Searched refs:auth (Results 126 - 150 of 307) sorted by relevance

1234567891011>>

/freebsd-current/contrib/libpcap/pcap/
H A Dpcap.h1088 int read_timeout, struct pcap_rmtauth *auth, char *errbuf);
1119 struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf);
1201 struct pcap_rmtauth *auth, char *errbuf);
1206 struct pcap_rmtauth *auth, int uses_ssl, char *errbuf);
/freebsd-current/sys/rpc/rpcsec_tls/
H A Dauth_tls.c54 #include <rpc/auth.h>
/freebsd-current/usr.sbin/rrenumd/
H A Drrenumd.c82 u_long auth : 1; member in struct:flags
329 if (flags->auth) {
393 if (flags->auth) {
576 flags.auth = 1;
/freebsd-current/sys/rpc/
H A Dauth_none.c51 #include <rpc/auth.h>
H A Dclnt_dg.c334 AUTH *auth; local
365 auth = ext->rc_auth;
368 auth = cl->cl_auth;
440 (! AUTH_MARSHALL(auth, xid, &xdrs,
702 if (! AUTH_VALIDATE(auth, xid,
708 auth->ah_cred.oa_flavor == RPCSEC_GSS) {
744 AUTH_REFRESH(auth, &reply_msg)) {
772 if (auth && stat != RPC_SUCCESS)
773 AUTH_VALIDATE(auth, xid, NULL, NULL);
H A Dclnt_vc.c295 AUTH *auth; local
323 auth = ext->rc_auth;
326 auth = cl->cl_auth;
379 (! AUTH_MARSHALL(auth, xid, &xdrs,
443 AUTH_VALIDATE(auth, xid, NULL, NULL);
552 if (!AUTH_VALIDATE(auth, xid,
559 ("auth validated but no result"));
570 AUTH_REFRESH(auth, &reply_msg)) {
600 if (auth && stat != RPC_SUCCESS)
601 AUTH_VALIDATE(auth, xi
[all...]
/freebsd-current/lib/libc/rpc/
H A Dauth_none.c47 #include <rpc/auth.h>
H A Dsvc_auth.c53 * using the client auth struct flavor field to index into svcauthsw.
54 * The server auth flavors must implement a routine that looks
143 * A set of null auth methods used by any authentication protocols
147 svcauth_null_wrap(SVCAUTH *auth, XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr) argument
H A Dclnt_perror.c48 #include <rpc/auth.h>
/freebsd-current/crypto/openssh/regress/
H A Drekey.sh56 if ${SSH} -Q cipher-auth | grep '^.*$' >/dev/null 2>&1 ; then
57 for c in `${SSH} -Q cipher-auth`; do
/freebsd-current/contrib/tcpdump/
H A Dprint-zephyr.c46 int auth; member in struct:z_packet
154 0, /* auth */
198 PARSE_FIELD_INT(z.auth);
/freebsd-current/release/tools/
H A Dgce.conf68 *.err;kern.warning;auth.notice;mail.crit /dev/console
/freebsd-current/sbin/routed/
H A Ddefs.h272 struct auth { /* authentication info */ struct in struct:interface
376 struct auth parm_auth[MAX_AUTH_KEYS];
434 extern int auth_ok; /* 1=ignore auth if we do not care */
482 void clr_ws_buf(struct ws_buf *, struct auth *);
599 struct auth *find_auth(struct interface *);
600 void end_md5_auth(struct ws_buf *, struct auth *);
/freebsd-current/contrib/wpa/src/radius/
H A Dradius_client.c252 int sock, int sock6, int auth);
1074 int sock, int sock6, int auth)
1093 auth ? "Authentication" : "Accounting",
1099 if (auth)
1114 if (auth)
1125 if ((auth && entry->msg_type != RADIUS_AUTH) ||
1126 (!auth && entry->msg_type != RADIUS_ACCT))
1167 "RADIUS: No server socket available (af=%d sock=%d sock6=%d auth=%d",
1168 nserv->addr.af, sock, sock6, auth);
1259 if (auth)
1071 radius_change_server(struct radius_client_data *radius, struct hostapd_radius_server *nserv, struct hostapd_radius_server *oserv, int sock, int sock6, int auth) argument
[all...]
/freebsd-current/crypto/openssh/
H A Dsshkey-xmss.c63 u_char *auth; member in struct:ssh_xmss_state
172 (state->auth = calloc(num_auth(state), 1)) == NULL ||
184 state->stacklevels, state->auth, state->keep, state->treehash,
198 free(state->auth);
205 state->auth = NULL;
509 if (state->bds.auth == NULL)
695 (r = sshbuf_put_string(b, state->auth, num_auth(state))) != 0 ||
793 (r = sshbuf_get_string(b, &state->auth, &la)) != 0 ||
827 state->stacklevels, state->auth, state->keep, state->treehash,
954 /* reserve space for encryption of encoded data plus auth ta
[all...]
H A Dauth.h1 /* $OpenBSD: auth.h,v 1.106 2022/06/15 16:08:25 djm Exp $ */
92 /* Last used key and ancillary information from active auth method */
143 * Handling auth method-specific information for logging and prevention
154 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *);
166 #include "auth-pam.h"
213 /* Key / cert options linkage to auth layer */
/freebsd-current/usr.sbin/rpcbind/
H A Drpcb_svc_com.c608 AUTH *auth; local
829 auth = authnone_create();
834 auth = authunix_create(au->aup_machname,
837 if (auth == NULL) /* fall back */
838 auth = authnone_create();
848 if (auth == NULL) {
856 if (!AUTH_MARSHALL(auth, &outxdr)) {
859 AUTH_DESTROY(auth);
865 AUTH_DESTROY(auth);
/freebsd-current/crypto/heimdal/appl/ftp/ftpd/
H A Dsecurity.c432 auth(char *auth_name) function
450 if(mech->auth) {
451 (*mech->auth)(app_data);
842 ret = (*(*m)->auth)(app_data, host);
/freebsd-current/crypto/heimdal/appl/ftp/ftp/
H A Dsecurity.c432 auth(char *auth_name) function
450 if(mech->auth) {
451 (*mech->auth)(app_data);
842 ret = (*(*m)->auth)(app_data, host);
/freebsd-current/contrib/wpa/wpa_supplicant/
H A Dwps_supplicant.h23 const char *auth; member in struct:wps_new_ap_settings
/freebsd-current/contrib/wpa/src/eap_server/
H A Deap_server_sake.c22 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon144
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/freebsd-current/contrib/dma/
H A Ddma.h171 struct smtp_auth_mechanisms auth; member in struct:smtp_features
/freebsd-current/usr.sbin/ctld/
H A Dparse.y212 * auth-group. but only once.
259 const struct auth *ca;
271 const struct auth *ca;
365 log_warnx("discovery-auth-group for portal-group "
373 log_warnx("unknown discovery-auth-group \"%s\" "
612 log_warnx("auth-group for target \"%s\" "
615 log_warnx("cannot use both auth-group and explicit "
622 log_warnx("unknown auth-group \"%s\" for target "
636 log_warnx("cannot use both auth-group and "
637 "auth
[all...]
/freebsd-current/usr.sbin/ppp/
H A Dbundle.h112 } auth; member in struct:bundle::__anon6704
/freebsd-current/contrib/telnet/telnet/
H A Dmain.c47 #include <libtelnet/auth.h>

Completed in 389 milliseconds

1234567891011>>