/third_party/node/deps/npm/lib/commands/ |
H A D | token.js | 163 conf.auth = { token: creds.token } 165 conf.auth = { 171 } else if (creds.auth) { 172 const auth = Buffer.from(creds.auth, 'base64').toString().split(':', 2) 173 conf.auth = { 175 username: auth[0], 176 password: auth[1], 180 conf.auth = {} 184 conf.auth [all...] |
/third_party/node/benchmark/url/ |
H A D | legacy-url-get-prop.js | 16 auth: obj.auth, 31 noDead.auth = obj.auth;
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_backup.c | 151 static struct wpabuf * dpp_build_key_pkg(struct dpp_authentication *auth) in dpp_build_key_pkg() argument 155 priv_key = crypto_ec_key_get_ecprivate_key(auth->conf->csign, false); in dpp_build_key_pkg() 159 alg = dpp_build_key_alg(auth->conf->curve); in dpp_build_key_pkg() 162 attr = dpp_build_attribute(auth->conf); in dpp_build_key_pkg() 264 dpp_build_pw_recipient_info(struct dpp_authentication *auth, size_t hash_len, in dpp_build_pw_recipient_info() argument 279 key_len = auth->curve->hash_len; in dpp_build_pw_recipient_info() 281 res = dpp_hkdf_expand(key_len, auth->bk, key_len, in dpp_build_pw_recipient_info() 348 dpp_build_recipient_info(struct dpp_authentication *auth, size_t hash_len, in dpp_build_recipient_info() argument 364 pwri = dpp_build_pw_recipient_info(auth, hash_len, cont_enc_key); in dpp_build_recipient_info() 370 dpp_build_enc_cont_info(struct dpp_authentication *auth, size_ argument 450 dpp_build_enveloped_data(struct dpp_authentication *auth) dpp_build_enveloped_data() argument 1132 dpp_conf_resp_env_data(struct dpp_authentication *auth, const u8 *env_data, size_t env_data_len) dpp_conf_resp_env_data() argument [all...] |
/kernel/linux/linux-5.10/net/sunrpc/auth_gss/ |
H A D | auth_gss.c | 21 #include <linux/sunrpc/auth.h> 248 struct gss_auth *auth; member 284 struct net *net = gss_msg->auth->net; in gss_release_msg() 292 gss_put_auth(gss_msg->auth); in gss_release_msg() 298 __gss_find_upcall(struct rpc_pipe *pipe, kuid_t uid, const struct gss_auth *auth) in __gss_find_upcall() argument 304 if (pos->auth->service != auth->service) in __gss_find_upcall() 323 old = __gss_find_upcall(pipe, gss_msg->uid, gss_msg->auth); in gss_add_msg() 419 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() 497 gss_msg->auth in gss_v1_upcall() 1016 struct rpc_auth * auth; gss_create_new() local 1124 gss_destroy(struct rpc_auth *auth) gss_destroy() argument 1357 gss_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) gss_lookup_cred() argument 1363 gss_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags, gfp_t gfp) gss_create_cred() argument 1388 gss_cred_init(struct rpc_auth *auth, struct rpc_cred *cred) gss_cred_init() argument 1595 struct rpc_auth *auth = oldcred->cr_auth; gss_renew_cred() local 1932 struct rpc_auth *auth = cred->cr_auth; gss_update_rslack() local [all...] |
/kernel/linux/linux-6.6/net/sunrpc/auth_gss/ |
H A D | auth_gss.c | 21 #include <linux/sunrpc/auth.h> 265 struct gss_auth *auth; member 301 struct net *net = gss_msg->auth->net; in gss_release_msg() 309 gss_put_auth(gss_msg->auth); in gss_release_msg() 315 __gss_find_upcall(struct rpc_pipe *pipe, kuid_t uid, const struct gss_auth *auth) in __gss_find_upcall() argument 321 if (pos->auth->service != auth->service) in __gss_find_upcall() 340 old = __gss_find_upcall(pipe, gss_msg->uid, gss_msg->auth); in gss_add_msg() 436 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() 514 gss_msg->auth in gss_v1_upcall() 1033 struct rpc_auth * auth; gss_create_new() local 1143 gss_destroy(struct rpc_auth *auth) gss_destroy() argument 1375 gss_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) gss_lookup_cred() argument 1383 gss_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags, gfp_t gfp) gss_create_cred() argument 1408 gss_cred_init(struct rpc_auth *auth, struct rpc_cred *cred) gss_cred_init() argument 1615 struct rpc_auth *auth = oldcred->cr_auth; gss_renew_cred() local 1952 struct rpc_auth *auth = cred->cr_auth; gss_update_rslack() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | dpp.h | 412 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, 414 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth, 416 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, 418 int dpp_notify_new_qr_code(struct dpp_authentication *auth, 429 struct dpp_authentication *auth, 431 void dpp_auth_deinit(struct dpp_authentication *auth); 433 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, 435 int dpp_conf_resp_rx(struct dpp_authentication *auth, 437 enum dpp_status_error dpp_conf_result_rx(struct dpp_authentication *auth, 440 struct wpabuf * dpp_build_conf_result(struct dpp_authentication *auth, [all...] |
/kernel/linux/linux-5.10/drivers/target/iscsi/ |
H A D | iscsi_target_configfs.c | 342 struct iscsi_node_auth *auth = &nacl->node_auth; \ 346 return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \ 354 struct iscsi_node_auth *auth = &nacl->node_auth; \ 358 if (count >= sizeof(auth->name)) \ 360 snprintf(auth->name, sizeof(auth->name), "%s", page); \ 361 if (!strncmp("NULL", auth->name, 4)) \ 362 auth->naf_flags &= ~flags; \ 364 auth->naf_flags |= flags; \ 366 if ((auth [all...] |
/kernel/linux/linux-6.6/drivers/target/iscsi/ |
H A D | iscsi_target_configfs.c | 369 struct iscsi_node_auth *auth = &nacl->node_auth; \ 373 return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \ 381 struct iscsi_node_auth *auth = &nacl->node_auth; \ 385 if (count >= sizeof(auth->name)) \ 387 snprintf(auth->name, sizeof(auth->name), "%s", page); \ 388 if (!strncmp("NULL", auth->name, 4)) \ 389 auth->naf_flags &= ~flags; \ 391 auth->naf_flags |= flags; \ 393 if ((auth [all...] |
/third_party/node/test/parallel/ |
H A D | test-url-format.js | 88 auth: 'isaacschlueter', 93 auth: 'atpass:foo@bar', 100 auth: 'atslash/@:/@', 142 auth: 'u:p', 258 // surrogate in auth 262 auth: '\uD83D\uDE00',
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_privsep.c | 384 struct privsep_event_auth *auth; in wpa_driver_privsep_event_auth() local 387 if (len < sizeof(*auth)) in wpa_driver_privsep_event_auth() 389 auth = (struct privsep_event_auth *) buf; in wpa_driver_privsep_event_auth() 390 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth() 393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth() 394 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); in wpa_driver_privsep_event_auth() 395 data.auth in wpa_driver_privsep_event_auth() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_privsep.c | 390 struct privsep_event_auth *auth; in wpa_driver_privsep_event_auth() local 393 if (len < sizeof(*auth)) in wpa_driver_privsep_event_auth() 395 auth = (struct privsep_event_auth *) buf; in wpa_driver_privsep_event_auth() 396 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth() 399 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth() 400 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); in wpa_driver_privsep_event_auth() 401 data.auth in wpa_driver_privsep_event_auth() [all...] |
/kernel/linux/linux-6.6/net/ceph/ |
H A D | auth.c | 34 pr_err("bad auth protocol %d\n", proto); in init_protocol() 183 pr_err("auth protocol '%s' building request failed: %d\n", in build_request() 196 * Handle auth message from monitor. 249 pr_err("auth protocol '%s' init failed: %d\n", in ceph_handle_auth_reply() 259 pr_err("auth protocol '%s' mauth authentication failed: %d\n", in ceph_handle_auth_reply() 279 pr_err("failed to decode auth msg\n"); in ceph_handle_auth_reply() 309 struct ceph_auth_handshake *auth, in __ceph_auth_get_authorizer() 316 if (force_new && auth->authorizer) { in __ceph_auth_get_authorizer() 317 ceph_auth_destroy_authorizer(auth->authorizer); in __ceph_auth_get_authorizer() 318 auth in __ceph_auth_get_authorizer() 308 __ceph_auth_get_authorizer(struct ceph_auth_client *ac, struct ceph_auth_handshake *auth, int peer_type, bool force_new, int *proto, int *pref_mode, int *fallb_mode) __ceph_auth_get_authorizer() argument 547 ceph_auth_get_authorizer(struct ceph_auth_client *ac, struct ceph_auth_handshake *auth, int peer_type, void *buf, int *buf_len) ceph_auth_get_authorizer() argument 577 ceph_auth_handle_svc_reply_more(struct ceph_auth_client *ac, struct ceph_auth_handshake *auth, void *reply, int reply_len, void *buf, int *buf_len) ceph_auth_handle_svc_reply_more() argument 601 ceph_auth_handle_svc_reply_done(struct ceph_auth_client *ac, struct ceph_auth_handshake *auth, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) ceph_auth_handle_svc_reply_done() argument [all...] |
H A D | auth_x.c | 11 #include <linux/ceph/auth.h> 507 struct ceph_x_authenticate *auth = (void *)(head + 1); in ceph_x_build_request() local 513 p = auth + 1; in ceph_x_build_request() 521 get_random_bytes(&auth->client_challenge, sizeof(u64)); in ceph_x_build_request() 522 blob->client_challenge = auth->client_challenge; in ceph_x_build_request() 529 auth->struct_v = 3; /* nautilus+ */ in ceph_x_build_request() 530 auth->key = 0; in ceph_x_build_request() 532 auth->key ^= *(__le64 *)u; in ceph_x_build_request() 534 xi->server_challenge, le64_to_cpu(auth->client_challenge), in ceph_x_build_request() 535 le64_to_cpu(auth in ceph_x_build_request() 734 ceph_x_create_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_x_create_authorizer() argument 769 ceph_x_update_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_x_update_authorizer() argument 1027 ceph_x_sign_message(struct ceph_auth_handshake *auth, struct ceph_msg *msg) ceph_x_sign_message() argument 1046 ceph_x_check_message_signature(struct ceph_auth_handshake *auth, struct ceph_msg *msg) ceph_x_check_message_signature() argument [all...] |
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-policy2c/ |
H A D | minimal-secure-streams.c | 77 const lws_ss_auth_t *auth; in main() local 413 * The auth map in main() 416 auth = lws_ss_auth_get(context); in main() 417 if (auth) in main() 421 while (auth) { in main() 423 purify_csymbol(auth->name, buf, sizeof(buf))); in main() 429 printf("\t.name = \"%s\",\n", auth->name); in main() 430 printf("\t.type= \"%s\",\n", auth->type); in main() 431 printf("\t.streamtype = \"%s\",\n", auth->streamtype); in main() 432 printf("\t.blob_index = %d,\n", auth in main() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | atmel-authenc.h | 31 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth); 32 int atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, 36 struct atmel_sha_authenc_ctx *auth,
|
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | atmel-authenc.h | 32 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth); 33 int atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth, 37 struct atmel_sha_authenc_ctx *auth,
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | key_manager.cpp | 172 int KeyManager::GenerateAndInstallUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) in GenerateAndInstallUserKey() argument 184 return GenerateAndInstallEl5Key(userId, dir, auth); in GenerateAndInstallUserKey() 190 if (elKey->StoreKey(auth) == false) { in GenerateAndInstallUserKey() 214 int KeyManager::GenerateAndInstallEl5Key(uint32_t userId, const std::string &dir, const UserAuth &auth) in GenerateAndInstallEl5Key() argument 235 saveESecretStatus[userId] = (!auth.secret.IsEmpty() && !auth.token.IsEmpty()); in GenerateAndInstallEl5Key() 237 if ((!auth.secret.IsEmpty() && !auth.token.IsEmpty()) && in GenerateAndInstallEl5Key() 238 !elKey->EncryptClassE(auth, saveESecretStatus[userId], userId, USER_ADD_AUTH)) { in GenerateAndInstallEl5Key() 245 if (!elKey->DecryptClassE(auth, saveESecretStatu in GenerateAndInstallEl5Key() 253 RestoreUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) RestoreUserKey() argument 642 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; GenerateUserKeyByType() local 871 UserAuth auth = { .token = tokenSecret.token, .secret = tokenSecret.newSecret, .secureUid = tokenSecret.secureUid }; UpdateESecret() local 902 UserAuth auth = { {}, userTokenSecret.oldSecret, userTokenSecret.secureUid }; UpdateCeEceSeceUserAuth() local 1220 UserAuth auth = { .token = token, .secret = secret }; UpdateCeEceSeceUserAuth() local 1245 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local 1340 UserAuth auth = {.token = token, .secret = secret}; UpdateCeEceSeceUserAuth() local 1437 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local 1897 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local 1931 UserAuth auth = { .token=token, .secret=secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | sme.c | 917 u.auth.variable)); in sme_external_auth_build_buf() 924 resp->u.auth.auth_alg = host_to_le16(WLAN_AUTH_SAE); in sme_external_auth_build_buf() 926 resp->u.auth.auth_transaction = host_to_le16(auth_transaction); in sme_external_auth_build_buf() 927 resp->u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS); in sme_external_auth_build_buf() 1207 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth); in sme_external_auth_mgmt_rx() 1216 if (le_to_host16(header->u.auth.auth_alg) == WLAN_AUTH_SAE) { in sme_external_auth_mgmt_rx() 1220 wpa_s, le_to_host16(header->u.auth.auth_transaction), in sme_external_auth_mgmt_rx() 1221 le_to_host16(header->u.auth.status_code), in sme_external_auth_mgmt_rx() 1222 header->u.auth.variable, in sme_external_auth_mgmt_rx() 1259 if (os_memcmp(wpa_s->pending_bssid, data->auth in sme_event_auth() [all...] |
/foundation/communication/ipc/ipc/native/src/core/source/ |
H A D | ipc_process_skeleton.cpp | 1299 const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject() 1301 if ((auth->GetStubObject() == stub) && (auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject() 1302 (auth->GetRemoteTokenId() == tokenId) && (auth->GetRemoteDeviceId().compare(deviceId) == 0)) { in IsSameRemoteObject() 1310 const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject() 1312 if ((auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject() 1313 (auth in IsSameRemoteObject() 1298 IsSameRemoteObject(IRemoteObject *stub, int pid, int uid, uint32_t tokenId, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument 1309 IsSameRemoteObject(int pid, int uid, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument [all...] |
/foundation/communication/dsoftbus/tests/core/authentication/unittest/ |
H A D | auth_test.cpp | 108 * @tc.desc: auth commone test 142 * @tc.desc: hichain start auth test 181 * @tc.desc: add auth request test 195 * @tc.desc: get auth request test 210 * @tc.desc: auth session process devId data test 226 * @tc.desc: auth session post auth data test 242 * @tc.desc: auth session process auth data test 258 * @tc.desc: auth sessio 577 AuthManager auth = { 0 }; HWTEST_F() local 596 const AuthManager *auth = nullptr; HWTEST_F() local 929 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1090 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1180 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1216 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1249 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1276 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1299 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1343 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1370 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | sme.c | 532 u16 status_code = data->auth.status_code; 537 if (ieee802_11_parse_elems(data->auth.ies + ie_offset, 538 data->auth.ies_len - ie_offset, 1359 u.auth.variable)); 1366 resp->u.auth.auth_alg = host_to_le16(WLAN_AUTH_SAE); 1368 resp->u.auth.auth_transaction = host_to_le16(auth_transaction); 1369 resp->u.auth.status_code = host_to_le16(status_code); 1989 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth); 1998 if (le_to_host16(header->u.auth.auth_alg) == WLAN_AUTH_SAE) { 2004 wpa_s, le_to_host16(header->u.auth [all...] |
/kernel/linux/linux-6.6/net/xfrm/ |
H A D | xfrm_algo.c | 179 .auth = { 199 .auth = { 219 .auth = { 239 .auth = { 258 .auth = { 277 .auth = { 297 .auth = { 316 .auth = { 336 .auth = { 349 .auth [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/ |
H A D | fscrypt_key_v2_mock.h | 39 virtual bool DecryptClassE(const UserAuth &auth, bool &isSupport, 41 virtual bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) = 0; 58 MOCK_METHOD5(DecryptClassE, bool(const UserAuth &auth, bool &isSupport, 60 MOCK_METHOD4(EncryptClassE, bool(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status));
|
/foundation/filemanagement/storage_service/services/storage_daemon/mock/ |
H A D | fscrypt_key_v2_mock.cpp | 101 bool FscryptKeyV2::DecryptClassE(const UserAuth &auth, bool &isSupport, in DecryptClassE() argument 107 return IFscryptKeyV2Moc::fscryptKeyV2Moc->DecryptClassE(auth, isSupport, eBufferStatue, user, status); in DecryptClassE() 110 bool FscryptKeyV2::EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) in EncryptClassE() argument 115 return IFscryptKeyV2Moc::fscryptKeyV2Moc->EncryptClassE(auth, isSupport, user, status); in EncryptClassE()
|
/kernel/linux/linux-5.10/drivers/gpu/drm/ |
H A D | drm_auth.c | 66 struct drm_auth *auth = data; in drm_getmagic() local 76 auth->magic = file_priv->magic; in drm_getmagic() 79 DRM_DEBUG("%u\n", auth->magic); in drm_getmagic() 87 struct drm_auth *auth = data; in drm_authmagic() local 90 DRM_DEBUG("%u\n", auth->magic); in drm_authmagic() 93 file = idr_find(&file_priv->master->magic_map, auth->magic); in drm_authmagic() 96 idr_replace(&file_priv->master->magic_map, NULL, auth->magic); in drm_authmagic()
|