/freebsd-10-stable/lib/libtelnet/ |
H A D | Makefile | 20 SRCS+= encrypt.c auth.c enc_des.c sra.c pk.c
|
/freebsd-10-stable/contrib/telnet/libtelnet/ |
H A D | kerberos.c | 72 #include "auth.h" 86 #define KRB_CHALLENGE 3 /* Challenge for mutual auth. */ 87 #define KRB_RESPONSE 4 /* Response for mutual auth. */ 89 static KTEXT_ST auth; variable 259 memmove((void *)auth.dat, (void *)data, auth.length = cnt); 262 printf("CK: %d:", kerberos4_cksum(auth.dat, auth.length)); 263 printd(auth.dat, auth [all...] |
H A D | krb4encpwd.c | 87 #include "auth.h" 103 #define KRB4_ENCPWD_CHALLENGE 3 /* Challenge for mutual auth. */ 108 static KTEXT_ST auth; variable 213 memmove((void *)auth.dat, (void *)data, auth.length = cnt); 218 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) {
|
/freebsd-10-stable/contrib/wpa/wpa_supplicant/tests/ |
H A D | test_wpa.c | 40 struct wpa_state_machine *auth; member in struct:wpa 68 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol, 301 wpa->auth = wpa_auth_sta_init(wpa->auth_group, wpa->supp_addr); 302 if (wpa->auth == NULL) { 307 if (wpa_validate_wpa_ie(wpa->auth_group, wpa->auth, wpa->supp_ie, 313 wpa_auth_sm_event(wpa->auth, WPA_ASSOC); 315 wpa_auth_sta_associated(wpa->auth_group, wpa->auth); 323 wpa_auth_sta_deinit(wpa->auth);
|
/freebsd-10-stable/tools/regression/rpcsec_gss/ |
H A D | rpctest.c | 89 AUTH *auth; local 116 auth = NULL; 122 auth = rpc_gss_seccreate(client, service, 128 if (auth) 132 if (!auth) { 138 client->cl_auth = auth; 149 rpc_gss_set_defaults(auth, svc, NULL); 164 AUTH_DESTROY(auth);
|
/freebsd-10-stable/tools/tools/net80211/scripts/ |
H A D | setup.wdsmain | 23 wlandebug -i $WLAN_AP state+scan+assoc+auth+wds+11n
|
H A D | setup.wdsrelay | 25 wlandebug -i $WLAN_STA state+assoc+auth+wds+scan+11n
|
/freebsd-10-stable/crypto/openssh/regress/ |
H A D | try-ciphers.sh | 22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
|
H A D | cert-userkey.sh | 172 auth=$1 173 if test "x$auth" = "xauthorized_keys" ; then 187 _prefix="${ktype} privsep $privsep $auth" 242 verbose "$tid: ${ktype} $auth revoked CA key" 256 verbose "$tid: $auth CA does not authenticate" 284 for auth in $auth_choice ; do 287 if test "x$auth" = "xauthorized_keys" ; then 304 verbose "$tid: $ident auth $auth expect $result $ktype"
|
/freebsd-10-stable/include/rpc/ |
H A D | svc.h | 146 SVCAUTH xp_auth; /* interface to auth methods */ 216 #define SVCAUTH_WRAP(auth, xdrs, xfunc, xwhere) \ 217 ((auth)->svc_ah_ops->svc_ah_wrap(auth, xdrs, xfunc, xwhere)) 218 #define SVCAUTH_UNWRAP(auth, xdrs, xfunc, xwhere) \ 219 ((auth)->svc_ah_ops->svc_ah_unwrap(auth, xdrs, xfunc, xwhere)) 335 * A set of null auth methods used by any authentication protocols
|
H A D | Makefile | 12 HFILES= auth.h auth_unix.h clnt.h clnt_soc.h clnt_stat.h \
|
H A D | rpc.h | 52 #include <rpc/auth.h> /* generic authenticator (client side) */
|
/freebsd-10-stable/usr.sbin/ctld/ |
H A D | login.c | 280 struct chap *chap, const struct auth **authp) 285 const struct auth *auth; local 313 auth = auth_find(ag, chap_n); 314 if (auth == NULL) { 320 assert(auth->a_secret != NULL); 321 assert(strlen(auth->a_secret) > 0); 323 error = chap_authenticate(chap, auth->a_secret); 327 auth->a_user); 332 *authp = auth; 337 login_send_chap_success(struct pdu *request, const struct auth *auth) argument 405 const struct auth *auth; local [all...] |
/freebsd-10-stable/sys/rpc/ |
H A D | rpcsec_gss.h | 160 typedef bool_t rpc_gss_set_defaults_ftype(AUTH *auth, 186 typedef void rpc_gss_refresh_auth_ftype(AUTH *auth); 249 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, argument 255 ret = (*rpc_gss_entries.rpc_gss_set_defaults)(auth, service, 413 rpc_gss_refresh_auth_call(AUTH *auth) argument 417 (*rpc_gss_entries.rpc_gss_refresh_auth)(auth); 423 void rpc_gss_refresh_auth(AUTH *auth); 435 bool_t rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, 463 bool_t __rpc_gss_wrap(AUTH *auth, void *header, size_t headerlen, 465 bool_t __rpc_gss_unwrap(AUTH *auth, XD [all...] |
H A D | rpc.h | 52 #include <rpc/auth.h> /* generic authenticator (client side) */
|
/freebsd-10-stable/contrib/netbsd-tests/net/if_pppoe/ |
H A D | t_pppoe.sh | 135 local auth=$1 140 if [ $auth = "chap" ]; then 145 local setup_serverparam="pppoectl pppoe0 hisauthproto=$auth \ 155 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \ 215 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \ 266 local auth=$1 271 if [ $auth = "chap" ]; then 276 local setup_serverparam="pppoectl pppoe0 hisauthproto=$auth \ 287 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \ 361 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \ [all...] |
/freebsd-10-stable/usr.sbin/ppp/ |
H A D | radius.c | 88 #include "auth.h" 266 stype = r->cx.auth ? "auth" : "acct"; 272 if (!r->cx.auth) { 281 if (!r->cx.auth) { 291 if (r->cx.auth) 292 auth_Failure(r->cx.auth); 305 if (r->cx.auth) 306 auth_Failure(r->cx.auth); /* unexpected !!! */ 315 if (r->cx.auth) [all...] |
H A D | pap.c | 48 #include "auth.h" 91 namelen = strlen(bundle->cfg.auth.name); 92 keylen = strlen(bundle->cfg.auth.key); 95 log_Printf(LogPHASE, "Pap Output: %s ********\n", bundle->cfg.auth.name); 96 if (*bundle->cfg.auth.name == '\0') 105 memcpy(cp, bundle->cfg.auth.name, namelen); 108 memcpy(cp, bundle->cfg.auth.key, keylen);
|
/freebsd-10-stable/sys/nfsclient/ |
H A D | nfs_krpc.c | 119 uid_t ca_uid; /* uid that corresponds to this auth */ 120 AUTH *ca_auth; /* RPC auth handle */ 353 AUTH *auth; local 369 auth = rpc_gss_secfind_call(nmp->nm_client, cred, 371 if (auth) 372 return (auth); 440 AUTH *auth = NULL; local 467 auth = nfs_getauth(nmp, cred); 468 if (!auth) { 473 ext.rc_auth = auth; [all...] |
H A D | nfsmount.h | 44 #include <rpc/auth.h> 81 int nm_secflavor; /* auth flavor to use for rpc */
|
/freebsd-10-stable/contrib/wpa/wpa_supplicant/ |
H A D | sme.c | 473 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { 476 MAC2STR(data->auth.peer)); 482 MAC2STR(data->auth.peer), data->auth.auth_type, 483 data->auth.auth_transaction, data->auth.status_code); 485 data->auth.ies, data->auth.ies_len); 490 if (data->auth.auth_type == WLAN_AUTH_SAE) { 492 res = sme_sae_auth(wpa_s, data->auth [all...] |
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | aes_wrap.h | 58 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 61 const u8 *aad, size_t aad_len, const u8 *auth,
|
/freebsd-10-stable/crypto/heimdal/lib/krb5/ |
H A D | misc.c | 73 size = strlen(self->auth); 74 ssize = krb5_storage_write(sp, self->auth, size);
|
/freebsd-10-stable/contrib/amd/libamu/ |
H A D | misc_rpc.c | 121 make_rpc_packet(char *buf, int buflen, u_long proc, struct rpc_msg *mp, voidp arg, XDRPROC_T_TYPE arg_xdr, AUTH *auth) argument 150 if (!AUTH_MARSHALL(auth, &msg_xdr))
|
/freebsd-10-stable/contrib/wpa/src/ap/ |
H A D | wps_hostapd.h | 33 const char *auth, const char *encr, const char *key);
|