get_authorizer() 5532 struct ceph_auth_handshake *auth = &o->o_auth; in get_authorizer() local 5534 if (force_new && auth->authorizer) { in get_authorizer() 5535 ceph_auth_destroy_authorizer(auth->authorizer); in get_authorizer() 5536 auth->authorizer = NULL; in get_authorizer() 5538 if (!auth->authorizer) { in get_authorizer() 5540 auth); in get_authorizer() 5545 auth); in get_authorizer() 5551 return auth; in get_authorizer() 5595 struct ceph_auth_handshake *auth = &o->o_auth; osd_sign_message() local 5603 struct ceph_auth_handshake *auth = &o->o_auth; osd_check_message_signature() local [all...] |
H A D | ceph_common.c | 29 #include <linux/ceph/auth.h> 66 case CEPH_MSG_AUTH: return "auth"; in ceph_msg_type_name() 664 return client->monc.auth->global_id; in ceph_client_gid()
|
/kernel/linux/linux-5.10/fs/ubifs/ |
H A D | replay.c | 609 struct ubifs_auth_node *auth = snod->node; in authenticate_sleb() local 620 err = ubifs_check_hmac(c, auth->hmac, hmac); in authenticate_sleb()
|
/kernel/linux/linux-6.6/fs/ubifs/ |
H A D | replay.c | 609 struct ubifs_auth_node *auth = snod->node; in authenticate_sleb() local 620 err = ubifs_check_hmac(c, auth->hmac, hmac); in authenticate_sleb()
|
/kernel/linux/linux-6.6/tools/testing/selftests/netfilter/ |
H A D | nft_flowtable.sh | 643 ip -net $ns xfrm state add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet 644 ip -net $ns xfrm state add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet
|
/kernel/linux/linux-6.6/net/ceph/ |
H A D | ceph_common.c | 29 #include <linux/ceph/auth.h> 66 case CEPH_MSG_AUTH: return "auth"; in ceph_msg_type_name() 700 return client->monc.auth->global_id; in ceph_client_gid()
|
/third_party/python/Lib/ |
H A D | ftplib.py | 745 self.auth() 748 def auth(self): member in .FTP_TLS
|
/kernel/linux/linux-5.10/net/sctp/ |
H A D | sm_statefuns.c | 630 struct sctp_chunk auth; in sctp_auth_chunk_verify() local 647 auth.skb = chunk->auth_chunk; in sctp_auth_chunk_verify() 648 auth.asoc = chunk->asoc; in sctp_auth_chunk_verify() 649 auth.sctp_hdr = chunk->sctp_hdr; in sctp_auth_chunk_verify() 650 auth.chunk_hdr = (struct sctp_chunkhdr *) in sctp_auth_chunk_verify() 654 auth.transport = chunk->transport; in sctp_auth_chunk_verify() 656 return sctp_sf_authenticate(asoc, &auth) == SCTP_IERROR_NO_ERROR; in sctp_auth_chunk_verify() 3782 * the mechanism defined in [I-D.ietf-tsvwg-sctp-auth]. If this chunk in sctp_sf_do_asconf() 3784 * described in [I-D.ietf-tsvwg-sctp-auth]. in sctp_sf_do_asconf() 3787 (!net->sctp.addip_noauth && !chunk->auth)) in sctp_sf_do_asconf() [all...] |
/kernel/linux/linux-6.6/net/sctp/ |
H A D | sm_statefuns.c | 638 struct sctp_chunk auth; in sctp_auth_chunk_verify() local 655 auth.skb = chunk->auth_chunk; in sctp_auth_chunk_verify() 656 auth.asoc = chunk->asoc; in sctp_auth_chunk_verify() 657 auth.sctp_hdr = chunk->sctp_hdr; in sctp_auth_chunk_verify() 658 auth.chunk_hdr = (struct sctp_chunkhdr *) in sctp_auth_chunk_verify() 662 auth.transport = chunk->transport; in sctp_auth_chunk_verify() 664 return sctp_sf_authenticate(asoc, &auth) == SCTP_IERROR_NO_ERROR; in sctp_auth_chunk_verify() 3885 * the mechanism defined in [I-D.ietf-tsvwg-sctp-auth]. If this chunk in sctp_sf_do_asconf() 3887 * described in [I-D.ietf-tsvwg-sctp-auth]. in sctp_sf_do_asconf() 3890 (!net->sctp.addip_noauth && !chunk->auth)) in sctp_sf_do_asconf() [all...] |
/third_party/nghttp2/src/ |
H A D | http2.cc | 1655 auto auth = util::get_uri_field(uri.c_str(), u, UF_HOST); 1656 auto len = auth.size(); 1663 p = std::copy(std::begin(auth), std::end(auth), p);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wps_hostapd.c | 1921 const char *auth, const char *encr, const char *key) in hostapd_wps_config_ap() 1934 if (os_strncmp(auth, "OPEN", 4) == 0) in hostapd_wps_config_ap() 1937 else if (os_strncmp(auth, "WPAPSK", 6) == 0) in hostapd_wps_config_ap() 1940 else if (os_strncmp(auth, "WPA2PSK", 7) == 0) in hostapd_wps_config_ap() 1920 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) hostapd_wps_config_ap() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wps_hostapd.c | 1736 const char *auth, const char *encr, const char *key) in hostapd_wps_config_ap() 1749 if (os_strncmp(auth, "OPEN", 4) == 0) in hostapd_wps_config_ap() 1751 else if (os_strncmp(auth, "WPAPSK", 6) == 0) in hostapd_wps_config_ap() 1753 else if (os_strncmp(auth, "WPA2PSK", 7) == 0) in hostapd_wps_config_ap() 1735 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) hostapd_wps_config_ap() argument
|
/foundation/communication/dsoftbus/core/authentication/src/ |
H A D | auth_session_json.c | 303 AUTH_LOGI(AUTH_FSM, "use info->udid build normalize auth"); in GetUdidShortHash() 348 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); in GetEnhancedP2pAuthKey() local 349 if (auth == NULL) { in GetEnhancedP2pAuthKey() 356 if (GetLatestSessionKey(&auth->sessionKeyList, (AuthLinkType)authHandle.type, &index, &sessionKey) != SOFTBUS_OK) { in GetEnhancedP2pAuthKey() 358 DelDupAuthManager(auth); in GetEnhancedP2pAuthKey() 361 DelDupAuthManager(auth); in GetEnhancedP2pAuthKey() 465 AUTH_LOGE(AUTH_FSM, "force auth."); in PackNormalizedKey() 539 AUTH_LOGE(AUTH_FSM, "fast auth info error"); in ParseFastAuthValue() 806 AUTH_LOGE(AUTH_FSM, "add local auth state fail."); in PackDeviceJsonInfo() 1040 AUTH_LOGE(AUTH_FSM, "check ip fail, can't support auth"); in UnpackWifiInfoFromJsonObj() [all...] |
/kernel/linux/linux-5.10/block/ |
H A D | sed-opal.c | 1399 enum opal_uid auth, in start_generic_opal_session() 1407 if (key == NULL && auth != OPAL_ANYBODY_UID) in start_generic_opal_session() 1418 switch (auth) { in start_generic_opal_session() 1430 add_token_bytestring(&err, dev, opaluid[auth], in start_generic_opal_session() 1435 pr_debug("Cannot start Admin SP session with auth %d\n", auth); in start_generic_opal_session() 1398 start_generic_opal_session(struct opal_dev *dev, enum opal_uid auth, enum opal_uid sp_type, const char *key, u8 key_len) start_generic_opal_session() argument
|