/freebsd-current/contrib/wpa/src/drivers/ |
H A D | driver_ndis.c | 1729 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1734 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1752 "enc 0x%x auth 0x%x", 1753 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); 1789 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " 1793 wpa_printf(MSG_MSGDUMP, "NDIS: %lu - auth %d encr %d", 1798 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1801 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1840 "enc 0x%x auth 0x%x", 1841 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); [all...] |
/freebsd-current/contrib/ntp/ntpq/ |
H A D | ntpq.c | 1320 int auth, 1370 if (!auth && !always_auth) { 1504 int auth, 1512 return doqueryex(opcode, associd, auth, qsize, qdata, rstatus, 1525 int auth, 1552 res = sendrequest(opcode, associd, auth, qsize, qdata); 2485 * auth_delay - set delay for auth requests 1317 sendrequest( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata ) argument 1501 doquery( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata ) argument 1522 doqueryex( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata, int quiet ) argument
|
H A D | ntpq-subs.c | 621 int auth, 633 return doquery(op, associd, auth, datalen, data, rstatus, dsize, 1185 const char *auth; local 1200 "ind assid status conf reach auth condition last_event cnt\n"); 1216 auth = "yes"; 1218 auth = "none"; 1226 auth = "ok "; 1228 auth = "bad"; 1230 auth = "none"; 1363 assoc_cache[i].status, conf, reach, auth, 617 doquerylist( struct varlist *vlist, int op, associd_t associd, int auth, u_short *rstatus, size_t *dsize, const char **datap ) argument [all...] |
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | p2p_supplicant.h | 37 int persistent_group, int auto_join, int join, int auth,
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | crmf.h | 142 const ASN1_UTF8STRING *auth);
|
/freebsd-current/sys/dev/iwi/ |
H A D | if_iwireg.h | 432 uint8_t auth; /* type and key */ member in struct:iwi_associate
|
H A D | if_iwi.c | 1392 struct iwi_notif_authentication *auth; local 1434 auth = (struct iwi_notif_authentication *)(notif + 1); 1435 switch (auth->state) { 1470 "unknown authentication state %u\n", auth->state); 2926 * NB: do not arrange for shared key auth w/o privacy 2931 assoc->auth = IWI_AUTH_SHARED; 2939 assoc->auth |= vap->iv_def_txkey << 4; 2975 "auth %u capinfo 0x%x lintval %u bintval %u\n", 2978 assoc->chan, le16toh(assoc->policy), assoc->auth,
|
/freebsd-current/sys/dev/drm2/ |
H A D | drm.h | 230 int auth; /**< Is client authenticated? */ member in struct:drm_client
|
/freebsd-current/lib/libc/rpc/ |
H A D | svc_auth_des.c | 61 #include <rpc/auth.h>
|
/freebsd-current/sys/netinet6/ |
H A D | nd6_rtr.c | 1473 int auth; local 1479 auth = 0; 1486 auth = ((m->m_flags & M_AUTHIPHDR) && 1657 if (auth) {
|
/freebsd-current/sys/dev/usb/wlan/ |
H A D | if_rsu.c | 789 * Only need to set the channel in Monitor mode. AP scanning and auth 1922 struct r92s_fw_cmd_auth auth; local 1939 memset(&auth, 0, sizeof(auth)); 1941 auth.mode = R92S_AUTHMODE_WPA; 1942 auth.dot1x = (ni->ni_authmode == IEEE80211_AUTH_8021X); 1944 auth.mode = R92S_AUTHMODE_OPEN; 1946 "%s: setting auth mode to %d\n", 1947 __func__, auth.mode); 1948 error = rsu_fw_cmd(sc, R92S_CMD_SET_AUTH, &auth, sizeo [all...] |
/freebsd-current/contrib/tcpdump/ |
H A D | print-radius.c | 224 nd_byte auth[16]; /* Authenticator */ member in struct:radius_hdr 1495 ND_PRINT("%02x", rad->auth[auth_idx]);
|
/freebsd-current/usr.sbin/ppp/ |
H A D | chat.c | 63 #include "auth.h" 663 strncpy(result, c->physical->dl->bundle->cfg.auth.key, reslen); 677 strncpy(result, c->physical->dl->bundle->cfg.auth.name, reslen);
|
H A D | bundle.c | 87 #include "auth.h" 827 *bundle.cfg.auth.name = '\0'; 828 *bundle.cfg.auth.key = '\0'; 1082 arg->bundle->cfg.auth.name);
|
/freebsd-current/usr.sbin/ctld/ |
H A D | uclparse.c | 60 const struct auth *ca; 66 log_warnx("chap section in auth-group \"%s\" is missing " 73 log_warnx("chap section in auth-group \"%s\" is missing " 90 const struct auth *ca; 97 log_warnx("chap-mutual section in auth-group \"%s\" is missing " 104 log_warnx("chap-mutual section in auth-group \"%s\" is missing " 111 log_warnx("chap-mutual section in auth-group \"%s\" is missing " 118 log_warnx("chap-mutual section in auth-group \"%s\" is missing " 150 auth_group = ucl_object_find_key(obj, "auth-group-name"); 153 "\"auth [all...] |
/freebsd-current/sys/netinet/ |
H A D | sctp_input.c | 115 /* auth parameter(s) error... send abort */ 2098 struct sctp_auth_chunk *auth; local 2101 auth = (struct sctp_auth_chunk *)sctp_m_getptr(m, auth_offset, auth_len, auth_chunk_buf); 2103 auth = NULL; 2105 if ((auth == NULL) || sctp_handle_auth(stcb, auth, m, auth_offset)) { 2106 /* auth HMAC failed, dump the assoc and packet */ 4434 /* now go back and verify any auth chunk to be sure */ 4436 struct sctp_auth_chunk *auth; local 4439 auth [all...] |
/freebsd-current/sys/netpfil/ipfilter/netinet/ |
H A D | fil.c | 1651 u_short optmsk = 0, secmsk = 0, auth = 0; local 1807 auth = doi & 0xffff; 1820 auth = doi & 0xffff; 1840 if (auth && !(auth & 0x0100)) 1841 auth &= 0xff00; 1844 fi->fi_auth = auth; 1858 u_short secmsk = 0, auth = 0; local 1867 auth = *(s + 3); 1868 auth * [all...] |
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 312 payloads->auth = pdata;
|
/freebsd-current/contrib/wpa/src/ap/ |
H A D | wps_hostapd.c | 1921 const char *auth, const char *encr, const char *key) 1934 if (os_strncmp(auth, "OPEN", 4) == 0) 1937 else if (os_strncmp(auth, "WPAPSK", 6) == 0) 1940 else if (os_strncmp(auth, "WPA2PSK", 7) == 0) 1920 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
|
/freebsd-current/sys/kern/ |
H A D | vfs_export.c | 62 #include <rpc/auth.h>
|
/freebsd-current/contrib/telnet/telnet/ |
H A D | utilities.c | 58 #include <libtelnet/auth.h>
|
/freebsd-current/lib/libc/xdr/ |
H A D | xdr_rec.c | 63 #include <rpc/auth.h>
|
/freebsd-current/sys/net80211/ |
H A D | ieee80211_freebsd.h | 471 _IEEE80211_POLICY_MODULE(auth, name, version)
|
/freebsd-current/contrib/wpa/src/wps/ |
H A D | wps_validate.c | 926 static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory) argument 928 if (auth == NULL) {
|
/freebsd-current/lib/libipsec/ |
H A D | pfkey.c | 1889 u_int auth, u_int enc, u_int32_t flags) 1906 p->sadb_sa_auth = auth; 1888 pfkey_setsadbsa(caddr_t buf, caddr_t lim, u_int32_t spi, u_int wsize, u_int auth, u_int enc, u_int32_t flags) argument
|