/freebsd-10-stable/contrib/ntp/ntpdc/ |
H A D | ntpdc-opts.def | 439 .Cm auth , 641 .Cm auth | Cm bclient | 649 .Cm auth | Cm bclient | 662 .It Cm auth
|
H A D | ntpdc.c | 863 * REQ_LEN_NOMAC + 4 + 16 with the auth bit enabled. When using a 875 int auth, 905 if (!auth || (keyid_entered && info_auth_keyid == 0)) { 973 int auth, 1018 res = sendrequest(implcode, reqcode, auth, qitems, qsize, qdata); 1654 * my_delay - set delay for auth requests 872 sendrequest( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata ) argument 970 doquery( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata, size_t *ritems, size_t *rsize, const char **rdata, int quiet_mask, int esize ) argument
|
/freebsd-10-stable/contrib/apr-util/dbd/ |
H A D | apr_dbd_oracle.c | 128 OCISession *auth; member in struct:apr_dbd_t 556 ret->status = OCIHandleAlloc(dbd_oracle_env, (dvoid**)&ret->auth, 563 printf("OPEN ERROR %d (alloc auth): %s\n", ret->status, ret->buf); 576 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[0].value, 596 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[1].value, 616 ret->status = OCISessionBegin(ret->svc, ret->err, ret->auth, 636 ret->status = OCIAttrSet(ret->svc, OCI_HTYPE_SVCCTX, ret->auth, 0, 2103 switch (OCISessionEnd(handle->svc, handle->err, handle->auth, 2113 switch (OCIHandleFree((dvoid *) handle->auth, (ub4) OCI_HTYPE_SESSION)) {
|
/freebsd-10-stable/contrib/mdocml/ |
H A D | example.style.css | 58 div.mandoc span.ref-auth { } /* Reference author (%A). */
|
/freebsd-10-stable/sbin/routed/ |
H A D | input.c | 150 struct auth *ap; 946 struct auth *ap; 997 "unknown MD5 RIPv2 auth len %#x"
|
/freebsd-10-stable/contrib/ntp/include/ |
H A D | ntp_request.h | 144 char mac[MAX_MDG_LEN]; /* (optional) auth code */ 154 char mac[MAX_MDG_LEN]; /* (optional) auth code */ 225 #define AUTH_SEQ(auth, seq) ((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
|
/freebsd-10-stable/sys/net80211/ |
H A D | ieee80211_proto.h | 223 const struct ieee80211_authenticator *ieee80211_authenticator_get(int auth); 229 * address of each received auth frame for validation.
|
/freebsd-10-stable/sys/nfs/ |
H A D | krpc_subr.c | 64 #include <rpc/auth.h> 80 u_int32_t authtype; /* auth type */ 81 u_int32_t authlen; /* auth length */
|
/freebsd-10-stable/sys/nlm/ |
H A D | nlm_advlock.c | 212 AUTH *auth; local 256 auth = authunix_create(cred); 261 ext.rc_auth = auth; 381 AUTH_DESTROY(auth);
|
/freebsd-10-stable/lib/libc/rpc/ |
H A D | key_call.c | 52 #include <rpc/auth.h>
|
H A D | svc_auth_des.c | 59 #include <rpc/auth.h>
|
/freebsd-10-stable/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_old_handlers.c | 717 /***** auth alg */ 733 if (capa.auth & (WPA_DRIVER_AUTH_OPEN)) { 739 if (capa.auth & (WPA_DRIVER_AUTH_SHARED)) { 745 if (capa.auth & (WPA_DRIVER_AUTH_LEAP)) {
|
/freebsd-10-stable/sys/dev/drm2/ |
H A D | drm_ioc32.c | 226 int auth; /**< Is client authenticated? */ member in struct:drm_client32 247 c32->auth = client.auth;
|
H A D | drm.h | 232 int auth; /**< Is client authenticated? */ member in struct:drm_client
|
/freebsd-10-stable/crypto/openssl/crypto/bio/ |
H A D | bss_dgram.c | 914 struct sctp_authchunk auth; local 931 auth.sauth_chunk = OPENSSL_SCTP_DATA_CHUNK_TYPE; 933 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, 939 auth.sauth_chunk = OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE; 941 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth,
|
/freebsd-10-stable/lib/libfetch/ |
H A D | http.c | 627 /* Http auth challenge schemes */ 1181 IN char * pszQop, /* qop-value: "", "auth", "auth-int" */ 1184 IN HASHHEX HEntity, /* H(entity body) if qop="auth-int" */ 1201 if (strcasecmp(pszQop, "auth-int") == 0) { 1235 * [nonce-count] | [auth-param] ) 1291 "qop=\"auth\", cnonce=\"%s\", nc=%s%s", 1312 char *upw, *auth; local 1319 auth = http_base64(upw); 1321 if (auth [all...] |
/freebsd-10-stable/contrib/ipfilter/tools/ |
H A D | ipfstat.c | 114 "cannot create new auth entry", 115 "packet queued for auth", 118 "auth feedback", 640 * ipfilter (state, auth, nat, fragments). 1825 * Show stats on how auth within IPFilter has been used 1831 ipfgeniter_t auth; local 1836 obj.ipfo_size = sizeof(auth); 1837 obj.ipfo_ptr = &auth; 1839 auth.igi_type = IPFGENITER_AUTH; 1840 auth [all...] |
/freebsd-10-stable/contrib/wpa/src/drivers/ |
H A D | driver_ndis.c | 1722 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1727 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1745 "enc 0x%x auth 0x%x", 1746 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); 1782 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " 1786 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d", 1791 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1794 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1833 "enc 0x%x auth 0x%x", 1834 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); [all...] |
/freebsd-10-stable/contrib/ntp/ntpq/ |
H A D | ntpq.c | 1287 int auth, 1337 if (!auth && !always_auth) { 1471 int auth, 1479 return doqueryex(opcode, associd, auth, qsize, qdata, rstatus, 1492 int auth, 1519 res = sendrequest(opcode, associd, auth, qsize, qdata); 2434 * auth_delay - set delay for auth requests 1284 sendrequest( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata ) argument 1468 doquery( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata ) argument 1489 doqueryex( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata, int quiet ) argument
|
H A D | ntpq-subs.c | 580 int auth, 592 return doquery(op, associd, auth, datalen, data, rstatus, dsize, 1144 const char *auth; local 1158 "ind assid status conf reach auth condition last_event cnt\n"); 1174 auth = "yes"; 1176 auth = "none"; 1184 auth = "ok "; 1186 auth = "bad"; 1188 auth = "none"; 1304 assoc_cache[i].status, conf, reach, auth, 576 doquerylist( struct varlist *vlist, int op, associd_t associd, int auth, u_short *rstatus, size_t *dsize, const char **datap ) argument [all...] |
/freebsd-10-stable/contrib/wpa/hostapd/ |
H A D | ctrl_iface.c | 414 char *ssid, *auth, *encr = NULL, *key = NULL; local 422 auth = pos; 434 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);
|
/freebsd-10-stable/contrib/wpa/src/ap/ |
H A D | wps_hostapd.c | 1431 const char *auth, const char *encr, const char *key) 1444 if (os_strncmp(auth, "OPEN", 4) == 0) 1446 else if (os_strncmp(auth, "WPAPSK", 6) == 0) 1448 else if (os_strncmp(auth, "WPA2PSK", 7) == 0) 1430 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
|
/freebsd-10-stable/sys/dev/iwi/ |
H A D | if_iwireg.h | 368 uint8_t auth; /* type and key */ member in struct:iwi_associate
|
/freebsd-10-stable/sys/netinet6/ |
H A D | nd6_rtr.c | 1084 int auth; local 1088 auth = 0; 1095 auth = ((m->m_flags & M_AUTHIPHDR) && 1267 if (auth) {
|
/freebsd-10-stable/contrib/wpa/src/common/ |
H A D | wpa_common.h | 186 } auth; member in union:wpa_ptk::__anon418
|