Searched refs:auth (Results 51 - 75 of 249) sorted by relevance

12345678910

/freebsd-10-stable/lib/libtelnet/
H A DMakefile20 SRCS+= encrypt.c auth.c enc_des.c sra.c pk.c
/freebsd-10-stable/contrib/telnet/libtelnet/
H A Dkerberos.c72 #include "auth.h"
86 #define KRB_CHALLENGE 3 /* Challenge for mutual auth. */
87 #define KRB_RESPONSE 4 /* Response for mutual auth. */
89 static KTEXT_ST auth; variable
259 memmove((void *)auth.dat, (void *)data, auth.length = cnt);
262 printf("CK: %d:", kerberos4_cksum(auth.dat, auth.length));
263 printd(auth.dat, auth
[all...]
H A Dkrb4encpwd.c87 #include "auth.h"
103 #define KRB4_ENCPWD_CHALLENGE 3 /* Challenge for mutual auth. */
108 static KTEXT_ST auth; variable
213 memmove((void *)auth.dat, (void *)data, auth.length = cnt);
218 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) {
/freebsd-10-stable/contrib/wpa/wpa_supplicant/tests/
H A Dtest_wpa.c40 struct wpa_state_machine *auth; member in struct:wpa
68 wpa_receive(wpa->auth_group, wpa->auth, wpa->supp_eapol,
301 wpa->auth = wpa_auth_sta_init(wpa->auth_group, wpa->supp_addr);
302 if (wpa->auth == NULL) {
307 if (wpa_validate_wpa_ie(wpa->auth_group, wpa->auth, wpa->supp_ie,
313 wpa_auth_sm_event(wpa->auth, WPA_ASSOC);
315 wpa_auth_sta_associated(wpa->auth_group, wpa->auth);
323 wpa_auth_sta_deinit(wpa->auth);
/freebsd-10-stable/tools/regression/rpcsec_gss/
H A Drpctest.c89 AUTH *auth; local
116 auth = NULL;
122 auth = rpc_gss_seccreate(client, service,
128 if (auth)
132 if (!auth) {
138 client->cl_auth = auth;
149 rpc_gss_set_defaults(auth, svc, NULL);
164 AUTH_DESTROY(auth);
/freebsd-10-stable/tools/tools/net80211/scripts/
H A Dsetup.wdsmain23 wlandebug -i $WLAN_AP state+scan+assoc+auth+wds+11n
H A Dsetup.wdsrelay25 wlandebug -i $WLAN_STA state+assoc+auth+wds+scan+11n
/freebsd-10-stable/crypto/openssh/regress/
H A Dtry-ciphers.sh22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
H A Dcert-userkey.sh172 auth=$1
173 if test "x$auth" = "xauthorized_keys" ; then
187 _prefix="${ktype} privsep $privsep $auth"
242 verbose "$tid: ${ktype} $auth revoked CA key"
256 verbose "$tid: $auth CA does not authenticate"
284 for auth in $auth_choice ; do
287 if test "x$auth" = "xauthorized_keys" ; then
304 verbose "$tid: $ident auth $auth expect $result $ktype"
/freebsd-10-stable/include/rpc/
H A Dsvc.h146 SVCAUTH xp_auth; /* interface to auth methods */
216 #define SVCAUTH_WRAP(auth, xdrs, xfunc, xwhere) \
217 ((auth)->svc_ah_ops->svc_ah_wrap(auth, xdrs, xfunc, xwhere))
218 #define SVCAUTH_UNWRAP(auth, xdrs, xfunc, xwhere) \
219 ((auth)->svc_ah_ops->svc_ah_unwrap(auth, xdrs, xfunc, xwhere))
335 * A set of null auth methods used by any authentication protocols
H A DMakefile12 HFILES= auth.h auth_unix.h clnt.h clnt_soc.h clnt_stat.h \
H A Drpc.h52 #include <rpc/auth.h> /* generic authenticator (client side) */
/freebsd-10-stable/usr.sbin/ctld/
H A Dlogin.c280 struct chap *chap, const struct auth **authp)
285 const struct auth *auth; local
313 auth = auth_find(ag, chap_n);
314 if (auth == NULL) {
320 assert(auth->a_secret != NULL);
321 assert(strlen(auth->a_secret) > 0);
323 error = chap_authenticate(chap, auth->a_secret);
327 auth->a_user);
332 *authp = auth;
337 login_send_chap_success(struct pdu *request, const struct auth *auth) argument
405 const struct auth *auth; local
[all...]
/freebsd-10-stable/sys/rpc/
H A Drpcsec_gss.h160 typedef bool_t rpc_gss_set_defaults_ftype(AUTH *auth,
186 typedef void rpc_gss_refresh_auth_ftype(AUTH *auth);
249 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, argument
255 ret = (*rpc_gss_entries.rpc_gss_set_defaults)(auth, service,
413 rpc_gss_refresh_auth_call(AUTH *auth) argument
417 (*rpc_gss_entries.rpc_gss_refresh_auth)(auth);
423 void rpc_gss_refresh_auth(AUTH *auth);
435 bool_t rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service,
463 bool_t __rpc_gss_wrap(AUTH *auth, void *header, size_t headerlen,
465 bool_t __rpc_gss_unwrap(AUTH *auth, XD
[all...]
H A Drpc.h52 #include <rpc/auth.h> /* generic authenticator (client side) */
/freebsd-10-stable/contrib/netbsd-tests/net/if_pppoe/
H A Dt_pppoe.sh135 local auth=$1
140 if [ $auth = "chap" ]; then
145 local setup_serverparam="pppoectl pppoe0 hisauthproto=$auth \
155 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \
215 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \
266 local auth=$1
271 if [ $auth = "chap" ]; then
276 local setup_serverparam="pppoectl pppoe0 hisauthproto=$auth \
287 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \
361 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \
[all...]
/freebsd-10-stable/usr.sbin/ppp/
H A Dradius.c88 #include "auth.h"
266 stype = r->cx.auth ? "auth" : "acct";
272 if (!r->cx.auth) {
281 if (!r->cx.auth) {
291 if (r->cx.auth)
292 auth_Failure(r->cx.auth);
305 if (r->cx.auth)
306 auth_Failure(r->cx.auth); /* unexpected !!! */
315 if (r->cx.auth)
[all...]
H A Dpap.c48 #include "auth.h"
91 namelen = strlen(bundle->cfg.auth.name);
92 keylen = strlen(bundle->cfg.auth.key);
95 log_Printf(LogPHASE, "Pap Output: %s ********\n", bundle->cfg.auth.name);
96 if (*bundle->cfg.auth.name == '\0')
105 memcpy(cp, bundle->cfg.auth.name, namelen);
108 memcpy(cp, bundle->cfg.auth.key, keylen);
/freebsd-10-stable/sys/nfsclient/
H A Dnfs_krpc.c119 uid_t ca_uid; /* uid that corresponds to this auth */
120 AUTH *ca_auth; /* RPC auth handle */
353 AUTH *auth; local
369 auth = rpc_gss_secfind_call(nmp->nm_client, cred,
371 if (auth)
372 return (auth);
440 AUTH *auth = NULL; local
467 auth = nfs_getauth(nmp, cred);
468 if (!auth) {
473 ext.rc_auth = auth;
[all...]
H A Dnfsmount.h44 #include <rpc/auth.h>
81 int nm_secflavor; /* auth flavor to use for rpc */
/freebsd-10-stable/contrib/wpa/wpa_supplicant/
H A Dsme.c473 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
476 MAC2STR(data->auth.peer));
482 MAC2STR(data->auth.peer), data->auth.auth_type,
483 data->auth.auth_transaction, data->auth.status_code);
485 data->auth.ies, data->auth.ies_len);
490 if (data->auth.auth_type == WLAN_AUTH_SAE) {
492 res = sme_sae_auth(wpa_s, data->auth
[all...]
/freebsd-10-stable/contrib/wpa/src/crypto/
H A Daes_wrap.h58 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth);
61 const u8 *aad, size_t aad_len, const u8 *auth,
/freebsd-10-stable/crypto/heimdal/lib/krb5/
H A Dmisc.c73 size = strlen(self->auth);
74 ssize = krb5_storage_write(sp, self->auth, size);
/freebsd-10-stable/contrib/amd/libamu/
H A Dmisc_rpc.c121 make_rpc_packet(char *buf, int buflen, u_long proc, struct rpc_msg *mp, voidp arg, XDRPROC_T_TYPE arg_xdr, AUTH *auth) argument
150 if (!AUTH_MARSHALL(auth, &msg_xdr))
/freebsd-10-stable/contrib/wpa/src/ap/
H A Dwps_hostapd.h33 const char *auth, const char *encr, const char *key);

Completed in 481 milliseconds

12345678910