/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | accept_sec_context.c | 314 ap_req.ticket.realm);
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | sme.c | 684 const u8 *realm, *username, *rrk; local 719 &realm, &realm_len, &next_seq_num, 721 realm && realm_len == wpa_s->last_con_fail_realm_len && 722 os_memcmp(realm, wpa_s->last_con_fail_realm, 725 "SME: FILS authentication for this realm failed last time - try to regenerate ERP key hierarchy");
|
H A D | wpa_supplicant.c | 2537 const u8 *realm, *username, *rrk; local 2660 &username_len, &realm, &realm_len, 2664 os_memcmp(wpa_s->last_con_fail_realm, realm, realm_len) != 0)) { 2668 params->fils_erp_realm = realm; 6801 const u8 *realm, *username, *rrk; local 6808 &realm, &realm_len, &next_seq_num, 6810 !realm) 6814 "FILS: Store last connection failure realm", 6815 realm, realm_len); 6820 os_memcpy(wpa_s->last_con_fail_realm, realm, realm_le [all...] |
H A D | config_file.c | 947 if (cred->realm) 948 fprintf(f, "\trealm=\"%s\"\n", cred->realm);
|
H A D | config.c | 2620 os_free(cred->realm); 3386 if (os_strcmp(var, "realm") == 0) { 3387 os_free(cred->realm); 3388 cred->realm = val; 3723 if (os_strcmp(var, "realm") == 0) 3724 return alloc_strdup(cred->realm);
|
H A D | ctrl_iface.c | 3571 "cred id / realm / username / domain / imsi\n"); 3579 cred->id, cred->realm ? cred->realm : "", 7338 const u8 *addr, const char *realm) 7344 rlen = os_strlen(realm); 7352 os_memcpy(buf + 3, realm, rlen); 7380 if (os_strncmp(dst + used, "realm=", 6) == 0) 7386 if (len == 0 && cred && cred->realm) 7387 return hs20_nai_home_realm_list(wpa_s, dst_addr, cred->realm); 7337 hs20_nai_home_realm_list(struct wpa_supplicant *wpa_s, const u8 *addr, const char *realm) argument
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_serf/ |
H A D | ra_serf.h | 1527 const char *realm,
|
/freebsd-11-stable/contrib/serf/ |
H A D | outgoing.c | 987 const char *realm, 1024 code, authn_type, realm, pool); 982 serf__provide_credentials(serf_context_t *ctx, char **username, char **password, serf_request_t *request, void *baton, int code, const char *authn_type, const char *realm, apr_pool_t *pool) argument
|
/freebsd-11-stable/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 2244 const u8 **realm, size_t *realm_len, 2252 realm, realm_len, erp_next_seq_num, rrk, 2242 eapol_sm_get_erp_info(struct eapol_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) argument
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | print.c | 444 validate_print(ctx, HX509_VALIDATE_F_VERBOSE, "%s", kn.realm);
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | cache.c | 1267 if (strcmp(principal->realm, KRB5_REALM_NAME) != 0)
|
/freebsd-11-stable/contrib/wpa/hs20/client/ |
H A D | osu_client.c | 1636 if (set_cred_quoted(ctx->ifname, id, "realm", str) < 0) 1637 wpa_printf(MSG_INFO, "Failed to set cred realm"); 1673 xml_node_t *sim, xml_node_t *realm) 1765 xml_node_t *child, *sim, *realm; local 1771 realm = get_node(ctx->xml, node, "Realm"); 1789 set_pps_cred_sim(ctx, id, child, realm); 1672 set_pps_cred_sim(struct hs20_osu_client *ctx, int id, xml_node_t *sim, xml_node_t *realm) argument
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | cmdline.c | 558 const char *realm, 556 trust_server_cert_non_interactive(svn_auth_cred_ssl_server_trust_t **cred_p, void *baton, const char *realm, apr_uint32_t failures, const svn_auth_ssl_server_cert_info_t *cert_info, svn_boolean_t may_save, apr_pool_t *pool) argument
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | client.c | 248 const char *realm; 250 SVN_ERR(svn_ra_svn__read_cmd_response(conn, pool, "lc", &mechlist, &realm)); 253 return DO_AUTH(sess, mechlist, realm, pool); 247 const char *realm; local
|