Searched refs:auth (Results 176 - 200 of 307) sorted by relevance

1234567891011>>

/freebsd-current/tools/tools/net80211/stumbler/
H A Dstumbler.c603 int cipher, auth; local
623 auth = *ptr;
628 if (auth == WPA_ASE_8021X_PSK)
635 if (auth == WPA_ASE_8021X_PSK)
/freebsd-current/usr.sbin/ppp/
H A Dcommand.c85 #include "auth.h"
224 if ((cmd->lauth & arg->prompt->auth) &&
235 if (cmd->name && (cmd->lauth & arg->prompt->auth)) {
247 if (cmd->name && (cmd->lauth & arg->prompt->auth)) {
551 nargv[arg] = subst(nargv[arg], "AUTHNAME", bundle->cfg.auth.name);
845 {"allow", "auth", RunListCommand, LOCAL_AUTH,
1100 else if (cmd && (!prompt || (cmd->lauth & prompt->auth))) {
1274 (arg->prompt->auth & LOCAL_AUTH)))
1678 strncpy(arg->bundle->cfg.auth.key, argp,
1679 sizeof arg->bundle->cfg.auth
[all...]
/freebsd-current/sys/netinet/
H A Dsctp_auth.h205 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);
/freebsd-current/sys/rpc/
H A Drpc_prot.c54 #include <rpc/auth.h>
69 * (see auth.h)
/freebsd-current/contrib/ntp/include/
H A Dntp_config.h245 auth_node auth; member in struct:config_tree_tag
H A Dntp_request.h144 char mac[MAX_MDG_LEN]; /* (optional) auth code */
154 char mac[MAX_MDG_LEN]; /* (optional) auth code */
225 #define AUTH_SEQ(auth, seq) ((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
/freebsd-current/sys/net80211/
H A Dieee80211_proto.c70 "beacon", "atim", "disassoc", "auth",
471 ieee80211_authenticator_get(int auth) argument
473 if (auth >= IEEE80211_AUTH_MAX)
475 if (authenticators[auth] == NULL)
476 ieee80211_load_module(auth_modnames[auth]);
477 return authenticators[auth];
482 const struct ieee80211_authenticator *auth)
486 authenticators[type] = auth;
481 ieee80211_authenticator_register(int type, const struct ieee80211_authenticator *auth) argument
H A Dieee80211_proto.h224 const struct ieee80211_authenticator *ieee80211_authenticator_get(int auth);
230 * address of each received auth frame for validation.
/freebsd-current/crypto/heimdal/lib/krb5/
H A Dget_cred.c445 self.auth = estrdup("Kerberos");
449 free(self.auth);
455 free(self.auth);
470 free(self.auth);
475 free(self.auth);
/freebsd-current/contrib/wpa/src/common/
H A Dwpa_common.c3297 struct ieee80211_mgmt *auth; local
3302 auth = wpabuf_put(buf, offsetof(struct ieee80211_mgmt,
3303 u.auth.variable));
3305 auth->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) |
3308 os_memcpy(auth->da, dst, ETH_ALEN);
3309 os_memcpy(auth->sa, src, ETH_ALEN);
3310 os_memcpy(auth->bssid, bssid, ETH_ALEN);
3311 auth->seq_ctrl = 0;
3313 auth->u.auth
[all...]
/freebsd-current/sbin/ipf/ipfstat/
H A Dipfstat.c77 "cannot create new auth entry",
78 "packet queued for auth",
81 "auth feedback",
615 * ipfilter (state, auth, nat, fragments).
1789 * Show stats on how auth within IPFilter has been used
1794 ipfgeniter_t auth; local
1799 obj.ipfo_size = sizeof(auth);
1800 obj.ipfo_ptr = &auth;
1802 auth.igi_type = IPFGENITER_AUTH;
1803 auth
[all...]
/freebsd-current/contrib/wpa/src/drivers/
H A Ddriver_nl80211_event.c196 "nl80211: Ignore auth event when using driver SME");
202 if (len < 24 + sizeof(mgmt->u.auth)) {
211 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
212 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg);
213 event.auth.auth_transaction =
214 le_to_host16(mgmt->u.auth.auth_transaction);
215 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code);
216 if (len > 24 + sizeof(mgmt->u.auth)) {
[all...]
/freebsd-current/contrib/wpa/src/eap_common/
H A Deap_eke_common.c687 const struct wpabuf *msgs, u8 *auth)
695 wpabuf_head(msgs), wpabuf_len(msgs), auth);
686 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
/freebsd-current/contrib/wpa/wpa_supplicant/
H A Dwps_supplicant.c1414 settings->ssid_hex, settings->auth,
1905 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local
1918 auth++;
1928 else if (auth)
2123 if (settings->ssid_hex == NULL || settings->auth == NULL ||
2140 if (os_strcmp(settings->auth, "OPEN") == 0)
2142 else if (os_strcmp(settings->auth, "WPAPSK") == 0)
2144 else if (os_strcmp(settings->auth, "WPA2PSK") == 0)
/freebsd-current/sbin/routed/
H A Dinput.c140 struct auth *ap;
941 struct auth *ap;
992 "unknown MD5 RIPv2 auth len %#x"
/freebsd-current/contrib/libfido2/src/
H A Dpin.c695 const char *rpid, cbor_item_t **auth, cbor_item_t **opt, int *ms)
711 if ((*auth = cbor_encode_pin_auth(dev, token, hmac_data)) == NULL ||
693 cbor_add_uv_params(fido_dev_t *dev, uint8_t cmd, const fido_blob_t *hmac_data, const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, const char *rpid, cbor_item_t **auth, cbor_item_t **opt, int *ms) argument
/freebsd-current/contrib/ntp/ntpdc/
H A Dntpdc.c882 * REQ_LEN_NOMAC + 4 + 16 with the auth bit enabled. When using a
894 int auth,
924 if (!auth || (keyid_entered && info_auth_keyid == 0)) {
991 int auth,
1036 res = sendrequest(implcode, reqcode, auth, qitems, qsize, qdata);
1653 * my_delay - set delay for auth requests
891 sendrequest( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata ) argument
988 doquery( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata, size_t *ritems, size_t *rsize, const char **rdata, int quiet_mask, int esize ) argument
/freebsd-current/sys/nlm/
H A Dnlm_advlock.c211 AUTH *auth; local
256 auth = authunix_create(cred);
261 ext.rc_auth = auth;
381 AUTH_DESTROY(auth);
/freebsd-current/sys/nfs/
H A Dkrpc_subr.c62 #include <rpc/auth.h>
78 u_int32_t authtype; /* auth type */
79 u_int32_t authlen; /* auth length */
/freebsd-current/lib/libc/rpc/
H A Dkey_call.c50 #include <rpc/auth.h>
/freebsd-current/sys/netpfil/ipfilter/netinet/
H A Dip_rpcb_pxy.c507 /* Returns: int -- -1 == illegal auth parameters (lengths) */
510 /* auth(I) - pointer to RPC auth structure */
513 /* Record auth data length & location of auth data, then advance past */
517 ipf_p_rpcb_skipauth(rpc_msg_t *rm, xdr_auth_t *auth, u_32_t **buf) argument
523 /* Make sure we have enough space for expected fixed auth parms. */
529 auth->xa_string.xs_len = p;
536 auth->xa_string.xs_str = (char *)p;
/freebsd-current/sys/dev/drm2/
H A Ddrm_ioc32.c222 int auth; /**< Is client authenticated? */ member in struct:drm_client32
243 c32->auth = client.auth;
/freebsd-current/contrib/libpcap/rpcapd/
H A Ddaemon.c1225 struct rpcap_auth auth; // RPCAP authentication header local
1230 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, errmsgbuf);
1240 switch (ntohs(auth.type))
1266 usernamelen = ntohs(auth.slen1);
1287 passwdlen = ntohs(auth.slen2);
/freebsd-current/crypto/openssl/crypto/bio/
H A Dbss_dgram.c805 struct sctp_authchunk auth; local
822 auth.sauth_chunk = OPENSSL_SCTP_DATA_CHUNK_TYPE;
824 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth,
832 auth.sauth_chunk = OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE;
834 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth,
/freebsd-current/lib/libfetch/
H A Dhttp.c628 /* Http auth challenge schemes */
1178 IN char * pszQop, /* qop-value: "", "auth", "auth-int" */
1181 IN HASHHEX HEntity, /* H(entity body) if qop="auth-int" */
1199 if (strcasecmp(pszQop, "auth-int") == 0) {
1233 * [nonce-count] | [auth-param] )
1290 "qop=\"auth\", cnonce=\"%s\", nc=%s%s",
1311 char *upw, *auth; local
1318 auth = http_base64(upw);
1320 if (auth
[all...]

Completed in 291 milliseconds

1234567891011>>