Home
last modified time | relevance | path

Searched refs:auth (Results 76 - 100 of 649) sorted by relevance

12345678910>>...26

/third_party/node/deps/npm/lib/commands/
H A Dtoken.js163 conf.auth = { token: creds.token }
165 conf.auth = {
171 } else if (creds.auth) {
172 const auth = Buffer.from(creds.auth, 'base64').toString().split(':', 2)
173 conf.auth = {
175 username: auth[0],
176 password: auth[1],
180 conf.auth = {}
184 conf.auth
[all...]
/third_party/node/benchmark/url/
H A Dlegacy-url-get-prop.js16 auth: obj.auth,
31 noDead.auth = obj.auth;
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp_backup.c151 static struct wpabuf * dpp_build_key_pkg(struct dpp_authentication *auth) in dpp_build_key_pkg() argument
155 priv_key = crypto_ec_key_get_ecprivate_key(auth->conf->csign, false); in dpp_build_key_pkg()
159 alg = dpp_build_key_alg(auth->conf->curve); in dpp_build_key_pkg()
162 attr = dpp_build_attribute(auth->conf); in dpp_build_key_pkg()
264 dpp_build_pw_recipient_info(struct dpp_authentication *auth, size_t hash_len, in dpp_build_pw_recipient_info() argument
279 key_len = auth->curve->hash_len; in dpp_build_pw_recipient_info()
281 res = dpp_hkdf_expand(key_len, auth->bk, key_len, in dpp_build_pw_recipient_info()
348 dpp_build_recipient_info(struct dpp_authentication *auth, size_t hash_len, in dpp_build_recipient_info() argument
364 pwri = dpp_build_pw_recipient_info(auth, hash_len, cont_enc_key); in dpp_build_recipient_info()
370 dpp_build_enc_cont_info(struct dpp_authentication *auth, size_ argument
450 dpp_build_enveloped_data(struct dpp_authentication *auth) dpp_build_enveloped_data() argument
1132 dpp_conf_resp_env_data(struct dpp_authentication *auth, const u8 *env_data, size_t env_data_len) dpp_conf_resp_env_data() argument
[all...]
/kernel/linux/linux-5.10/net/sunrpc/auth_gss/
H A Dauth_gss.c21 #include <linux/sunrpc/auth.h>
248 struct gss_auth *auth; member
284 struct net *net = gss_msg->auth->net; in gss_release_msg()
292 gss_put_auth(gss_msg->auth); in gss_release_msg()
298 __gss_find_upcall(struct rpc_pipe *pipe, kuid_t uid, const struct gss_auth *auth) in __gss_find_upcall() argument
304 if (pos->auth->service != auth->service) in __gss_find_upcall()
323 old = __gss_find_upcall(pipe, gss_msg->uid, gss_msg->auth); in gss_add_msg()
419 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg()
497 gss_msg->auth in gss_v1_upcall()
1016 struct rpc_auth * auth; gss_create_new() local
1124 gss_destroy(struct rpc_auth *auth) gss_destroy() argument
1357 gss_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) gss_lookup_cred() argument
1363 gss_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags, gfp_t gfp) gss_create_cred() argument
1388 gss_cred_init(struct rpc_auth *auth, struct rpc_cred *cred) gss_cred_init() argument
1595 struct rpc_auth *auth = oldcred->cr_auth; gss_renew_cred() local
1932 struct rpc_auth *auth = cred->cr_auth; gss_update_rslack() local
[all...]
/kernel/linux/linux-6.6/net/sunrpc/auth_gss/
H A Dauth_gss.c21 #include <linux/sunrpc/auth.h>
265 struct gss_auth *auth; member
301 struct net *net = gss_msg->auth->net; in gss_release_msg()
309 gss_put_auth(gss_msg->auth); in gss_release_msg()
315 __gss_find_upcall(struct rpc_pipe *pipe, kuid_t uid, const struct gss_auth *auth) in __gss_find_upcall() argument
321 if (pos->auth->service != auth->service) in __gss_find_upcall()
340 old = __gss_find_upcall(pipe, gss_msg->uid, gss_msg->auth); in gss_add_msg()
436 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg()
514 gss_msg->auth in gss_v1_upcall()
1033 struct rpc_auth * auth; gss_create_new() local
1143 gss_destroy(struct rpc_auth *auth) gss_destroy() argument
1375 gss_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) gss_lookup_cred() argument
1383 gss_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags, gfp_t gfp) gss_create_cred() argument
1408 gss_cred_init(struct rpc_auth *auth, struct rpc_cred *cred) gss_cred_init() argument
1615 struct rpc_auth *auth = oldcred->cr_auth; gss_renew_cred() local
1952 struct rpc_auth *auth = cred->cr_auth; gss_update_rslack() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Ddpp.h412 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr,
414 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth,
416 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr,
418 int dpp_notify_new_qr_code(struct dpp_authentication *auth,
429 struct dpp_authentication *auth,
431 void dpp_auth_deinit(struct dpp_authentication *auth);
433 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start,
435 int dpp_conf_resp_rx(struct dpp_authentication *auth,
437 enum dpp_status_error dpp_conf_result_rx(struct dpp_authentication *auth,
440 struct wpabuf * dpp_build_conf_result(struct dpp_authentication *auth,
[all...]
/kernel/linux/linux-5.10/drivers/target/iscsi/
H A Discsi_target_configfs.c342 struct iscsi_node_auth *auth = &nacl->node_auth; \
346 return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \
354 struct iscsi_node_auth *auth = &nacl->node_auth; \
358 if (count >= sizeof(auth->name)) \
360 snprintf(auth->name, sizeof(auth->name), "%s", page); \
361 if (!strncmp("NULL", auth->name, 4)) \
362 auth->naf_flags &= ~flags; \
364 auth->naf_flags |= flags; \
366 if ((auth
[all...]
/kernel/linux/linux-6.6/drivers/target/iscsi/
H A Discsi_target_configfs.c369 struct iscsi_node_auth *auth = &nacl->node_auth; \
373 return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \
381 struct iscsi_node_auth *auth = &nacl->node_auth; \
385 if (count >= sizeof(auth->name)) \
387 snprintf(auth->name, sizeof(auth->name), "%s", page); \
388 if (!strncmp("NULL", auth->name, 4)) \
389 auth->naf_flags &= ~flags; \
391 auth->naf_flags |= flags; \
393 if ((auth
[all...]
/third_party/node/test/parallel/
H A Dtest-url-format.js88 auth: 'isaacschlueter',
93 auth: 'atpass:foo@bar',
100 auth: 'atslash/@:/@',
142 auth: 'u:p',
258 // surrogate in auth
262 auth: '\uD83D\uDE00',
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/
H A Ddriver_privsep.c384 struct privsep_event_auth *auth; in wpa_driver_privsep_event_auth() local
387 if (len < sizeof(*auth)) in wpa_driver_privsep_event_auth()
389 auth = (struct privsep_event_auth *) buf; in wpa_driver_privsep_event_auth()
390 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth()
393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth()
394 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); in wpa_driver_privsep_event_auth()
395 data.auth in wpa_driver_privsep_event_auth()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/
H A Ddriver_privsep.c390 struct privsep_event_auth *auth; in wpa_driver_privsep_event_auth() local
393 if (len < sizeof(*auth)) in wpa_driver_privsep_event_auth()
395 auth = (struct privsep_event_auth *) buf; in wpa_driver_privsep_event_auth()
396 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth()
399 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth()
400 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); in wpa_driver_privsep_event_auth()
401 data.auth in wpa_driver_privsep_event_auth()
[all...]
/kernel/linux/linux-6.6/net/ceph/
H A Dauth.c34 pr_err("bad auth protocol %d\n", proto); in init_protocol()
183 pr_err("auth protocol '%s' building request failed: %d\n", in build_request()
196 * Handle auth message from monitor.
249 pr_err("auth protocol '%s' init failed: %d\n", in ceph_handle_auth_reply()
259 pr_err("auth protocol '%s' mauth authentication failed: %d\n", in ceph_handle_auth_reply()
279 pr_err("failed to decode auth msg\n"); in ceph_handle_auth_reply()
309 struct ceph_auth_handshake *auth, in __ceph_auth_get_authorizer()
316 if (force_new && auth->authorizer) { in __ceph_auth_get_authorizer()
317 ceph_auth_destroy_authorizer(auth->authorizer); in __ceph_auth_get_authorizer()
318 auth in __ceph_auth_get_authorizer()
308 __ceph_auth_get_authorizer(struct ceph_auth_client *ac, struct ceph_auth_handshake *auth, int peer_type, bool force_new, int *proto, int *pref_mode, int *fallb_mode) __ceph_auth_get_authorizer() argument
547 ceph_auth_get_authorizer(struct ceph_auth_client *ac, struct ceph_auth_handshake *auth, int peer_type, void *buf, int *buf_len) ceph_auth_get_authorizer() argument
577 ceph_auth_handle_svc_reply_more(struct ceph_auth_client *ac, struct ceph_auth_handshake *auth, void *reply, int reply_len, void *buf, int *buf_len) ceph_auth_handle_svc_reply_more() argument
601 ceph_auth_handle_svc_reply_done(struct ceph_auth_client *ac, struct ceph_auth_handshake *auth, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) ceph_auth_handle_svc_reply_done() argument
[all...]
H A Dauth_x.c11 #include <linux/ceph/auth.h>
507 struct ceph_x_authenticate *auth = (void *)(head + 1); in ceph_x_build_request() local
513 p = auth + 1; in ceph_x_build_request()
521 get_random_bytes(&auth->client_challenge, sizeof(u64)); in ceph_x_build_request()
522 blob->client_challenge = auth->client_challenge; in ceph_x_build_request()
529 auth->struct_v = 3; /* nautilus+ */ in ceph_x_build_request()
530 auth->key = 0; in ceph_x_build_request()
532 auth->key ^= *(__le64 *)u; in ceph_x_build_request()
534 xi->server_challenge, le64_to_cpu(auth->client_challenge), in ceph_x_build_request()
535 le64_to_cpu(auth in ceph_x_build_request()
734 ceph_x_create_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_x_create_authorizer() argument
769 ceph_x_update_authorizer( struct ceph_auth_client *ac, int peer_type, struct ceph_auth_handshake *auth) ceph_x_update_authorizer() argument
1027 ceph_x_sign_message(struct ceph_auth_handshake *auth, struct ceph_msg *msg) ceph_x_sign_message() argument
1046 ceph_x_check_message_signature(struct ceph_auth_handshake *auth, struct ceph_msg *msg) ceph_x_check_message_signature() argument
[all...]
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-policy2c/
H A Dminimal-secure-streams.c77 const lws_ss_auth_t *auth; in main() local
413 * The auth map in main()
416 auth = lws_ss_auth_get(context); in main()
417 if (auth) in main()
421 while (auth) { in main()
423 purify_csymbol(auth->name, buf, sizeof(buf))); in main()
429 printf("\t.name = \"%s\",\n", auth->name); in main()
430 printf("\t.type= \"%s\",\n", auth->type); in main()
431 printf("\t.streamtype = \"%s\",\n", auth->streamtype); in main()
432 printf("\t.blob_index = %d,\n", auth in main()
[all...]
/kernel/linux/linux-5.10/drivers/crypto/
H A Datmel-authenc.h31 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth);
32 int atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth,
36 struct atmel_sha_authenc_ctx *auth,
/kernel/linux/linux-6.6/drivers/crypto/
H A Datmel-authenc.h32 void atmel_sha_authenc_free(struct atmel_sha_authenc_ctx *auth);
33 int atmel_sha_authenc_setkey(struct atmel_sha_authenc_ctx *auth,
37 struct atmel_sha_authenc_ctx *auth,
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/
H A Dkey_manager.cpp172 int KeyManager::GenerateAndInstallUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) in GenerateAndInstallUserKey() argument
184 return GenerateAndInstallEl5Key(userId, dir, auth); in GenerateAndInstallUserKey()
190 if (elKey->StoreKey(auth) == false) { in GenerateAndInstallUserKey()
214 int KeyManager::GenerateAndInstallEl5Key(uint32_t userId, const std::string &dir, const UserAuth &auth) in GenerateAndInstallEl5Key() argument
235 saveESecretStatus[userId] = (!auth.secret.IsEmpty() && !auth.token.IsEmpty()); in GenerateAndInstallEl5Key()
237 if ((!auth.secret.IsEmpty() && !auth.token.IsEmpty()) && in GenerateAndInstallEl5Key()
238 !elKey->EncryptClassE(auth, saveESecretStatus[userId], userId, USER_ADD_AUTH)) { in GenerateAndInstallEl5Key()
245 if (!elKey->DecryptClassE(auth, saveESecretStatu in GenerateAndInstallEl5Key()
253 RestoreUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) RestoreUserKey() argument
642 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; GenerateUserKeyByType() local
871 UserAuth auth = { .token = tokenSecret.token, .secret = tokenSecret.newSecret, .secureUid = tokenSecret.secureUid }; UpdateESecret() local
902 UserAuth auth = { {}, userTokenSecret.oldSecret, userTokenSecret.secureUid }; UpdateCeEceSeceUserAuth() local
1220 UserAuth auth = { .token = token, .secret = secret }; UpdateCeEceSeceUserAuth() local
1245 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local
1340 UserAuth auth = {.token = token, .secret = secret}; UpdateCeEceSeceUserAuth() local
1437 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local
1897 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local
1931 UserAuth auth = { .token=token, .secret=secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dsme.c917 u.auth.variable)); in sme_external_auth_build_buf()
924 resp->u.auth.auth_alg = host_to_le16(WLAN_AUTH_SAE); in sme_external_auth_build_buf()
926 resp->u.auth.auth_transaction = host_to_le16(auth_transaction); in sme_external_auth_build_buf()
927 resp->u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS); in sme_external_auth_build_buf()
1207 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth); in sme_external_auth_mgmt_rx()
1216 if (le_to_host16(header->u.auth.auth_alg) == WLAN_AUTH_SAE) { in sme_external_auth_mgmt_rx()
1220 wpa_s, le_to_host16(header->u.auth.auth_transaction), in sme_external_auth_mgmt_rx()
1221 le_to_host16(header->u.auth.status_code), in sme_external_auth_mgmt_rx()
1222 header->u.auth.variable, in sme_external_auth_mgmt_rx()
1259 if (os_memcmp(wpa_s->pending_bssid, data->auth in sme_event_auth()
[all...]
/foundation/communication/ipc/ipc/native/src/core/source/
H A Dipc_process_skeleton.cpp1299 const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject()
1301 if ((auth->GetStubObject() == stub) && (auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject()
1302 (auth->GetRemoteTokenId() == tokenId) && (auth->GetRemoteDeviceId().compare(deviceId) == 0)) { in IsSameRemoteObject()
1310 const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject()
1312 if ((auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject()
1313 (auth in IsSameRemoteObject()
1298 IsSameRemoteObject(IRemoteObject *stub, int pid, int uid, uint32_t tokenId, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument
1309 IsSameRemoteObject(int pid, int uid, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument
[all...]
/foundation/communication/dsoftbus/tests/core/authentication/unittest/
H A Dauth_test.cpp108 * @tc.desc: auth commone test
142 * @tc.desc: hichain start auth test
181 * @tc.desc: add auth request test
195 * @tc.desc: get auth request test
210 * @tc.desc: auth session process devId data test
226 * @tc.desc: auth session post auth data test
242 * @tc.desc: auth session process auth data test
258 * @tc.desc: auth sessio
577 AuthManager auth = { 0 }; HWTEST_F() local
596 const AuthManager *auth = nullptr; HWTEST_F() local
929 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1090 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1180 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1216 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1249 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1276 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1299 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1343 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1370 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dsme.c532 u16 status_code = data->auth.status_code;
537 if (ieee802_11_parse_elems(data->auth.ies + ie_offset,
538 data->auth.ies_len - ie_offset,
1359 u.auth.variable));
1366 resp->u.auth.auth_alg = host_to_le16(WLAN_AUTH_SAE);
1368 resp->u.auth.auth_transaction = host_to_le16(auth_transaction);
1369 resp->u.auth.status_code = host_to_le16(status_code);
1989 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth);
1998 if (le_to_host16(header->u.auth.auth_alg) == WLAN_AUTH_SAE) {
2004 wpa_s, le_to_host16(header->u.auth
[all...]
/kernel/linux/linux-6.6/net/xfrm/
H A Dxfrm_algo.c179 .auth = {
199 .auth = {
219 .auth = {
239 .auth = {
258 .auth = {
277 .auth = {
297 .auth = {
316 .auth = {
336 .auth = {
349 .auth
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/
H A Dfscrypt_key_v2_mock.h39 virtual bool DecryptClassE(const UserAuth &auth, bool &isSupport,
41 virtual bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) = 0;
58 MOCK_METHOD5(DecryptClassE, bool(const UserAuth &auth, bool &isSupport,
60 MOCK_METHOD4(EncryptClassE, bool(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status));
/foundation/filemanagement/storage_service/services/storage_daemon/mock/
H A Dfscrypt_key_v2_mock.cpp101 bool FscryptKeyV2::DecryptClassE(const UserAuth &auth, bool &isSupport, in DecryptClassE() argument
107 return IFscryptKeyV2Moc::fscryptKeyV2Moc->DecryptClassE(auth, isSupport, eBufferStatue, user, status); in DecryptClassE()
110 bool FscryptKeyV2::EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) in EncryptClassE() argument
115 return IFscryptKeyV2Moc::fscryptKeyV2Moc->EncryptClassE(auth, isSupport, user, status); in EncryptClassE()
/kernel/linux/linux-5.10/drivers/gpu/drm/
H A Ddrm_auth.c66 struct drm_auth *auth = data; in drm_getmagic() local
76 auth->magic = file_priv->magic; in drm_getmagic()
79 DRM_DEBUG("%u\n", auth->magic); in drm_getmagic()
87 struct drm_auth *auth = data; in drm_authmagic() local
90 DRM_DEBUG("%u\n", auth->magic); in drm_authmagic()
93 file = idr_find(&file_priv->master->magic_map, auth->magic); in drm_authmagic()
96 idr_replace(&file_priv->master->magic_map, NULL, auth->magic); in drm_authmagic()

Completed in 26 milliseconds

12345678910>>...26