/freebsd-11-stable/include/rpc/ |
H A D | svc.h | 147 SVCAUTH xp_auth; /* interface to auth methods */ 217 #define SVCAUTH_WRAP(auth, xdrs, xfunc, xwhere) \ 218 ((auth)->svc_ah_ops->svc_ah_wrap(auth, xdrs, xfunc, xwhere)) 219 #define SVCAUTH_UNWRAP(auth, xdrs, xfunc, xwhere) \ 220 ((auth)->svc_ah_ops->svc_ah_unwrap(auth, xdrs, xfunc, xwhere)) 336 * A set of null auth methods used by any authentication protocols
|
H A D | Makefile | 12 HFILES= auth.h auth_unix.h clnt.h clnt_soc.h clnt_stat.h \
|
H A D | rpc.h | 52 #include <rpc/auth.h> /* generic authenticator (client side) */
|
/freebsd-11-stable/usr.sbin/ctld/ |
H A D | login.c | 282 struct chap *chap, const struct auth **authp) 287 const struct auth *auth; local 315 auth = auth_find(ag, chap_n); 316 if (auth == NULL) { 322 assert(auth->a_secret != NULL); 323 assert(strlen(auth->a_secret) > 0); 325 error = chap_authenticate(chap, auth->a_secret); 329 auth->a_user); 334 *authp = auth; 339 login_send_chap_success(struct pdu *request, const struct auth *auth) argument 407 const struct auth *auth; local [all...] |
/freebsd-11-stable/sys/rpc/ |
H A D | rpcsec_gss.h | 160 typedef bool_t rpc_gss_set_defaults_ftype(AUTH *auth, 186 typedef void rpc_gss_refresh_auth_ftype(AUTH *auth); 249 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, argument 255 ret = (*rpc_gss_entries.rpc_gss_set_defaults)(auth, service, 413 rpc_gss_refresh_auth_call(AUTH *auth) argument 417 (*rpc_gss_entries.rpc_gss_refresh_auth)(auth); 423 void rpc_gss_refresh_auth(AUTH *auth); 435 bool_t rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, 463 bool_t __rpc_gss_wrap(AUTH *auth, void *header, size_t headerlen, 465 bool_t __rpc_gss_unwrap(AUTH *auth, XD [all...] |
H A D | rpc.h | 52 #include <rpc/auth.h> /* generic authenticator (client side) */
|
/freebsd-11-stable/contrib/netbsd-tests/net/if_pppoe/ |
H A D | t_pppoe.sh | 135 local auth=$1 140 if [ $auth = "chap" ]; then 145 local setup_serverparam="pppoectl pppoe0 hisauthproto=$auth \ 155 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \ 215 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \ 266 local auth=$1 271 if [ $auth = "chap" ]; then 276 local setup_serverparam="pppoectl pppoe0 hisauthproto=$auth \ 287 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \ 361 local setup_clientparam="pppoectl pppoe0 myauthproto=$auth \ [all...] |
/freebsd-11-stable/usr.sbin/ppp/ |
H A D | radius.c | 90 #include "auth.h" 268 stype = r->cx.auth ? "auth" : "acct"; 274 if (!r->cx.auth) { 283 if (!r->cx.auth) { 293 if (r->cx.auth) 294 auth_Failure(r->cx.auth); 307 if (r->cx.auth) 308 auth_Failure(r->cx.auth); /* unexpected !!! */ 317 if (r->cx.auth) [all...] |
H A D | pap.c | 50 #include "auth.h" 93 namelen = strlen(bundle->cfg.auth.name); 94 keylen = strlen(bundle->cfg.auth.key); 97 log_Printf(LogPHASE, "Pap Output: %s ********\n", bundle->cfg.auth.name); 98 if (*bundle->cfg.auth.name == '\0') 107 memcpy(cp, bundle->cfg.auth.name, namelen); 110 memcpy(cp, bundle->cfg.auth.key, keylen);
|
H A D | radius.h | 48 struct authinfo *auth; /* Tell this about success/failure */ member in struct:radius::__anon8887
|
H A D | prompt.h | 47 u_char auth; /* Local Authorized status */ member in struct:prompt
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | dpp.h | 412 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, 414 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth, 416 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, 418 int dpp_notify_new_qr_code(struct dpp_authentication *auth, 429 struct dpp_authentication *auth, 431 void dpp_auth_deinit(struct dpp_authentication *auth); 433 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, 435 int dpp_conf_resp_rx(struct dpp_authentication *auth, 437 enum dpp_status_error dpp_conf_result_rx(struct dpp_authentication *auth, 440 struct wpabuf * dpp_build_conf_result(struct dpp_authentication *auth, [all...] |
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_privsep.c | 384 struct privsep_event_auth *auth; local 387 if (len < sizeof(*auth)) 389 auth = (struct privsep_event_auth *) buf; 390 if (len < sizeof(*auth) + auth->ies_len) 393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); 394 os_memcpy(data.auth.bssid, auth->bssid, ETH_ALEN); 395 data.auth [all...] |
/freebsd-11-stable/contrib/libpcap/testprogs/ |
H A D | findalldevstest.c | 105 struct pcap_rmtauth auth; local 126 auth.type = RPCAP_RMTAUTH_PWD; 127 auth.username = username; 128 auth.password = password; 129 if (pcap_findalldevs_ex(argv[1], &auth, &alldevs, errbuf) == -1)
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | sme.c | 917 u.auth.variable)); 924 resp->u.auth.auth_alg = host_to_le16(WLAN_AUTH_SAE); 926 resp->u.auth.auth_transaction = host_to_le16(auth_transaction); 927 resp->u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS); 1207 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth); 1216 if (le_to_host16(header->u.auth.auth_alg) == WLAN_AUTH_SAE) { 1220 wpa_s, le_to_host16(header->u.auth.auth_transaction), 1221 le_to_host16(header->u.auth.status_code), 1222 header->u.auth.variable, 1259 if (os_memcmp(wpa_s->pending_bssid, data->auth [all...] |
H A D | ibss_rsn.h | 40 struct wpa_state_machine *auth; member in struct:ibss_rsn_peer
|
H A D | mesh_rsn.h | 14 struct wpa_authenticator *auth; member in struct:mesh_rsn
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | misc.c | 73 size = strlen(self->auth); 74 ssize = krb5_storage_write(sp, self->auth, size);
|
/freebsd-11-stable/contrib/amd/libamu/ |
H A D | misc_rpc.c | 121 make_rpc_packet(char *buf, int buflen, u_long proc, struct rpc_msg *mp, voidp arg, XDRPROC_T_TYPE arg_xdr, AUTH *auth) argument 150 if (!AUTH_MARSHALL(auth, &msg_xdr))
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | cert-userkey.sh | 172 auth=$1 173 if test "x$auth" = "xauthorized_keys" ; then 187 _prefix="${ktype} privsep $privsep $auth" 242 verbose "$tid: ${ktype} $auth revoked CA key" 256 verbose "$tid: $auth CA does not authenticate" 284 for auth in $auth_choice ; do 287 if test "x$auth" = "xauthorized_keys" ; then 304 verbose "$tid: $ident auth $auth expect $result $ktype"
|
H A D | cipher-speed.sh | 28 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
|
/freebsd-11-stable/sys/cddl/contrib/opensolaris/uts/common/os/ |
H A D | fm.c | 874 * auth nvlist_t <auth> 878 * Note that auth and hc-id are optional members. 885 fm_fmri_hc_set_common(nvlist_t *fmri, int version, const nvlist_t *auth) argument 898 if (auth != NULL && nvlist_add_nvlist(fmri, FM_FMRI_AUTHORITY, 899 (nvlist_t *)auth) != 0) { 908 fm_fmri_hc_set(nvlist_t *fmri, int version, const nvlist_t *auth, argument 916 if (!fm_fmri_hc_set_common(fmri, version, auth)) 958 * auth nvlist_t <auth> 966 fm_fmri_dev_set(nvlist_t *fmri_dev, int version, const nvlist_t *auth, const char *devpath, const char *devid, const char *tpl0) argument 1012 fm_fmri_cpu_set(nvlist_t *fmri_cpu, int version, const nvlist_t *auth, uint32_t cpu_id, uint8_t *cpu_maskp, const char *serial_idp) argument 1063 fm_fmri_mem_set(nvlist_t *fmri, int version, const nvlist_t *auth, const char *unum, const char *serial, uint64_t offset) argument 1303 fm_fmri_hc_create(nvlist_t *fmri, int version, const nvlist_t *auth, nvlist_t *snvl, nvlist_t *bboard, int npairs, ...) argument [all...] |
/freebsd-11-stable/lib/libc/rpc/ |
H A D | authdes_prot.c | 45 #include <rpc/auth.h>
|
/freebsd-11-stable/sys/nfsclient/ |
H A D | nfsmount.h | 44 #include <rpc/auth.h> 81 int nm_secflavor; /* auth flavor to use for rpc */
|
/freebsd-11-stable/contrib/mdocml/ |
H A D | mdoc.h | 131 enum mdoc_auth auth; /* -split, etc. */ member in struct:mdoc_an
|