PageRenderTime 563ms queryTime 37ms sortTime 8ms getByIdsTime 431ms findMatchingLines 27ms

100+ results results for 'auth_key' (563 ms)

Not the results you expected?
STADExternalIf.h https://github.com/CyanogenDefy/android_hardware_ti_wlan.git | C Header | 384 lines
                    
80/*Indicates that key management type is WPS (bit field)*/
                    
81#define TI_AUTH_KEY_MGMT_WPS				0x80
                    
82
                    
                
cryptodev-vhost-user.c https://github.com/mstsirkin/qemu.git | C | 377 lines
                    
229    backend->conf.max_cipher_key_len = VHOST_USER_MAX_CIPHER_KEY_LEN;
                    
230    backend->conf.max_auth_key_len = VHOST_USER_MAX_AUTH_KEY_LEN;
                    
231}
                    
                
snmpusm.h https://gitlab.com/envieidoc/advancedtomato2 | C Header | 238 lines
                    
40        size_t          usr_auth_protocol_length;
                    
41        u_char         *usr_auth_key;
                    
42        size_t          usr_auth_key_length;
                    
109
                    
110    int             usm_set_usmStateReference_auth_key(struct
                    
111                                                       usmStateReference
                    
112                                                       *ref,
                    
113                                                       u_char * auth_key,
                    
114                                                       size_t
                    
114                                                       size_t
                    
115                                                       auth_key_len);
                    
116
                    
                
remote.c https://bitbucket.org/__wp__/mb-linux-msli.git | C | 361 lines
                    
54{
                    
55	struct auth_key *key = (struct auth_key *)0;
                    
56	isc_result_t status;
                    
57
                    
58	status = omapi_auth_key_new (&key, MDL);
                    
59	if (status != ISC_R_SUCCESS)
                    
63	if (!key -> name) {
                    
64		omapi_auth_key_dereference (&key, MDL);
                    
65		return ISC_R_NOMEMORY;
                    
75		if (!key -> algorithm) {
                    
76			omapi_auth_key_dereference (&key, MDL);
                    
77			return ISC_R_NOMEMORY;
                    
83		if (!key -> algorithm) {
                    
84			omapi_auth_key_dereference (&key, MDL);
                    
85			return ISC_R_NOMEMORY;
                    
                
client.py https://github.com/jkoelker/nova.git | Python | 291 lines
                    
74
                    
75    def __init__(self, auth_user, auth_key, auth_uri):
                    
76        super(TestOpenStackClient, self).__init__()
                    
78        self.auth_user = auth_user
                    
79        self.auth_key = auth_key
                    
80        self.auth_uri = auth_uri
                    
118        headers = {'X-Auth-User': self.auth_user,
                    
119                   'X-Auth-Key': self.auth_key,
                    
120                   'X-Auth-Project-Id': self.project_id}
                    
                
client.py https://github.com/santhoshkumartw/openstack-nova.git | Python | 263 lines
                    
65
                    
66    def __init__(self, auth_user, auth_key, auth_uri):
                    
67        super(TestOpenStackClient, self).__init__()
                    
69        self.auth_user = auth_user
                    
70        self.auth_key = auth_key
                    
71        self.auth_uri = auth_uri
                    
107        headers = {'X-Auth-User': self.auth_user,
                    
108                   'X-Auth-Key': self.auth_key}
                    
109        response = self.request(auth_uri,
                    
                
create_conn.py https://gitlab.com/pineiden/gnc | Python | 329 lines
                    
16
                    
17from .auth_keys import read_authorized_keys
                    
18
                    
                
wpa.h https://bitbucket.org/gideonx/bms-jb-3.4.y.git | C Header | 214 lines
                    
99	wpa_suite_t list[1];
                    
100} BWL_POST_PACKED_STRUCT wpa_suite_ucast_t, wpa_suite_auth_key_mgmt_t;
                    
101#define WPA_IE_SUITE_COUNT_LEN	2
                    
                
qcryptohw_40.h https://bitbucket.org/androidarmv6/android_kernel_samsung_msm.git | C Header | 316 lines
                    
65#define CRYPTO_AUTH_KEY3_REG			0x41C
                    
66#define CRYPTO_AUTH_KEY4_REG			0x420
                    
67#define CRYPTO_AUTH_KEY5_REG			0x424
                    
67#define CRYPTO_AUTH_KEY5_REG			0x424
                    
68#define CRYPTO_AUTH_KEY6_REG			0x428
                    
69#define CRYPTO_AUTH_KEY7_REG			0x42C
                    
71#define CRYPTO_AUTH_KEY9_REG			0x434
                    
72#define CRYPTO_AUTH_KEY10_REG			0x438
                    
73#define CRYPTO_AUTH_KEY11_REG			0x43C
                    
238#define CRYPTO_AUTH_KEY_SIZE			3
                    
239#define CRYPTO_AUTH_KEY_SIZE_MASK		(0x7 << CRYPTO_AUTH_KEY_SIZE)
                    
240#define CRYPTO_AUTH_KEY_SZ_AES128		0
                    
240#define CRYPTO_AUTH_KEY_SZ_AES128		0
                    
241#define CRYPTO_AUTH_KEY_SZ_AES256		2
                    
242
                    
                
Rbac.class.php https://gitlab.com/fangfangchen/xianpipa | PHP | 285 lines
                    
20// USER_AUTH_TYPE 认证类型
                    
21// USER_AUTH_KEY 认证识别号
                    
22// REQUIRE_AUTH_MODULE  需要认证模块
                    
84    static function saveAccessList($authId=null) {
                    
85        if(null===$authId)   $authId = $_SESSION[C('USER_AUTH_KEY')];
                    
86        // 如果使用普通权限模式,保存当前用户的访问权限列表
                    
87        // 对管理员开发所有权限
                    
88        if(C('USER_AUTH_TYPE') !=2 && !$_SESSION[C('ADMIN_AUTH_KEY')] )
                    
89            $_SESSION['_ACCESS_LIST']	=	self::getAccessList($authId);
                    
94	static function getRecordAccessList($authId=null,$module='') {
                    
95        if(null===$authId)   $authId = $_SESSION[C('USER_AUTH_KEY')];
                    
96        if(empty($module))  $module	=	CONTROLLER_NAME;
                    
141            //检查认证识别号
                    
142            if(!$_SESSION[C('USER_AUTH_KEY')]) {
                    
143                if(C('GUEST_AUTH_ON')) {
                    
                
model.py https://gitlab.com/doublebits/osf.io | Python | 397 lines
                    
69            self._client = self._get_client({
                    
70                'access_token': self.account.oauth_key,
                    
71                'refresh_token': self.account.refresh_token,
                    
                
hs_descriptor.h https://gitlab.com/ahf/tor | C Header | 284 lines
                    
100   * the blinded key and in turn signs it. */
                    
101  tor_cert_t *auth_key_cert;
                    
102
                    
                
authentication_mixin.rb https://gitlab.com/aljesusg/manageiqtest | Ruby | 318 lines
                    
65  def authentication_key(type = nil)
                    
66    authentication_component(type, :auth_key)
                    
67  end
                    
69  def authentication_token(type = nil)
                    
70    authentication_component(type, :auth_key)
                    
71  end
                    
141      unless value.key?(:userid) && value[:userid].blank?
                    
142        current[:new] = {:user => value[:userid], :password => value[:password], :auth_key => value[:auth_key]}
                    
143      end
                    
143      end
                    
144      current[:old] = {:user => cred.userid, :password => cred.password, :auth_key => cred.auth_key} if cred
                    
145
                    
177      cred.password = value[:password]
                    
178      cred.auth_key = value[:auth_key]
                    
179
                    
                
bfd_main.h https://gitlab.com/x1046882802/flexiroutervpp | C Header | 473 lines
                    
55  bfd_auth_type_e auth_type;
                    
56} bfd_auth_key_t;
                    
57
                    
204    /** current key in use */
                    
205    bfd_auth_key_t *curr_key;
                    
206
                    
210     */
                    
211    bfd_auth_key_t *next_key;
                    
212
                    
312  /** pool of authentication keys */
                    
313  bfd_auth_key_t *auth_keys;
                    
314
                    
314
                    
315  /** hashmap - index in pool auth_keys by conf_key_id */
                    
316  u32 *auth_key_by_conf_key_id;
                    
                
sfsauth_prot.x git://github.com/maxtaco/sfslite.git | Alex | 315 lines
                    
82
                    
83enum sfsauth_keyhalf_type {
                    
84  SFSAUTH_KEYHALF_NONE = 0,
                    
84  SFSAUTH_KEYHALF_NONE = 0,
                    
85  SFSAUTH_KEYHALF_PRIV = 1,
                    
86  SFSAUTH_KEYHALF_DELTA = 2,
                    
86  SFSAUTH_KEYHALF_DELTA = 2,
                    
87  SFSAUTH_KEYHALF_FLAG = 3
                    
88};
                    
89
                    
90union sfsauth_keyhalf switch (sfsauth_keyhalf_type type) {
                    
91  case SFSAUTH_KEYHALF_NONE:
                    
92    void;
                    
93  case SFSAUTH_KEYHALF_PRIV:
                    
94    sfs_2schnorr_priv_xdr priv<SPRIVK_HISTORY_LEN>;
                    
                
e-gdata-goa-authorizer.c git://pkgs.fedoraproject.org/evolution-data-server | C | 525 lines
                    
197
                    
198	const gchar *oauth_keys[] = {
                    
199		"oauth_version",
                    
232
                    
233	for (ii = 0; ii < G_N_ELEMENTS (oauth_keys); ii++) {
                    
234		const gchar *key;
                    
236
                    
237		key = oauth_keys[ii];
                    
238		val = g_hash_table_lookup (parameters, key);
                    
                
index.html https://github.com/dmilith/payments-pl.git | HTML | 170 lines
                    
80    <span class='pos_id identifier id'>pos_id</span><span class='colon op'>:</span> <span class='XXX constant id'>XXX</span>
                    
81    <span class='pos_auth_key identifier id'>pos_auth_key</span><span class='colon op'>:</span> <span class='XXX constant id'>XXX</span>
                    
82    <span class='key1 identifier id'>key1</span><span class='colon op'>:</span> <span class='XXX constant id'>XXX</span>
                    
87    <span class='pos_id identifier id'>pos_id</span><span class='colon op'>:</span> <span class='XXX constant id'>XXX</span>
                    
88    <span class='pos_auth_key identifier id'>pos_auth_key</span><span class='colon op'>:</span> <span class='XXX constant id'>XXX</span>
                    
89    <span class='key1 identifier id'>key1</span><span class='colon op'>:</span> <span class='XXX constant id'>XXX</span>
                    
                
bp-forums-admin.php https://github.com/pfond/PFOND.git | PHP | 259 lines
                    
139			"define( 'BBDB_COLLAT"  		=> array( "''",                            	"'" . DB_COLLATE . "'" ),
                    
140			"define( 'BB_AUTH_KEY"  		=> array( "'put your unique phrase here'",  "'" . addslashes( AUTH_KEY ) . "'" ),
                    
141			"define( 'BB_SECURE_A"  		=> array( "'put your unique phrase here'",  "'" . addslashes( SECURE_AUTH_KEY ) . "'" ),
                    
                
nitrox_skcipher.c https://gitlab.com/Skylake/Staging | C | 494 lines
                    
82		memzero_explicit(&fctx->crypto, sizeof(struct crypto_keys));
                    
83		memzero_explicit(&fctx->auth, sizeof(struct auth_keys));
                    
84		crypto_free_context((void *)nctx->chdr);
                    
                
ospf_interface.h https://github.com/labx-technologies-llc/mb-linux-labx.git | C Header | 249 lines
                    
93  u_char key_id;
                    
94  u_char auth_key[OSPF_AUTH_MD5_SIZE + 1];
                    
95};
                    
                
Cloud.pm git://github.com/krimdomu/Rex.git | Perl | 598 lines
                    
140
                    
141 cloud_auth($auth_key);
                    
142
                    
                
cryptodev.h https://github.com/mstsirkin/qemu.git | C Header | 348 lines
                    
71 * @hash_result_len: byte length of HASH operation result
                    
72 * @auth_key_len: byte length of authenticated key
                    
73 * @add_len: byte length of additional authenticated data
                    
79 * @cipher_key: point to a key of CIPHER
                    
80 * @auth_key: point to an authenticated key of MAC
                    
81 *
                    
89    uint32_t hash_result_len;
                    
90    uint32_t auth_key_len;
                    
91    uint32_t add_len;
                    
96    uint8_t *cipher_key;
                    
97    uint8_t *auth_key;
                    
98} CryptoDevBackendSymSessionInfo;
                    
203    /* Maximum length of authenticated key */
                    
204    uint32_t max_auth_key_len;
                    
205    /* Maximum size of each crypto request's content */
                    
                
wpa.h https://gitlab.com/envieidoc/tomato | C Header | 158 lines
                    
93	wpa_suite_t list[1];
                    
94} PACKED wpa_suite_ucast_t, wpa_suite_auth_key_mgmt_t;
                    
95#define WPA_IE_SUITE_COUNT_LEN	2
                    
                
WebserviceKey.php https://bitbucket.org/enurkov/prestashop.git | PHP | 157 lines
                    
84
                    
85	public static function getPermissionForAccount($auth_key)
                    
86	{
                    
90			LEFT JOIN `'._DB_PREFIX_.'webservice_account` a ON (a.id_webservice_account = p.id_webservice_account)
                    
91			WHERE a.key = \''.pSQL($auth_key).'\'
                    
92		');
                    
99
                    
100	public static function isKeyActive($auth_key)
                    
101	{
                    
104			FROM `'._DB_PREFIX_.'webservice_account` a
                    
105			WHERE a.key = \''.pSQL($auth_key).'\'
                    
106		');
                    
112
                    
113	public static function getClassFromKey($auth_key)
                    
114	{
                    
                
AuthKeyspace.java https://github.com/beobal/cassandra.git | Java | 115 lines
                    
101    {
                    
102        return CreateTableStatement.parse(format(cql, name), SchemaConstants.AUTH_KEYSPACE_NAME)
                    
103                                   .id(TableId.forSystemTable(SchemaConstants.AUTH_KEYSPACE_NAME, name))
                    
110    {
                    
111        return KeyspaceMetadata.create(SchemaConstants.AUTH_KEYSPACE_NAME,
                    
112                                       KeyspaceParams.simple(1),
                    
                
bitbucket.md https://gitlab.com/randaalex/gitlab-ce | Markdown | 127 lines
                    
66
                    
67   ![Bitbucket OAuth key](img/bitbucket_oauth_keys.png)
                    
68
                    
                
IndexAction.class.php https://gitlab.com/colin.luo/shbs | PHP | 153 lines
                    
116    {
                    
117        $key = md5(empty($key) ? C('DATA_AUTH_KEY') : $key);
                    
118        $data = base64_encode($data);
                    
                
cluster_config.py https://gitlab.com/asimpletune/rethinkdb | Python | 102 lines
                    
28    assert list(r.db("rethinkdb").table("cluster_config").run(conn)) == [
                    
29            {"id": "auth", "auth_key": None},
                    
30            {"id": "heartbeat", "heartbeat_timeout_secs": 10}
                    
32    
                    
33    res = r.db("rethinkdb").table("cluster_config").get("auth").update({"auth_key": "hunter2"}).run(conn)
                    
34    assert res["errors"] == 0
                    
48    
                    
49    conn = r.connect(server.host, server.driver_port, auth_key="hunter2")
                    
50    
                    
51    rows = list(r.db("rethinkdb").table("cluster_config").filter({"id": "auth"}).run(conn))
                    
52    assert rows == [{"id": "auth", "auth_key": {"hidden": True}}]
                    
53    
                    
55    
                    
56    res = r.db("rethinkdb").table("cluster_config").get("auth").update({"auth_key": None}).run(conn)
                    
57    assert res["errors"] == 0
                    
                
devise.rb https://github.com/boy-jer/shapado.git | Ruby | 138 lines
                    
44  # Setup a pepper to generate the encrypted password.
                    
45  config.pepper = AppConfig.rest_auth_key
                    
46
                    
                
rps-test_util.c https://gitlab.com/taler/gnunet | C | 197 lines
                    
98char *
                    
99auth_key_to_string (struct GNUNET_CRYPTO_AuthKey auth_key)
                    
100{
                    
115
                    
116  end = GNUNET_STRINGS_data_to_string (&(auth_key.key),
                    
117      sizeof (struct GNUNET_CRYPTO_AuthKey),
                    
141struct GNUNET_CRYPTO_AuthKey
                    
142string_to_auth_key (const char *str)
                    
143{
                    
143{
                    
144  struct GNUNET_CRYPTO_AuthKey auth_key;
                    
145
                    
148                                     strlen (str),
                    
149                                     &auth_key.key,
                    
150                                     sizeof (struct GNUNET_CRYPTO_AuthKey)))
                    
                
wp-config.php https://gitlab.com/GzusGO/TDD-WordPress-standard-installation | PHP | 112 lines
                    
64// ==============================================================
                    
65define('AUTH_KEY','');
                    
66define('SECURE_AUTH_KEY','');
                    
                
auth-rsa.c https://github.com/clibrepo/04f6ea02286af71632b72d73554979a61da424cf681886674b21ecd595715c12.git | C | 324 lines
                    
93
                    
94	if (auth_key_is_revoked(key))
                    
95		return 0;
                    
                
auth.c https://github.com/roaraudio/roaraudio.git | C | 246 lines
                    
32
                    
33 memset(g_auth_keyring, 0, sizeof(g_auth_keyring));
                    
34
                    
34
                    
35 for (i = 0; i < AUTH_KEYRING_LEN; i++) {
                    
36  g_auth_keyring[i].type = _NONE;
                    
56union auth_typeunion * auth_regkey_simple(int type, enum roard_client_acclev acclev) {
                    
57 struct auth_key * key;
                    
58 int i;
                    
59
                    
60 for (i = 0; i < AUTH_KEYRING_LEN; i++) {
                    
61  if ( (key = &(g_auth_keyring[i]))->type == _NONE ) {
                    
61  if ( (key = &(g_auth_keyring[i]))->type == _NONE ) {
                    
62   memset(key, 0, sizeof(struct auth_key));
                    
63   key->type   = type;
                    
                
hs_test_helpers.c https://gitlab.com/teor/tor | C | 276 lines
                    
47  tt_int_op(ret, ==, 0);
                    
48  ip->auth_key_cert = tor_cert_create(signing_kp, CERT_TYPE_AUTH_HS_IP_KEY,
                    
49                                      &auth_kp.pubkey, now,
                    
51                                      CERT_FLAG_INCLUDE_SIGNING_KEY);
                    
52  tt_assert(ip->auth_key_cert);
                    
53
                    
233                                                 .intro_points, i);
                    
234      tt_assert(tor_cert_eq(ip1->auth_key_cert, ip2->auth_key_cert));
                    
235      if (ip1->legacy.key) {
                    
                
security-authentication.md https://gitlab.com/brucealdridge/yii2 | Markdown | 185 lines
                    
91    {
                    
92        return $this->auth_key;
                    
93    }
                    
117            if ($this->isNewRecord) {
                    
118                $this->auth_key = \Yii::$app->security->generateRandomString();
                    
119            }
                    
                
BUILD.gn https://gitlab.com/0072016/Facebook-SDK- | GN | 162 lines
                    
90  if (!is_ios) {
                    
91    defines += [ "USE_GOOGLE_API_KEYS_FOR_AUTH_KEY" ]
                    
92  }
                    
                
sec_crypto.h https://github.com/kvaneesh/linux.git | C Header | 407 lines
                    
366	 * auth_len: 0~23 bit
                    
367	 * auth_key_offset: 24~31 bits
                    
368	 */
                    
                
settings.php https://github.com/mackensen/moodle.git | PHP | 293 lines
                    
114        $settings->add(new admin_setting_configselect('auth_cas/multiauth',
                    
115                new lang_string('auth_cas_multiauth_key', 'auth_cas'),
                    
116                new lang_string('auth_cas_multiauth', 'auth_cas'), 0 , $yesno));
                    
                
request_key_auth.c https://github.com/genesi/linux-shortbus.git | C | 264 lines
                    
164		if (test_bit(KEY_FLAG_REVOKED, &cred->request_key_auth->flags))
                    
165			goto auth_key_revoked;
                    
166
                    
203
                    
204auth_key_revoked:
                    
205	up_read(&cred->request_key_auth->sem);
                    
                
sctp_var.h https://github.com/okuoku/freebsd-head.git | C Header | 370 lines
                    
115	if ((_strmoq)->holds_key_ref) { \
                    
116		sctp_auth_key_release(stcb, sp->auth_keyid, _so_locked); \
                    
117		(_strmoq)->holds_key_ref = 0; \
                    
133	if ((_chk)->holds_key_ref) {\
                    
134		sctp_auth_key_release((_stcb), (_chk)->auth_keyid, _so_locked); \
                    
135		(_chk)->holds_key_ref = 0; \
                    
                
User.php https://gitlab.com/junio-p/nutrirbox | PHP | 296 lines
                    
18 * @property string $username
                    
19 * @property string $auth_key
                    
20 * @property string $access_token
                    
69            TimestampBehavior::className(),
                    
70            'auth_key' => [
                    
71                'class' => AttributeBehavior::className(),
                    
72                'attributes' => [
                    
73                    ActiveRecord::EVENT_BEFORE_INSERT => 'auth_key'
                    
74                ],
                    
114            [['username'],'filter','filter' => '\yii\helpers\Html::encode'],
                    
115            [['username', 'auth_key'], 'string', 'max' => 32],
                    
116            [['access_token'], 'string', 'max' => 40],
                    
211    {
                    
212        return $this->auth_key;
                    
213    }
                    
                
cryptauth_key_registry_impl_unittest.cc https://github.com/chromium/chromium.git | C++ | 276 lines
                    
4
                    
5#include "ash/services/device_sync/cryptauth_key_registry_impl.h"
                    
6
                    
                
LoginAct.java https://gitlab.com/mdly/ncly-searchs | Java | 199 lines
                    
2
                    
3import static com.jeecms.core.manager.AuthenticationMng.AUTH_KEY;
                    
4
                    
70		String message = RequestUtils.getQueryParam(request, MESSAGE);
                    
71		String authId = (String) session.getAttribute(request, AUTH_KEY);
                    
72		if (authId != null) {
                    
137			HttpServletResponse response) {
                    
138		String authId = (String) session.getAttribute(request, AUTH_KEY);
                    
139		if (authId != null) {
                    
163			StringBuilder sb = new StringBuilder("redirect:");
                    
164			sb.append(processUrl).append("?").append(AUTH_KEY).append("=")
                    
165					.append(authId);
                    
173			if (!StringUtils.isBlank(authId)) {
                    
174				sb.append("?").append(AUTH_KEY).append("=").append(authId);
                    
175			}
                    
                
login.js https://bitbucket.org/jdenton/stuffsafe-mobile-ipad.git | JavaScript | 96 lines
                    
46		} else {
                    
47			globals.AUTH_KEY  = jdata.AuthKey;
                    
48			globals.USER_TYPE = jdata.UserType;
                    
                
google-9-rdbx-leak-plug.patch https://gitlab.com/brian0218/rk3066_r-box_android4.2.2_sdk | Patch | 298 lines
                    
43 				  &str->rtp_auth,
                    
44 				  p->rtp.auth_key_len, 
                    
45-				  p->rtp.auth_tag_len); 
                    
84@@ -144,33 +136,37 @@ srtp_stream_alloc(srtp_stream_ctx_t **str_ptr,
                    
85 				  p->rtcp.auth_key_len, 
                    
86 				  p->rtcp.auth_tag_len); 
                    
                
DatabaseAction.class.php https://gitlab.com/shenzhenlong1203/GZTravel.git | PHP | 297 lines
                    
7    public function _initialize() {
                    
8        if (!isset($_SESSION[C('USER_AUTH_KEY')])) {
                    
9            $this->redirect('Admin/Login/login');
                    
                
install.php https://github.com/dylanmcd/Pubcomp-CMS.git | PHP | 401 lines
                    
92					$bb_install->input_text('bbdb_collate');
                    
93					//$bb_install->input_text('bb_auth_key');
                    
94					//$bb_install->input_text('bb_secure_auth_key');
                    
172					$bb_install->input_text('wp_home', 'ltr');
                    
173					$bb_install->input_text('wp_auth_key');
                    
174					$bb_install->input_text('wp_auth_salt');
                    
174					$bb_install->input_text('wp_auth_salt');
                    
175					$bb_install->input_text('wp_secure_auth_key');
                    
176					$bb_install->input_text('wp_secure_auth_salt');
                    
                
rtl8370_asicdrv_rrcp.c https://gitlab.com/thanhnhat041/padavan-ng | C | 267 lines
                    
154
                    
155    retVal = rtl8370_setAsicReg(RTL8370_RRCP_AUTH_KEY_REG, authKey);    
                    
156	if(retVal != RT_ERR_OK )
                    
178{
                    
179    return rtl8370_getAsicReg(RTL8370_RRCP_AUTH_KEY_REG, authKey);    
                    
180}
                    
                
auth.php https://gitlab.com/Blueprint-Marketing/interoccupy.net | PHP | 264 lines
                    
11		}
                    
12		return md5('social_authentication'.AUTH_KEY.$salt);
                    
13	}
                    
                
class.ScalrAPICore.php https://github.com/kennethjiang/Wolke.git | PHP | 362 lines
                    
61    		
                    
62    		$auth_key = $this->Environment->getPlatformConfigValue(ENVIRONMENT_SETTINGS::API_ACCESS_KEY, false);
                    
63    		
                    
63    		
                    
64    		$valid_sign = base64_encode(hash_hmac(self::HASH_ALGO, trim($string_to_sign), $auth_key, 1));
                    
65
                    
70    		$this->debug['usedAuthVersion'] = 3;
                    
71    		$this->debug['md5AccessKey'] = md5($auth_key);
                    
72    		
                    
120    		
                    
121    		$auth_key = $this->Environment->getPlatformConfigValue(ENVIRONMENT_SETTINGS::API_ACCESS_KEY, false);
                    
122    		
                    
122    		
                    
123    		$valid_sign = base64_encode(hash_hmac(self::HASH_ALGO, trim($string_to_sign), $auth_key, 1));
                    
124
                    
                
cx3110x.patch https://github.com/Martix/Eonos.git | Patch | 492 lines
                    
78+	case IW_AUTH_CIPHER_GROUP:
                    
79+	case IW_AUTH_KEY_MGMT:
                    
80+		break;
                    
189+	case IW_AUTH_CIPHER_GROUP:
                    
190+	case IW_AUTH_KEY_MGMT:
                    
191+		/*
                    
                
key_call.c https://bitbucket.org/a3217055/illumos-2.git | C | 323 lines
                    
66	struct knetconfig	auth_config;
                    
67	char 			auth_keyname[SYS_NMLN+16];
                    
68};
                    
243	authg = zone_getspecific(auth_zone_key, curproc->p_zone);
                    
244	keyname = authg->auth_keyname;
                    
245	configp = &authg->auth_config;
                    
                
phFriNfc_MifStdFormat.h https://gitlab.com/Codeaurora/platform_vendor_nxp_opensource_packages_apps_Nfc | C Header | 340 lines
                    
50#define PH_FRINFC_MFSTD_FMT_AUTH_MAD_KEY        2   /* Trying to authenticate with the NFC forum key */
                    
51#define PH_FRINFC_MFSTD_FMT_AUTH_KEYB           3   /* Trying to authenticate with key B */
                    
52#define PH_FRINFC_MFSTD_FMT_AUTH_SCRT_KEYB      4   /* Trying to authenticate with secret key B */
                    
247        NdefSmtCrdFmt->AddInfo.MfStdInfo.AuthState = \
                    
248                            PH_FRINFC_MFSTD_FMT_AUTH_KEYB;\
                    
249        }\
                    
256        break;\
                    
257        case PH_FRINFC_MFSTD_FMT_AUTH_KEYB:\
                    
258        { \
                    
                
trigger.js https://gitlab.com/silentx09/opiniothon | JavaScript | 298 lines
                    
27        .post(
                    
28          "/apps/1234/events?auth_key=f00d&auth_timestamp=X&auth_version=1.0&body_md5=cf87d666b4a829a54fc44b313584b2d7&auth_signature=Y",
                    
29          { name: "my_event", data: "{\"some\":\"data \"}", channels: ["test_channel"] }
                    
48        .post(
                    
49          "/apps/1234/events?auth_key=f00d&auth_timestamp=X&auth_version=1.0&body_md5=e95168baf497b2e54b2c6cadd41a6a3f&auth_signature=Y",
                    
50          { name: "my_event", data: "{\"some\":\"data \"}", channels: ["one"] }
                    
64        .post(
                    
65          "/apps/1234/events?auth_key=f00d&auth_timestamp=X&auth_version=1.0&body_md5=530dac0aa045e5f8e51c470aed0ce325&auth_signature=Y",
                    
66          { name: "my_event", data: "{\"some\":\"data \"}", channels: ["one", "two", "three"] }
                    
80        .post(
                    
81          "/apps/1234/events?auth_key=f00d&auth_timestamp=X&auth_version=1.0&body_md5=18e64b2fed38726915d79ebb4f8feb5b&auth_signature=Y",
                    
82          { name: "my_event", data: "[1,2,4]", channels: ["one"] }
                    
96        .post(
                    
97          "/apps/1234/events?auth_key=f00d&auth_timestamp=X&auth_version=1.0&body_md5=f358a562d00e1bfe1859132d932cd706&auth_signature=Y",
                    
98          { name: "test_event", data: "test string", channels: ["test"] }
                    
                
key-type.h https://github.com/penberg/linux.git | C Header | 192 lines
                    
39
                    
40typedef int (*request_key_actor_t)(struct key *auth_key, void *aux);
                    
41
                    
                
MediaConsts.java https://bitbucket.org/kshark27/just-player.git | Java | 249 lines
                    
231        public static final String _ID = BaseColumns._ID;
                    
232        public static final String AUTH_KEY = "authkey";
                    
233        public static final String AUTH_URL = "authurl";
                    
                
processor.h https://github.com/anarsoul/linux-2.6.git | C Header | 315 lines
                    
147#ifdef CONFIG_ARM64_PTR_AUTH
                    
148	struct ptrauth_keys	keys_user;
                    
149#endif
                    
                
cryptauth_metadata_syncer_impl.h https://github.com/chromium/chromium.git | C Header | 199 lines
                    
12#include "ash/services/device_sync/cryptauth_device_sync_result.h"
                    
13#include "ash/services/device_sync/cryptauth_key.h"
                    
14#include "ash/services/device_sync/cryptauth_key_bundle.h"
                    
                
keyctl.h https://github.com/gkkrish/android1.5mini2440.git | C Header | 54 lines
                    
21#define KEY_SPEC_GROUP_KEYRING		-6	/* - key ID for GID-specific keyring */
                    
22#define KEY_SPEC_REQKEY_AUTH_KEY	-7	/* - key ID for assumed request_key auth key */
                    
23
                    
                
PublicAction.class.php http://iiccms.googlecode.com/svn/trunk/ | PHP | 363 lines
                    
7				//???????
                    
8				if (!$_SESSION [C('USER_AUTH_KEY')]) {
                    
9					//???????
                    
61            }
                    
62            $_SESSION[C('USER_AUTH_KEY')]	=	$authInfo['id'];
                    
63            $_SESSION['email']	=	$authInfo['email'];
                    
87	public function login() {
                    
88		if(!isset($_SESSION[C('USER_AUTH_KEY')])) {
                    
89			$this->display();
                    
96	{
                    
97		if(isset($_SESSION[C('USER_AUTH_KEY')])) {
                    
98			unset($_SESSION['menu'.$_SESSION[C('USER_AUTH_KEY')]]);
                    
98			unset($_SESSION['menu'.$_SESSION[C('USER_AUTH_KEY')]]);
                    
99			unset($_SESSION[C('USER_AUTH_KEY')]);
                    
100			unset($_SESSION['administrator']);
                    
                
default.rb https://github.com/henrymazza/chef-repo.git | Ruby | 220 lines
                    
184    :db_collate        => '',
                    
185    :auth_key          => node['aki3']['keys']['auth'],
                    
186    :secure_auth_key   => node['aki3']['keys']['secure_auth'],
                    
                
example.cpp https://gitlab.com/asimpletune/rethinkdb | C++ | 265 lines
                    
9#define default_db "test"
                    
10#define default_auth_key ""
                    
11
                    
33	string auth_key = ask("authorization key (leave empty for '" default_auth_key "')");
                    
34	if (auth_key.empty()) auth_key = default_auth_key;
                    
35
                    
35
                    
36	shared_ptr <connection> conn(new connection(host, port, db, auth_key));
                    
37	vector<shared_ptr<Response>> responses = vector<shared_ptr<Response>>();
                    
                
0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch https://gitlab.com/oryx/meta-openembedded | Patch | 365 lines
                    
25 	case 1:
                    
26 		key = pamsshagentauth_key_new(KEY_RSA1);
                    
27 		bits = pamsshagentauth_buffer_get_int(&auth->identities);
                    
94+++ b/key.c
                    
95@@ -77,7 +77,7 @@ pamsshagentauth_key_new(int type)
                    
96 	case KEY_RSA:
                    
103 		if ((rsa->e = BN_new()) == NULL)
                    
104@@ -91,7 +91,7 @@ pamsshagentauth_key_new(int type)
                    
105 	case KEY_DSA:
                    
112 		if ((dsa->q = BN_new()) == NULL)
                    
113@@ -130,7 +130,7 @@ pamsshagentauth_key_new_private(int type)
                    
114 	switch (k->type) {
                    
121 		if ((k->rsa->iqmp = BN_new()) == NULL)
                    
122@@ -153,7 +153,7 @@ pamsshagentauth_key_new_private(int type)
                    
123 #endif
                    
                
ipsec.patch https://gitlab.com/x1046882802/flexiroutervpp | Patch | 215 lines
                    
103     def __init__(self, proto, spi, seq_num=1, crypt_algo=None, crypt_key=None,
                    
104-                 auth_algo=None, auth_key=None, tunnel_header=None, nat_t_header=None):
                    
105+                 auth_algo=None, auth_key=None, tunnel_header=None, nat_t_header=None,
                    
163 
                    
164-        self.auth_algo.sign(esp, self.auth_key)
                    
165+        self.auth_algo.sign(esp, self.auth_key, high_seq_num)
                    
182 
                    
183-        signed_pkt = self.auth_algo.sign(ip_header / ah / payload, self.auth_key)
                    
184+        signed_pkt = self.auth_algo.sign(ip_header / ah / payload,
                    
184+        signed_pkt = self.auth_algo.sign(ip_header / ah / payload,
                    
185+                                         self.auth_key, high_seq_num)
                    
186 
                    
197             self.check_spi(pkt)
                    
198-            self.auth_algo.verify(encrypted, self.auth_key)
                    
199+            self.auth_algo.verify(encrypted, self.auth_key, high_seq_num)
                    
                
packet-rip.c https://gitlab.com/crondaemon/wireshark-legacy | C | 396 lines
                    
58#define AUTH_PASSWORD           2
                    
59#define AUTH_KEYED_MSG_DIGEST   3
                    
60
                    
63    { AUTH_PASSWORD,         "Simple Password" },
                    
64    { AUTH_KEYED_MSG_DIGEST, "Keyed Message Digest" },
                    
65    { 0, NULL }
                    
307
                    
308    case AUTH_KEYED_MSG_DIGEST: /* Keyed MD5 rfc 2082 */
                    
309        digest_off = tvb_get_ntohs( tvb, offset+4 );
                    
                
ssh.c https://gitlab.com/hwhelchel/sonic-pi | C | 617 lines
                    
323			 * allows you to pass the `abstract` as part of the call, whereas
                    
324			 * libssh2_userauth_keyboard_interactive() does not!
                    
325			 *
                    
332
                    
333			rc = libssh2_userauth_keyboard_interactive(
                    
334				session, c->username, c->prompt_callback);
                    
                
auth_model_spec.rb https://gitlab.com/unofficial-mirrors/manageiq | Ruby | 184 lines
                    
27    let(:contenders) { subject.contenders.collect(&:name) }
                    
28    let(:v1_v2)  { subject.create(:name => "v2_v1", :password => enc_v2, :auth_key => enc_v1) }
                    
29    let(:v2_v1)  { subject.create(:name => "v1_v2", :password => enc_v1, :auth_key => enc_v2) }
                    
41    it "should determine available_columns" do
                    
42      expect(subject.available_columns).to eq(%w(password auth_key))
                    
43    end
                    
51      expect(subject.selection_criteria).to match(/OR/)
                    
52      expect(subject.selection_criteria).to match(/password.*<>.*''.*OR.*auth_key.*<>.*''/)
                    
53    end
                    
80        expect(leg).to be_password_changed
                    
81        expect(leg).not_to be_auth_key_changed
                    
82        expect(leg.password).to be_encrypted(pass)
                    
111        expect(leg.password).to be_encrypted_version(2)
                    
112        expect(leg.auth_key).to be_blank
                    
113      end
                    
                
wpa_ie.c https://gitlab.com/brian0218/rk3188_r-box_android4.2.2_sdk | C | 435 lines
                    
80	if (key_mgmt == WPA_KEY_MGMT_IEEE8021X) {
                    
81		RSN_SELECTOR_PUT(pos, WPA_AUTH_KEY_MGMT_UNSPEC_802_1X);
                    
82	} else if (key_mgmt == WPA_KEY_MGMT_PSK) {
                    
82	} else if (key_mgmt == WPA_KEY_MGMT_PSK) {
                    
83		RSN_SELECTOR_PUT(pos, WPA_AUTH_KEY_MGMT_PSK_OVER_802_1X);
                    
84	} else if (key_mgmt == WPA_KEY_MGMT_WPA_NONE) {
                    
84	} else if (key_mgmt == WPA_KEY_MGMT_WPA_NONE) {
                    
85		RSN_SELECTOR_PUT(pos, WPA_AUTH_KEY_MGMT_NONE);
                    
86	} else {
                    
151	if (key_mgmt == WPA_KEY_MGMT_IEEE8021X) {
                    
152		RSN_SELECTOR_PUT(pos, RSN_AUTH_KEY_MGMT_UNSPEC_802_1X);
                    
153	} else if (key_mgmt == WPA_KEY_MGMT_PSK) {
                    
153	} else if (key_mgmt == WPA_KEY_MGMT_PSK) {
                    
154		RSN_SELECTOR_PUT(pos, RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X);
                    
155#ifdef CONFIG_IEEE80211R
                    
                
createCustomer.php https://gitlab.com/sutrix.hoa.tran/Research-Prestashop | PHP | 132 lines
                    
32define('PS_SHOP_PATH', 'http://prestashop-research.local/');
                    
33define('PS_WS_AUTH_KEY', 'L77TLJE2RPDE6UYP4648R873RVWE961D');
                    
34require_once('./PSWebServiceLibrary.php');
                    
38{
                    
39    $webService = new PrestaShopWebservice(PS_SHOP_PATH, PS_WS_AUTH_KEY, DEBUG);
                    
40    $opt = array('resource' => 'customers');
                    
                
util.lua https://github.com/logiceditor-com/codebase.git | Lua | 194 lines
                    
155      VKONTAKTE_USER_ID = context.identifier(1, 256);
                    
156      VKONTAKTE_AUTH_KEY = context.identifier(1, 256);
                    
157
                    
                
pointer_auth.h https://gitlab.com/pachecof/centos-stream-9 | C Header | 152 lines
                    
30	struct ptrauth_key apdb;
                    
31	struct ptrauth_key apga;
                    
32};
                    
46
                    
47static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys)
                    
48{
                    
52
                    
53static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys)
                    
54{
                    
63
                    
64static inline void ptrauth_keys_install_user(struct ptrauth_keys_user *keys)
                    
65{
                    
75
                    
76static inline void ptrauth_keys_init_user(struct ptrauth_keys_user *keys)
                    
77{
                    
                
manager.php https://gitlab.com/alexprowars/bitrix | PHP | 274 lines
                    
181	{
                    
182		Option::set("sale", "config_external_oauth_key", $key);
                    
183	}
                    
185	{
                    
186		return Option::get("sale", "config_external_oauth_key", "");
                    
187	}
                    
                
class.ScalrAPICore.php https://github.com/kennethjiang/Wolke.git | PHP | 323 lines
                    
85    		
                    
86    		$auth_key = $this->Environment->getPlatformConfigValue(ENVIRONMENT_SETTINGS::API_ACCESS_KEY, false);
                    
87    		
                    
87    		
                    
88    		$valid_sign = base64_encode(hash_hmac(self::HASH_ALGO, trim($string_to_sign), $auth_key, 1));
                    
89
                    
130    		
                    
131    		$auth_key = $this->Environment->getPlatformConfigValue(ENVIRONMENT_SETTINGS::API_ACCESS_KEY, false);
                    
132    		
                    
132    		
                    
133    		$valid_sign = base64_encode(hash_hmac(self::HASH_ALGO, trim($string_to_sign), $auth_key, 1));    		
                    
134    		if ($valid_sign != $request['Signature'])
                    
                
range_meters.o.d https://gitlab.com/pitman/pi-pilot.git | D | 131 lines
                    
29 ../mavlink/v1.0/common/./mavlink_msg_change_operator_control_ack.h  \
                    
30 ../mavlink/v1.0/common/./mavlink_msg_auth_key.h  \
                    
31 ../mavlink/v1.0/common/./mavlink_msg_set_mode.h  \
                    
                
virtio_crypto.h https://github.com/kvaneesh/linux.git | C Header | 450 lines
                    
151	/* length of authenticated key */
                    
152	__le32 auth_key_len;
                    
153	__le32 padding;
                    
439	/* Maximum length of authenticated key */
                    
440	__le32 max_auth_key_len;
                    
441	__le32 reserve;
                    
                
EXPikchur.m http://exportkit-cocoa.googlecode.com/svn/trunk/ | Objective C | 340 lines
                    
84	if (connectionResponse != nil) {
                    
85		parseKeys = [[NSArray alloc] initWithObjects:@"auth_key",@"user_id",@"message",@"error",nil];
                    
86		[self parseXMLFileWithData:connectionResponse];
                    
146	//required parameters
                    
147	[self addString:authToken forAPI:@"data[api][auth_key]" toData:postBody];
                    
148	[self addString:data.statusMessage forAPI:@"data[api][status]" toData:postBody];
                    
276- (void)parserDidEndDocument:(NSXMLParser *)parser {	
                    
277	if ([parsedContent objectForKey:@"auth_key"]) {
                    
278		authToken = [(NSString *)[parsedContent objectForKey:@"auth_key"] copy];
                    
                
wordpress-install.sh https://gitlab.com/leo020588/wordpress-wsl | Shell | 199 lines
                    
80
                    
81WORDPRESS_AUTH_KEY=$(salt 64)
                    
82WORDPRESS_AUTH_SALT=$(salt 64)
                    
82WORDPRESS_AUTH_SALT=$(salt 64)
                    
83WORDPRESS_SECURE_AUTH_KEY=$(salt 64)
                    
84WORDPRESS_SECURE_AUTH_SALT=$(salt 64)
                    
                
cryptauth_key.cc https://github.com/chromium/chromium.git | C++ | 164 lines
                    
4
                    
5#include "ash/services/device_sync/cryptauth_key.h"
                    
6
                    
                
qce50.h https://gitlab.com/webhaikal/SenseiOneplus3 | C Header | 240 lines
                    
89	struct sps_command_element *auth_seg_start;
                    
90	struct sps_command_element *auth_key;
                    
91	struct sps_command_element *auth_iv;
                    
                
User.php https://gitlab.com/makkooz/nikestreetbeat | PHP | 102 lines
                    
37                    'password_reset_token',
                    
38                    'auth_key',
                    
39                    'created_at',
                    
94            ->andFilterWhere(['like', 'password_reset_token', $this->password_reset_token])
                    
95            ->andFilterWhere(['like', 'auth_key', $this->auth_key])
                    
96            ->andFilterWhere(['like', 'created_at', $this->created_at])
                    
                
ssh.h https://gitlab.com/thanhnhat041/padavan-ng | C Header | 271 lines
                    
57  SSH_AUTH_HOST,
                    
58  SSH_AUTH_KEY_INIT,
                    
59  SSH_AUTH_KEY,
                    
                
wp-config.php https://gitlab.com/sokeara/Tribal_Education | PHP | 89 lines
                    
48 */
                    
49define('AUTH_KEY',         'put your unique phrase here');
                    
50define('SECURE_AUTH_KEY',  'put your unique phrase here');
                    
                
ipsecroutetable.cc https://github.com/kohler/click.git | C++ | 390 lines
                    
82    cp_spacevec(s, words);
                    
83    String enc_key, auth_key;
                    
84    if (Args(words, context, ErrorHandler::default_handler())
                    
86	.read_mp("ENCRYPT_KEY", enc_key)
                    
87	.read_mp("AUTH_KEY", auth_key)
                    
88	.read_mp("REPLAY", replay)
                    
91	return false;
                    
92    if (enc_key.length() != 16 || auth_key.length() != 16) {
                    
93	click_chatter("key has bad length");
                    
97    // Create new Security Association Table entry
                    
98    sa_data = new SADataTuple(enc_key.data(), auth_key.data(), replay, oowin);
                    
99    ((IPsecRouteTable*)context)->_sa_table.insert(SPI(r.spi),*sa_data);
                    
                
PasswordAuthenticator.java https://github.com/beobal/cassandra.git | Java | 267 lines
                    
132        // Also protected by CassandraRoleManager, but the duplication doesn't hurt and is more explicit
                    
133        return ImmutableSet.of(DataResource.table(SchemaConstants.AUTH_KEYSPACE_NAME, AuthKeyspace.ROLES));
                    
134    }
                    
143                                     SALTED_HASH,
                    
144                                     SchemaConstants.AUTH_KEYSPACE_NAME,
                    
145                                     AuthKeyspace.ROLES);
                    
                
request.py https://gitlab.com/xivo.solutions/xivo-sysconfd | Python | 284 lines
                    
33    AsteriskCommandFactory
                    
34from xivo_sysconf.request_handlers.auth_keys import AuthKeysCommandExecutor, \
                    
35    AuthKeysCommandFactory
                    
59                 asterisk_command_factory,
                    
60                 auth_keys_command_factory,
                    
61                 ctid_command_factory):
                    
63        self._asterisk_command_factory = asterisk_command_factory
                    
64        self._auth_keys_command_factory = auth_keys_command_factory
                    
65        self._ctid_command_factory = ctid_command_factory
                    
72        self._append_commands('ctibus', self._ctid_command_factory, args, commands)
                    
73        self._append_commands('update_keys', self._auth_keys_command_factory, args, commands)
                    
74        return Request(commands)
                    
261        asterisk_command_factory = AsteriskCommandFactory(asterisk_command_executor)
                    
262        auth_keys_command_factory = AuthKeysCommandFactory(auth_keys_command_executor)
                    
263        ctid_command_factory = CTIdCommandFactory(ctid_command_executor)
                    
                
auth.c https://bitbucket.org/kmv/aeriebsd-src.git | C | 271 lines
                    
49	case AUTH_SIMPLE:
                    
50		if (memcmp(ospf_hdr->auth_key.simple, iface->auth_key,
                    
51		    sizeof(ospf_hdr->auth_key.simple))) {
                    
71		 * but not necessarily set as the transmit key
                    
72		 * (iface->auth_keyid). This allows for key rotation to new
                    
73		 * keys without taking down the network.
                    
153	/* clear auth_key field */
                    
154	bzero(ospf_hdr->auth_key.simple, sizeof(ospf_hdr->auth_key.simple));
                    
155
                    
162
                    
163		strncpy(ospf_hdr->auth_key.simple, iface->auth_key,
                    
164		    sizeof(ospf_hdr->auth_key.simple));
                    
167		ospf_hdr->chksum = 0;
                    
168		ospf_hdr->auth_key.crypt.keyid = iface->auth_keyid;
                    
169		ospf_hdr->auth_key.crypt.seq_num = htonl(iface->crypt_seq_num);
                    
                
views.py https://github.com/yiningzhao/NewsBlur.git | Python | 167 lines
                    
49    ))
                    
50    oauth_key = settings.OAUTH_KEY
                    
51    oauth_secret = settings.OAUTH_SECRET
                    
61    # Grab request token from Google's OAuth
                    
62    consumer = oauth.Consumer(oauth_key, oauth_secret)
                    
63    client = oauth.Client(consumer)
                    
84    access_token_url = 'https://www.google.com/accounts/OAuthGetAccessToken'
                    
85    consumer = oauth.Consumer(settings.OAUTH_KEY, settings.OAUTH_SECRET)
                    
86
                    
131            user_token = user_tokens[0]
                    
132            consumer = oauth.Consumer(settings.OAUTH_KEY, settings.OAUTH_SECRET)
                    
133            token = oauth.Token(user_token.access_token, user_token.access_token_secret)
                    
                
RBAC.class.php https://gitlab.com/selecterskyphp/framework.git | PHP | 250 lines
                    
26// USER_AUTH_TYPE 认证类型
                    
27// USER_AUTH_KEY 认证识别号
                    
28// REQUIRE_AUTH_MODULE  需要认证模块
                    
44    {
                    
45        if(null===$authId)   $authId = $_SESSION[C('USER_AUTH_KEY')];
                    
46        // 如果使用普通权限模式,保存当前用户的访问权限列表
                    
47        // 对管理员开发所有权限
                    
48        if(C('USER_AUTH_TYPE') !=2 && !$_SESSION[C('ADMIN_AUTH_KEY')] )
                    
49            $_SESSION['_ACCESS_LIST']	=	RBAC::getAccessList($authId);
                    
54	static function getRecordAccessList($authId=null,$module='') {
                    
55        if(null===$authId)   $authId = $_SESSION[C('USER_AUTH_KEY')];
                    
56        if(empty($module))  $module	=	MODULE_NAME;
                    
102            //检查认证识别号
                    
103            if(!$_SESSION[C('USER_AUTH_KEY')]) {
                    
104                if(C('GUEST_AUTH_ON')) {
                    
                
cloud_manager.rb https://gitlab.com/miq-chargeback/manageiq | Ruby | 182 lines
                    
43
                    
44    supports_not :auth_key_pair_create
                    
45    supports_not :cinder_service
                    
                
test_client.py https://github.com/wadey/python-simplegeo.git | Python | 278 lines
                    
9
                    
10MY_OAUTH_KEY = 'MY_OAUTH_KEY'
                    
11MY_OAUTH_SECRET = 'MY_SECRET_KEY'
                    
13
                    
14if MY_OAUTH_KEY == 'MY_OAUTH_KEY' or \
                    
15    MY_OAUTH_SECRET == 'MY_SERCRET_KEY' or \
                    
43    def setUp(self):
                    
44        self.client = Client(MY_OAUTH_KEY, MY_OAUTH_SECRET, API_VERSION, API_HOST, API_PORT)
                    
45        self.created_records = []
                    
213    def test_connection_refused(self):
                    
214        self.client = Client(MY_OAUTH_KEY, MY_OAUTH_SECRET, API_VERSION, API_HOST, INVALID_API_PORT)
                    
215
                    
                
job.c https://github.com/halgandd/bacula.git | C | 427 lines
                    
78   int JobId;
                    
79   char auth_key[100];
                    
80   char spool_size[30];
                    
154   bsnprintf(seed, sizeof(seed), "%p%d", jcr, JobId);
                    
155   make_session_key(auth_key, seed, 1);
                    
156   dir->fsend(OKjob, jcr->VolSessionId, jcr->VolSessionTime, auth_key);
                    
157   Dmsg2(50, ">dird jid=%u: %s", (uint32_t)jcr->JobId, dir->msg);
                    
158   jcr->sd_auth_key = bstrdup(auth_key);
                    
159   memset(auth_key, 0, sizeof(auth_key));
                    
189   Dmsg3(50, "%s waiting %d sec for FD to contact SD key=%s\n",
                    
190         jcr->Job, (int)(timeout.tv_sec-time(NULL)), jcr->sd_auth_key);
                    
191
                    
207
                    
208   memset(jcr->sd_auth_key, 0, strlen(jcr->sd_auth_key));
                    
209
                    
                
authentication.cpp https://gitlab.com/matt81093/Darwinia-and-Multiwinia-Source-Code | C++ | 507 lines
                    
494        case AuthenticationWrongPlatform:           return "dialog_auth_wrong_platform";
                    
495        case AuthenticationKeyDead:                 return "dialog_auth_key_dead";
                    
496        case AuthenticationVersionNotFound:         return "dialog_auth_version_not_found";
                    
496        case AuthenticationVersionNotFound:         return "dialog_auth_version_not_found";
                    
497        case AuthenticationKeyInactive:	             return "dialog_auth_key_inactive";
                    
498        case AuthenticationVersionRevoked:          return "dialog_auth_version_revoked";
                    
498        case AuthenticationVersionRevoked:          return "dialog_auth_version_revoked";
                    
499        case AuthenticationKeyNotFound:             return "dialog_auth_key_not_found";
                    
500        case AuthenticationKeyRevoked:              return "dialog_auth_key_revoked";
                    
500        case AuthenticationKeyRevoked:              return "dialog_auth_key_revoked";
                    
501        case AuthenticationKeyBanned:               return "dialog_auth_key_banned";
                    
502        case AuthenticationKeyInvalid:              return "dialog_auth_key_invalid";
                    
                
album_notification.php https://gitlab.com/team_fsn/fsn-php | PHP | 338 lines
                    
136      
                    
137      $authkey = create_user_auth_key($u['user_id'], $u['status']);
                    
138      
                    
142      {
                    
143        $user_tpl['assign']['LINK'] = add_url_params($tpl['assign']['LINK'], array('auth' => $authkey['auth_key']));
                    
144
                    
148            $user_tpl['assign']['IMG']['link'],
                    
149            array('auth' => $authkey['auth_key'])
                    
150            );
                    
156      {
                    
157        $user_args['auth_key'] = $authkey['auth_key'];
                    
158      }
                    
207
                    
208if ($conf['auth_key_duration'] > 0)
                    
209{
                    
                
gl_wext.h https://gitlab.com/neohackt/android_kernel_elephone_p8000 | C Header | 415 lines
                    
137#define IW_AUTH_CIPHER_GROUP            2
                    
138#define IW_AUTH_KEY_MGMT                3
                    
139#define IW_AUTH_TKIP_COUNTERMEASURES    4
                    
165
                    
166/* IW_AUTH_KEY_MGMT values (bit field) */
                    
167#define IW_AUTH_KEY_MGMT_802_1X     1
                    
167#define IW_AUTH_KEY_MGMT_802_1X     1
                    
168#define IW_AUTH_KEY_MGMT_PSK        2
                    
169#define IW_AUTH_KEY_MGMT_WPA_NONE   4
                    
283#if CFG_SUPPORT_WAPI /* Android+ */
                    
284#define IW_AUTH_KEY_MGMT_WAPI_PSK   3
                    
285#define IW_AUTH_KEY_MGMT_WAPI_CERT  4
                    
286#endif
                    
287#define IW_AUTH_KEY_MGMT_WPS  5
                    
288
                    
                
wlan_bssdef.h https://bitbucket.org/bendikro/net-next-rdb.git | C Header | 140 lines
                    
136/* john */
                    
137#define NUM_PRE_AUTH_KEY 16
                    
138#define NUM_PMKID_CACHE NUM_PRE_AUTH_KEY
                    
                
install.php https://bitbucket.org/moodsdesign-ondemand/reglot.git | PHP | 107 lines
                    
26if (defined('GP_AUTH_KEY'))
                    
27    $config_defaults['GP_AUTH_KEY'] = GP_AUTH_KEY;
                    
28if (defined('GP_SECURE_AUTH_KEY'))
                    
28if (defined('GP_SECURE_AUTH_KEY'))
                    
29    $config_defaults['GP_SECURE_AUTH_KEY'] = GP_SECURE_AUTH_KEY;
                    
30if (defined('GP_LOGGED_IN_KEY'))
                    
70                <label for="config[GP_AUTH_KEY]">GP_AUTH_KEY</label>
                    
71                <input type="text" name="config[GP_AUTH_KEY]" value="<?php echo @$config['GP_AUTH_KEY']; ?>" id="config[GP_AUTH_KEY]"><br/>
                    
72                <label for="config[GP_SECURE_AUTH_KEY]">GP_SECURE_AUTH_KEY</label>
                    
72                <label for="config[GP_SECURE_AUTH_KEY]">GP_SECURE_AUTH_KEY</label>
                    
73                <input type="text" name="config[GP_SECURE_AUTH_KEY]" value="<?php echo @$config['GP_SECURE_AUTH_KEY']; ?>" id="config[GP_SECURE_AUTH_KEY]"><br/>
                    
74                <label for="config[GP_LOGGED_IN_KEY]">GP_LOGGED_IN_KEY</label>
                    
                
cryptauth_group_private_key_sharer_impl.cc https://github.com/chromium/chromium.git | C++ | 380 lines
                    
12#include "ash/services/device_sync/cryptauth_ecies_encryptor_impl.h"
                    
13#include "ash/services/device_sync/cryptauth_key.h"
                    
14#include "ash/services/device_sync/cryptauth_task_metrics_logger.h"
                    
                
net_route_dynamic_display.php http://windowsfw.googlecode.com/svn/trunk/ | PHP | 298 lines
                    
165
                    
166$rip_auth_key = $ret_array[0]['RipAuthKey'];
                    
167
                    
185
                    
186$ospf_auth_key = $ret_array[0]['OspfAuthKey'];
                    
187
                    
256                <div>?????
                    
257                  <input type="text" name="rip_auth_key" value=<?php print $rip_auth_key ?>>(?????????,??128???) 
                    
258</div></td>
                    
276                <td>?????
                    
277                <input type="text" name="ospf_auth_key" value=<?php print $ospf_auth_key ?>>(?????????,??128???) </td>
                    
278              </tr>
                    
                
auth.py https://github.com/askedrelic/libgreader.git | Python | 387 lines
                    
143        super(OAuthMethod, self).__init__()
                    
144        self.oauth_key         = consumer_key
                    
145        self.oauth_secret      = consumer_secret
                    
145        self.oauth_secret      = consumer_secret
                    
146        self.consumer          = oauth.Consumer(self.oauth_key, self.oauth_secret)
                    
147        self.authorized_client = None
                    
                
carrier.php https://gitlab.com/ptisky/API_prestashop | PHP | 185 lines
                    
82

                    
83		$webService = new PrestaShopWebservice(PS_SHOP_PATH, PS_WS_AUTH_KEY, DEBUG);        	

                    
84		$opt = array('resource' => 'carriers');

                    
                
submit_to_datazilla.py https://gitlab.com/learnability/gaia | Python | 323 lines
                    
68            'branch': datazilla_config['branch'],
                    
69            'oauth key': datazilla_config['oauth_key'],
                    
70            'oauth secret': datazilla_config['oauth_secret'],
                    
94            project=self.required.get('project'),
                    
95            oauth_key=self.required.get('oauth key'),
                    
96            oauth_secret=self.required.get('oauth secret'),
                    
182            'device_name': options.datazilla_device_name,
                    
183            'oauth_key': options.datazilla_key,
                    
184            'oauth_secret': options.datazilla_secret}
                    
                
svxlinkconf.py https://github.com/eren/python-svxlinkconf.git | Python | 447 lines
                    
172        super(SvxlinkTypeNet, self).__init__("Net", section_name,
                    
173                ["TYPE", "HOST", "TCP_PORT", "AUTH_KEY", "CODEC"],
                    
174                data)
                    
433    def foo(self):
                    
434        #f = SvxlinkTypeNet("ErenTurkay", [("tcp_port", "5220"), ("auth_key", "testtest")])
                    
435        f = self.get_section("Rx1")
                    
                
db.sql https://gitlab.com/mariano55555/gulp | SQL | 111 lines
                    
89  `username` varchar(255) COLLATE utf8_unicode_ci NOT NULL,
                    
90  `auth_key` varchar(32) COLLATE utf8_unicode_ci NOT NULL,
                    
91  `password_hash` varchar(255) COLLATE utf8_unicode_ci NOT NULL,
                    
104/*!40000 ALTER TABLE `user` DISABLE KEYS */;
                    
105INSERT INTO `user` (`id`, `nombres`, `apellidos`, `username`, `auth_key`, `password_hash`, `password_reset_token`, `email`, `status`, `created_at`, `updated_at`) VALUES
                    
106	(1, 'Jorge Mariano', 'Paz Flores', 'mariano', 'kYTbAl_n_xwcMFzJpgEZwpVRUVh5EVot', '$2y$13$zYJaQ5vFDQWQSKRjt2vXnul8fM58bt9RpASS3lObwQdr0OQHOTELi', NULL, 'mariano.paz@gmail.com', 10, '2017-01-26 20:24:06', '2017-01-26 20:24:06');
                    
                
 

Source

Language