/freebsd-current/tools/tools/net80211/stumbler/ |
H A D | stumbler.c | 603 int cipher, auth; local 623 auth = *ptr; 628 if (auth == WPA_ASE_8021X_PSK) 635 if (auth == WPA_ASE_8021X_PSK)
|
/freebsd-current/usr.sbin/ppp/ |
H A D | command.c | 85 #include "auth.h" 224 if ((cmd->lauth & arg->prompt->auth) && 235 if (cmd->name && (cmd->lauth & arg->prompt->auth)) { 247 if (cmd->name && (cmd->lauth & arg->prompt->auth)) { 551 nargv[arg] = subst(nargv[arg], "AUTHNAME", bundle->cfg.auth.name); 845 {"allow", "auth", RunListCommand, LOCAL_AUTH, 1100 else if (cmd && (!prompt || (cmd->lauth & prompt->auth))) { 1274 (arg->prompt->auth & LOCAL_AUTH))) 1678 strncpy(arg->bundle->cfg.auth.key, argp, 1679 sizeof arg->bundle->cfg.auth [all...] |
/freebsd-current/sys/netinet/ |
H A D | sctp_auth.h | 205 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);
|
/freebsd-current/sys/rpc/ |
H A D | rpc_prot.c | 54 #include <rpc/auth.h> 69 * (see auth.h)
|
/freebsd-current/contrib/ntp/include/ |
H A D | ntp_config.h | 245 auth_node auth; member in struct:config_tree_tag
|
H A D | ntp_request.h | 144 char mac[MAX_MDG_LEN]; /* (optional) auth code */ 154 char mac[MAX_MDG_LEN]; /* (optional) auth code */ 225 #define AUTH_SEQ(auth, seq) ((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
|
/freebsd-current/sys/net80211/ |
H A D | ieee80211_proto.c | 70 "beacon", "atim", "disassoc", "auth", 471 ieee80211_authenticator_get(int auth) argument 473 if (auth >= IEEE80211_AUTH_MAX) 475 if (authenticators[auth] == NULL) 476 ieee80211_load_module(auth_modnames[auth]); 477 return authenticators[auth]; 482 const struct ieee80211_authenticator *auth) 486 authenticators[type] = auth; 481 ieee80211_authenticator_register(int type, const struct ieee80211_authenticator *auth) argument
|
H A D | ieee80211_proto.h | 224 const struct ieee80211_authenticator *ieee80211_authenticator_get(int auth); 230 * address of each received auth frame for validation.
|
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | get_cred.c | 445 self.auth = estrdup("Kerberos"); 449 free(self.auth); 455 free(self.auth); 470 free(self.auth); 475 free(self.auth);
|
/freebsd-current/contrib/wpa/src/common/ |
H A D | wpa_common.c | 3297 struct ieee80211_mgmt *auth; local 3302 auth = wpabuf_put(buf, offsetof(struct ieee80211_mgmt, 3303 u.auth.variable)); 3305 auth->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) | 3308 os_memcpy(auth->da, dst, ETH_ALEN); 3309 os_memcpy(auth->sa, src, ETH_ALEN); 3310 os_memcpy(auth->bssid, bssid, ETH_ALEN); 3311 auth->seq_ctrl = 0; 3313 auth->u.auth [all...] |
/freebsd-current/sbin/ipf/ipfstat/ |
H A D | ipfstat.c | 77 "cannot create new auth entry", 78 "packet queued for auth", 81 "auth feedback", 615 * ipfilter (state, auth, nat, fragments). 1789 * Show stats on how auth within IPFilter has been used 1794 ipfgeniter_t auth; local 1799 obj.ipfo_size = sizeof(auth); 1800 obj.ipfo_ptr = &auth; 1802 auth.igi_type = IPFGENITER_AUTH; 1803 auth [all...] |
/freebsd-current/contrib/wpa/src/drivers/ |
H A D | driver_nl80211_event.c | 196 "nl80211: Ignore auth event when using driver SME"); 202 if (len < 24 + sizeof(mgmt->u.auth)) { 211 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 212 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); 213 event.auth.auth_transaction = 214 le_to_host16(mgmt->u.auth.auth_transaction); 215 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); 216 if (len > 24 + sizeof(mgmt->u.auth)) { [all...] |
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.c | 687 const struct wpabuf *msgs, u8 *auth) 695 wpabuf_head(msgs), wpabuf_len(msgs), auth); 686 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
|
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | wps_supplicant.c | 1414 settings->ssid_hex, settings->auth, 1905 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local 1918 auth++; 1928 else if (auth) 2123 if (settings->ssid_hex == NULL || settings->auth == NULL || 2140 if (os_strcmp(settings->auth, "OPEN") == 0) 2142 else if (os_strcmp(settings->auth, "WPAPSK") == 0) 2144 else if (os_strcmp(settings->auth, "WPA2PSK") == 0)
|
/freebsd-current/sbin/routed/ |
H A D | input.c | 140 struct auth *ap; 941 struct auth *ap; 992 "unknown MD5 RIPv2 auth len %#x"
|
/freebsd-current/contrib/libfido2/src/ |
H A D | pin.c | 695 const char *rpid, cbor_item_t **auth, cbor_item_t **opt, int *ms) 711 if ((*auth = cbor_encode_pin_auth(dev, token, hmac_data)) == NULL || 693 cbor_add_uv_params(fido_dev_t *dev, uint8_t cmd, const fido_blob_t *hmac_data, const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, const char *rpid, cbor_item_t **auth, cbor_item_t **opt, int *ms) argument
|
/freebsd-current/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 882 * REQ_LEN_NOMAC + 4 + 16 with the auth bit enabled. When using a 894 int auth, 924 if (!auth || (keyid_entered && info_auth_keyid == 0)) { 991 int auth, 1036 res = sendrequest(implcode, reqcode, auth, qitems, qsize, qdata); 1653 * my_delay - set delay for auth requests 891 sendrequest( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata ) argument 988 doquery( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata, size_t *ritems, size_t *rsize, const char **rdata, int quiet_mask, int esize ) argument
|
/freebsd-current/sys/nlm/ |
H A D | nlm_advlock.c | 211 AUTH *auth; local 256 auth = authunix_create(cred); 261 ext.rc_auth = auth; 381 AUTH_DESTROY(auth);
|
/freebsd-current/sys/nfs/ |
H A D | krpc_subr.c | 62 #include <rpc/auth.h> 78 u_int32_t authtype; /* auth type */ 79 u_int32_t authlen; /* auth length */
|
/freebsd-current/lib/libc/rpc/ |
H A D | key_call.c | 50 #include <rpc/auth.h>
|
/freebsd-current/sys/netpfil/ipfilter/netinet/ |
H A D | ip_rpcb_pxy.c | 507 /* Returns: int -- -1 == illegal auth parameters (lengths) */ 510 /* auth(I) - pointer to RPC auth structure */ 513 /* Record auth data length & location of auth data, then advance past */ 517 ipf_p_rpcb_skipauth(rpc_msg_t *rm, xdr_auth_t *auth, u_32_t **buf) argument 523 /* Make sure we have enough space for expected fixed auth parms. */ 529 auth->xa_string.xs_len = p; 536 auth->xa_string.xs_str = (char *)p;
|
/freebsd-current/sys/dev/drm2/ |
H A D | drm_ioc32.c | 222 int auth; /**< Is client authenticated? */ member in struct:drm_client32 243 c32->auth = client.auth;
|
/freebsd-current/contrib/libpcap/rpcapd/ |
H A D | daemon.c | 1225 struct rpcap_auth auth; // RPCAP authentication header local 1230 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, errmsgbuf); 1240 switch (ntohs(auth.type)) 1266 usernamelen = ntohs(auth.slen1); 1287 passwdlen = ntohs(auth.slen2);
|
/freebsd-current/crypto/openssl/crypto/bio/ |
H A D | bss_dgram.c | 805 struct sctp_authchunk auth; local 822 auth.sauth_chunk = OPENSSL_SCTP_DATA_CHUNK_TYPE; 824 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, 832 auth.sauth_chunk = OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE; 834 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth,
|
/freebsd-current/lib/libfetch/ |
H A D | http.c | 628 /* Http auth challenge schemes */ 1178 IN char * pszQop, /* qop-value: "", "auth", "auth-int" */ 1181 IN HASHHEX HEntity, /* H(entity body) if qop="auth-int" */ 1199 if (strcasecmp(pszQop, "auth-int") == 0) { 1233 * [nonce-count] | [auth-param] ) 1290 "qop=\"auth\", cnonce=\"%s\", nc=%s%s", 1311 char *upw, *auth; local 1318 auth = http_base64(upw); 1320 if (auth [all...] |