Searched refs:auth (Results 176 - 200 of 249) sorted by relevance

12345678910

/freebsd-10-stable/contrib/ntp/ntpdc/
H A Dntpdc-opts.def439 .Cm auth ,
641 .Cm auth | Cm bclient |
649 .Cm auth | Cm bclient |
662 .It Cm auth
H A Dntpdc.c863 * REQ_LEN_NOMAC + 4 + 16 with the auth bit enabled. When using a
875 int auth,
905 if (!auth || (keyid_entered && info_auth_keyid == 0)) {
973 int auth,
1018 res = sendrequest(implcode, reqcode, auth, qitems, qsize, qdata);
1654 * my_delay - set delay for auth requests
872 sendrequest( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata ) argument
970 doquery( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata, size_t *ritems, size_t *rsize, const char **rdata, int quiet_mask, int esize ) argument
/freebsd-10-stable/contrib/apr-util/dbd/
H A Dapr_dbd_oracle.c128 OCISession *auth; member in struct:apr_dbd_t
556 ret->status = OCIHandleAlloc(dbd_oracle_env, (dvoid**)&ret->auth,
563 printf("OPEN ERROR %d (alloc auth): %s\n", ret->status, ret->buf);
576 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[0].value,
596 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[1].value,
616 ret->status = OCISessionBegin(ret->svc, ret->err, ret->auth,
636 ret->status = OCIAttrSet(ret->svc, OCI_HTYPE_SVCCTX, ret->auth, 0,
2103 switch (OCISessionEnd(handle->svc, handle->err, handle->auth,
2113 switch (OCIHandleFree((dvoid *) handle->auth, (ub4) OCI_HTYPE_SESSION)) {
/freebsd-10-stable/contrib/mdocml/
H A Dexample.style.css58 div.mandoc span.ref-auth { } /* Reference author (%A). */
/freebsd-10-stable/sbin/routed/
H A Dinput.c150 struct auth *ap;
946 struct auth *ap;
997 "unknown MD5 RIPv2 auth len %#x"
/freebsd-10-stable/contrib/ntp/include/
H A Dntp_request.h144 char mac[MAX_MDG_LEN]; /* (optional) auth code */
154 char mac[MAX_MDG_LEN]; /* (optional) auth code */
225 #define AUTH_SEQ(auth, seq) ((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
/freebsd-10-stable/sys/net80211/
H A Dieee80211_proto.h223 const struct ieee80211_authenticator *ieee80211_authenticator_get(int auth);
229 * address of each received auth frame for validation.
/freebsd-10-stable/sys/nfs/
H A Dkrpc_subr.c64 #include <rpc/auth.h>
80 u_int32_t authtype; /* auth type */
81 u_int32_t authlen; /* auth length */
/freebsd-10-stable/sys/nlm/
H A Dnlm_advlock.c212 AUTH *auth; local
256 auth = authunix_create(cred);
261 ext.rc_auth = auth;
381 AUTH_DESTROY(auth);
/freebsd-10-stable/lib/libc/rpc/
H A Dkey_call.c52 #include <rpc/auth.h>
H A Dsvc_auth_des.c59 #include <rpc/auth.h>
/freebsd-10-stable/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_old_handlers.c717 /***** auth alg */
733 if (capa.auth & (WPA_DRIVER_AUTH_OPEN)) {
739 if (capa.auth & (WPA_DRIVER_AUTH_SHARED)) {
745 if (capa.auth & (WPA_DRIVER_AUTH_LEAP)) {
/freebsd-10-stable/sys/dev/drm2/
H A Ddrm_ioc32.c226 int auth; /**< Is client authenticated? */ member in struct:drm_client32
247 c32->auth = client.auth;
H A Ddrm.h232 int auth; /**< Is client authenticated? */ member in struct:drm_client
/freebsd-10-stable/crypto/openssl/crypto/bio/
H A Dbss_dgram.c914 struct sctp_authchunk auth; local
931 auth.sauth_chunk = OPENSSL_SCTP_DATA_CHUNK_TYPE;
933 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth,
939 auth.sauth_chunk = OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE;
941 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth,
/freebsd-10-stable/lib/libfetch/
H A Dhttp.c627 /* Http auth challenge schemes */
1181 IN char * pszQop, /* qop-value: "", "auth", "auth-int" */
1184 IN HASHHEX HEntity, /* H(entity body) if qop="auth-int" */
1201 if (strcasecmp(pszQop, "auth-int") == 0) {
1235 * [nonce-count] | [auth-param] )
1291 "qop=\"auth\", cnonce=\"%s\", nc=%s%s",
1312 char *upw, *auth; local
1319 auth = http_base64(upw);
1321 if (auth
[all...]
/freebsd-10-stable/contrib/ipfilter/tools/
H A Dipfstat.c114 "cannot create new auth entry",
115 "packet queued for auth",
118 "auth feedback",
640 * ipfilter (state, auth, nat, fragments).
1825 * Show stats on how auth within IPFilter has been used
1831 ipfgeniter_t auth; local
1836 obj.ipfo_size = sizeof(auth);
1837 obj.ipfo_ptr = &auth;
1839 auth.igi_type = IPFGENITER_AUTH;
1840 auth
[all...]
/freebsd-10-stable/contrib/wpa/src/drivers/
H A Ddriver_ndis.c1722 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
1727 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
1745 "enc 0x%x auth 0x%x",
1746 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
1782 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list "
1786 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d",
1791 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
1794 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
1833 "enc 0x%x auth 0x%x",
1834 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
[all...]
/freebsd-10-stable/contrib/ntp/ntpq/
H A Dntpq.c1287 int auth,
1337 if (!auth && !always_auth) {
1471 int auth,
1479 return doqueryex(opcode, associd, auth, qsize, qdata, rstatus,
1492 int auth,
1519 res = sendrequest(opcode, associd, auth, qsize, qdata);
2434 * auth_delay - set delay for auth requests
1284 sendrequest( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata ) argument
1468 doquery( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata ) argument
1489 doqueryex( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata, int quiet ) argument
H A Dntpq-subs.c580 int auth,
592 return doquery(op, associd, auth, datalen, data, rstatus, dsize,
1144 const char *auth; local
1158 "ind assid status conf reach auth condition last_event cnt\n");
1174 auth = "yes";
1176 auth = "none";
1184 auth = "ok ";
1186 auth = "bad";
1188 auth = "none";
1304 assoc_cache[i].status, conf, reach, auth,
576 doquerylist( struct varlist *vlist, int op, associd_t associd, int auth, u_short *rstatus, size_t *dsize, const char **datap ) argument
[all...]
/freebsd-10-stable/contrib/wpa/hostapd/
H A Dctrl_iface.c414 char *ssid, *auth, *encr = NULL, *key = NULL; local
422 auth = pos;
434 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);
/freebsd-10-stable/contrib/wpa/src/ap/
H A Dwps_hostapd.c1431 const char *auth, const char *encr, const char *key)
1444 if (os_strncmp(auth, "OPEN", 4) == 0)
1446 else if (os_strncmp(auth, "WPAPSK", 6) == 0)
1448 else if (os_strncmp(auth, "WPA2PSK", 7) == 0)
1430 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
/freebsd-10-stable/sys/dev/iwi/
H A Dif_iwireg.h368 uint8_t auth; /* type and key */ member in struct:iwi_associate
/freebsd-10-stable/sys/netinet6/
H A Dnd6_rtr.c1084 int auth; local
1088 auth = 0;
1095 auth = ((m->m_flags & M_AUTHIPHDR) &&
1267 if (auth) {
/freebsd-10-stable/contrib/wpa/src/common/
H A Dwpa_common.h186 } auth; member in union:wpa_ptk::__anon418

Completed in 4317 milliseconds

12345678910