Home
last modified time | relevance | path

Searched refs:auth (Results 401 - 425 of 665) sorted by relevance

1...<<11121314151617181920>>...27

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
H A Dradius.h268 int auth);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/
H A Ddriver_ndis.c1717 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; in wpa_driver_ndis_get_wpa_capability()
1722 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; in wpa_driver_ndis_get_wpa_capability()
1740 "enc 0x%x auth 0x%x", in wpa_driver_ndis_get_wpa_capability()
1741 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); in wpa_driver_ndis_get_wpa_capability()
1777 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " in wpa_driver_ndis_get_capability()
1781 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d", in wpa_driver_ndis_get_capability()
1786 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; in wpa_driver_ndis_get_capability()
1789 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; in wpa_driver_ndis_get_capability()
1828 "enc 0x%x auth 0x%x", in wpa_driver_ndis_get_capability()
1829 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); in wpa_driver_ndis_get_capability()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/
H A Ddriver_ndis.c1729 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; in wpa_driver_ndis_get_wpa_capability()
1734 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; in wpa_driver_ndis_get_wpa_capability()
1752 "enc 0x%x auth 0x%x", in wpa_driver_ndis_get_wpa_capability()
1753 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); in wpa_driver_ndis_get_wpa_capability()
1789 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " in wpa_driver_ndis_get_capability()
1793 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d", in wpa_driver_ndis_get_capability()
1798 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; in wpa_driver_ndis_get_capability()
1801 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; in wpa_driver_ndis_get_capability()
1840 "enc 0x%x auth 0x%x", in wpa_driver_ndis_get_capability()
1841 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); in wpa_driver_ndis_get_capability()
[all...]
/kernel/linux/linux-5.10/include/net/sctp/
H A Dstructs.h47 #include <net/sctp/auth.h> /* We need auth specific structs */
572 /* In case of auth enabled, this will point to the shkey */
654 auth:1, /* IN: was auth'ed | OUT: needs auth */ member
721 /* pointer to the auth chunk for this packet */
722 struct sctp_chunk *auth; member
/kernel/linux/linux-5.10/drivers/gpu/drm/
H A Ddrm_ioc32.c255 int auth; /* Is client authenticated? */ member
282 c32.auth = client.auth; in compat_drm_getclient()
999 DRM_DEBUG("comm=\"%s\", pid=%d, dev=0x%lx, auth=%d, %s\n", in drm_compat_ioctl()
/kernel/linux/linux-6.6/include/net/sctp/
H A Dstructs.h47 #include <net/sctp/auth.h> /* We need auth specific structs */
578 /* In case of auth enabled, this will point to the shkey */
660 auth:1, /* IN: was auth'ed | OUT: needs auth */ member
728 /* pointer to the auth chunk for this packet */
729 struct sctp_chunk *auth; member
/kernel/linux/linux-6.6/drivers/gpu/drm/
H A Ddrm_ioc32.c254 int auth; /* Is client authenticated? */ member
281 c32.auth = client.auth; in compat_drm_getclient()
990 drm_dbg_core(dev, "comm=\"%s\", pid=%d, dev=0x%lx, auth=%d, %s\n", in drm_compat_ioctl()
/third_party/curl/lib/
H A Durldata.h501 in a CONNECT request with auth, so that
522 BIT(authneg); /* TRUE when the auth phase has started, which means
523 that we are creating a request with an auth header,
524 but it is not the final request in the auth
1019 struct negotiatedata negotiate; /* state data for host Negotiate auth */
1020 struct negotiatedata proxyneg; /* state data for proxy Negotiate auth */
1130 unsigned long proxyauthavail; /* what proxy auth types were announced */
1131 unsigned long httpauthavail; /* what host auth types were announced */
1228 struct auth { struct
1234 BIT(done); /* TRUE when the auth phas
[all...]
H A Durlapi.c796 const char *auth, size_t authlen, in parse_authority()
808 uc = parse_hostname_login(u, auth, authlen, flags, &offset); in parse_authority()
812 result = Curl_dyn_addn(host, auth + offset, authlen - offset); in parse_authority()
795 parse_authority(struct Curl_URL *u, const char *auth, size_t authlen, unsigned int flags, struct dynbuf *host, bool has_scheme) parse_authority() argument
H A Deasy.c1059 memset(&data->state.authhost, 0, sizeof(struct auth)); in curl_easy_reset()
1060 memset(&data->state.authproxy, 0, sizeof(struct auth)); in curl_easy_reset()
/third_party/ntfs-3g/ntfsprogs/
H A Dntfssecaudit.c505 1, /* auth count */
518 2, /* auth count */
532 1, /* auth count */
962 u64 auth; in showsid() local
973 auth = get6h(attr,off+2); in showsid()
978 && (auth < 100)) { in showsid()
984 switch (auth) { in showsid()
1057 switch (auth) { in showsid()
1082 switch (auth) { in showsid()
1114 printf("%llx",(long long)auth); in showsid()
1169 u64 auth; showownership() local
[all...]
/kernel/linux/linux-5.10/net/ceph/
H A Dosd_client.c21 #include <linux/ceph/auth.h>
5531 struct ceph_auth_client *ac = osdc->client->monc.auth; in get_authorizer()
5532 struct ceph_auth_handshake *auth = &o->o_auth; in get_authorizer() local
5534 if (force_new && auth->authorizer) { in get_authorizer()
5535 ceph_auth_destroy_authorizer(auth->authorizer); in get_authorizer()
5536 auth->authorizer = NULL; in get_authorizer()
5538 if (!auth->authorizer) { in get_authorizer()
5540 auth); in get_authorizer()
5545 auth); in get_authorizer()
5551 return auth; in get_authorizer()
5595 struct ceph_auth_handshake *auth = &o->o_auth; osd_sign_message() local
5603 struct ceph_auth_handshake *auth = &o->o_auth; osd_check_message_signature() local
[all...]
H A Dceph_common.c29 #include <linux/ceph/auth.h>
66 case CEPH_MSG_AUTH: return "auth"; in ceph_msg_type_name()
664 return client->monc.auth->global_id; in ceph_client_gid()
/kernel/linux/linux-5.10/fs/ubifs/
H A Dreplay.c609 struct ubifs_auth_node *auth = snod->node; in authenticate_sleb() local
620 err = ubifs_check_hmac(c, auth->hmac, hmac); in authenticate_sleb()
/kernel/linux/linux-6.6/fs/ubifs/
H A Dreplay.c609 struct ubifs_auth_node *auth = snod->node; in authenticate_sleb() local
620 err = ubifs_check_hmac(c, auth->hmac, hmac); in authenticate_sleb()
/kernel/linux/linux-6.6/tools/testing/selftests/netfilter/
H A Dnft_flowtable.sh643 ip -net $ns xfrm state add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet
644 ip -net $ns xfrm state add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet
/kernel/linux/linux-6.6/net/ceph/
H A Dceph_common.c29 #include <linux/ceph/auth.h>
66 case CEPH_MSG_AUTH: return "auth"; in ceph_msg_type_name()
700 return client->monc.auth->global_id; in ceph_client_gid()
/third_party/python/Lib/
H A Dftplib.py745 self.auth()
748 def auth(self): member in .FTP_TLS
/kernel/linux/linux-5.10/net/sctp/
H A Dsm_statefuns.c630 struct sctp_chunk auth; in sctp_auth_chunk_verify() local
647 auth.skb = chunk->auth_chunk; in sctp_auth_chunk_verify()
648 auth.asoc = chunk->asoc; in sctp_auth_chunk_verify()
649 auth.sctp_hdr = chunk->sctp_hdr; in sctp_auth_chunk_verify()
650 auth.chunk_hdr = (struct sctp_chunkhdr *) in sctp_auth_chunk_verify()
654 auth.transport = chunk->transport; in sctp_auth_chunk_verify()
656 return sctp_sf_authenticate(asoc, &auth) == SCTP_IERROR_NO_ERROR; in sctp_auth_chunk_verify()
3782 * the mechanism defined in [I-D.ietf-tsvwg-sctp-auth]. If this chunk in sctp_sf_do_asconf()
3784 * described in [I-D.ietf-tsvwg-sctp-auth]. in sctp_sf_do_asconf()
3787 (!net->sctp.addip_noauth && !chunk->auth)) in sctp_sf_do_asconf()
[all...]
/kernel/linux/linux-6.6/net/sctp/
H A Dsm_statefuns.c638 struct sctp_chunk auth; in sctp_auth_chunk_verify() local
655 auth.skb = chunk->auth_chunk; in sctp_auth_chunk_verify()
656 auth.asoc = chunk->asoc; in sctp_auth_chunk_verify()
657 auth.sctp_hdr = chunk->sctp_hdr; in sctp_auth_chunk_verify()
658 auth.chunk_hdr = (struct sctp_chunkhdr *) in sctp_auth_chunk_verify()
662 auth.transport = chunk->transport; in sctp_auth_chunk_verify()
664 return sctp_sf_authenticate(asoc, &auth) == SCTP_IERROR_NO_ERROR; in sctp_auth_chunk_verify()
3885 * the mechanism defined in [I-D.ietf-tsvwg-sctp-auth]. If this chunk in sctp_sf_do_asconf()
3887 * described in [I-D.ietf-tsvwg-sctp-auth]. in sctp_sf_do_asconf()
3890 (!net->sctp.addip_noauth && !chunk->auth)) in sctp_sf_do_asconf()
[all...]
/third_party/nghttp2/src/
H A Dhttp2.cc1655 auto auth = util::get_uri_field(uri.c_str(), u, UF_HOST);
1656 auto len = auth.size();
1663 p = std::copy(std::begin(auth), std::end(auth), p);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dwps_hostapd.c1921 const char *auth, const char *encr, const char *key) in hostapd_wps_config_ap()
1934 if (os_strncmp(auth, "OPEN", 4) == 0) in hostapd_wps_config_ap()
1937 else if (os_strncmp(auth, "WPAPSK", 6) == 0) in hostapd_wps_config_ap()
1940 else if (os_strncmp(auth, "WPA2PSK", 7) == 0) in hostapd_wps_config_ap()
1920 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) hostapd_wps_config_ap() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwps_hostapd.c1736 const char *auth, const char *encr, const char *key) in hostapd_wps_config_ap()
1749 if (os_strncmp(auth, "OPEN", 4) == 0) in hostapd_wps_config_ap()
1751 else if (os_strncmp(auth, "WPAPSK", 6) == 0) in hostapd_wps_config_ap()
1753 else if (os_strncmp(auth, "WPA2PSK", 7) == 0) in hostapd_wps_config_ap()
1735 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) hostapd_wps_config_ap() argument
/foundation/communication/dsoftbus/core/authentication/src/
H A Dauth_session_json.c303 AUTH_LOGI(AUTH_FSM, "use info->udid build normalize auth"); in GetUdidShortHash()
348 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); in GetEnhancedP2pAuthKey() local
349 if (auth == NULL) { in GetEnhancedP2pAuthKey()
356 if (GetLatestSessionKey(&auth->sessionKeyList, (AuthLinkType)authHandle.type, &index, &sessionKey) != SOFTBUS_OK) { in GetEnhancedP2pAuthKey()
358 DelDupAuthManager(auth); in GetEnhancedP2pAuthKey()
361 DelDupAuthManager(auth); in GetEnhancedP2pAuthKey()
465 AUTH_LOGE(AUTH_FSM, "force auth."); in PackNormalizedKey()
539 AUTH_LOGE(AUTH_FSM, "fast auth info error"); in ParseFastAuthValue()
806 AUTH_LOGE(AUTH_FSM, "add local auth state fail."); in PackDeviceJsonInfo()
1040 AUTH_LOGE(AUTH_FSM, "check ip fail, can't support auth"); in UnpackWifiInfoFromJsonObj()
[all...]
/kernel/linux/linux-5.10/block/
H A Dsed-opal.c1399 enum opal_uid auth, in start_generic_opal_session()
1407 if (key == NULL && auth != OPAL_ANYBODY_UID) in start_generic_opal_session()
1418 switch (auth) { in start_generic_opal_session()
1430 add_token_bytestring(&err, dev, opaluid[auth], in start_generic_opal_session()
1435 pr_debug("Cannot start Admin SP session with auth %d\n", auth); in start_generic_opal_session()
1398 start_generic_opal_session(struct opal_dev *dev, enum opal_uid auth, enum opal_uid sp_type, const char *key, u8 key_len) start_generic_opal_session() argument

Completed in 66 milliseconds

1...<<11121314151617181920>>...27