/freebsd-11-stable/sys/mips/cavium/cryptocteon/ |
H A D | cavium_crypto.c | 233 octo_calc_hash(uint8_t auth, unsigned char *key, uint64_t *inner, uint64_t *outer) argument 243 memcpy(hash_key, (uint8_t *) key, (auth ? 20 : 16)); 245 if (auth) { 268 if (auth) 275 if (auth) { 281 memcpy(hash_key, (uint8_t *) key, (auth ? 20 : 16)); 283 if (auth) { 306 if (auth) 313 if (auth) {
|
/freebsd-11-stable/sys/dev/usb/wlan/ |
H A D | if_rsu.c | 1360 struct r92s_fw_cmd_auth auth; local 1396 memset(&auth, 0, sizeof(auth)); 1398 auth.mode = R92S_AUTHMODE_WPA; 1399 auth.dot1x = (ni->ni_authmode == IEEE80211_AUTH_8021X); 1401 auth.mode = R92S_AUTHMODE_OPEN; 1403 "%s: setting auth mode to %d\n", 1404 __func__, auth.mode); 1405 error = rsu_fw_cmd(sc, R92S_CMD_SET_AUTH, &auth, sizeof(auth)); [all...] |
/freebsd-11-stable/contrib/apr-util/dbd/ |
H A D | apr_dbd_oracle.c | 128 OCISession *auth; member in struct:apr_dbd_t 556 ret->status = OCIHandleAlloc(dbd_oracle_env, (dvoid**)&ret->auth, 563 printf("OPEN ERROR %d (alloc auth): %s\n", ret->status, ret->buf); 576 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[0].value, 596 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[1].value, 616 ret->status = OCISessionBegin(ret->svc, ret->err, ret->auth, 636 ret->status = OCIAttrSet(ret->svc, OCI_HTYPE_SVCCTX, ret->auth, 0, 2103 switch (OCISessionEnd(handle->svc, handle->err, handle->auth, 2113 switch (OCIHandleFree((dvoid *) handle->auth, (ub4) OCI_HTYPE_SESSION)) {
|
/freebsd-11-stable/sbin/routed/ |
H A D | input.c | 150 struct auth *ap; 951 struct auth *ap; 1002 "unknown MD5 RIPv2 auth len %#x"
|
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-radius.c | 182 uint8_t auth[16]; /* Authenticator */ member in struct:radius_hdr 984 ND_PRINT((ndo, "%02x", rad->auth[auth_idx]));
|
/freebsd-11-stable/usr.sbin/ctld/ |
H A D | uclparse.c | 60 const struct auth *ca; 65 log_warnx("chap section in auth-group \"%s\" is missing " 72 log_warnx("chap section in auth-group \"%s\" is missing " 89 const struct auth *ca; 95 log_warnx("chap-mutual section in auth-group \"%s\" is missing " 102 log_warnx("chap-mutual section in auth-group \"%s\" is missing " 109 log_warnx("chap-mutual section in auth-group \"%s\" is missing " 116 log_warnx("chap-mutual section in auth-group \"%s\" is missing " 148 auth_group = ucl_object_find_key(obj, "auth-group-name"); 151 "\"auth [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.c | 687 const struct wpabuf *msgs, u8 *auth) 695 wpabuf_head(msgs), wpabuf_len(msgs), auth); 686 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wps_supplicant.c | 1391 settings->ssid_hex, settings->auth, 1865 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local 1878 auth++; 1888 else if (auth) 2083 if (settings->ssid_hex == NULL || settings->auth == NULL || 2100 if (os_strcmp(settings->auth, "OPEN") == 0) 2102 else if (os_strcmp(settings->auth, "WPAPSK") == 0) 2104 else if (os_strcmp(settings->auth, "WPA2PSK") == 0)
|
/freebsd-11-stable/contrib/ntp/include/ |
H A D | ntp_request.h | 144 char mac[MAX_MDG_LEN]; /* (optional) auth code */ 154 char mac[MAX_MDG_LEN]; /* (optional) auth code */ 225 #define AUTH_SEQ(auth, seq) ((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
|
/freebsd-11-stable/lib/libc/rpc/ |
H A D | key_call.c | 52 #include <rpc/auth.h>
|
H A D | svc_auth_des.c | 59 #include <rpc/auth.h>
|
/freebsd-11-stable/sys/nfs/ |
H A D | krpc_subr.c | 64 #include <rpc/auth.h> 80 u_int32_t authtype; /* auth type */ 81 u_int32_t authlen; /* auth length */
|
/freebsd-11-stable/sys/nlm/ |
H A D | nlm_advlock.c | 212 AUTH *auth; local 256 auth = authunix_create(cred); 261 ext.rc_auth = auth; 381 AUTH_DESTROY(auth);
|
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_proto.h | 219 const struct ieee80211_authenticator *ieee80211_authenticator_get(int auth); 225 * address of each received auth frame for validation.
|
/freebsd-11-stable/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 863 * REQ_LEN_NOMAC + 4 + 16 with the auth bit enabled. When using a 875 int auth, 905 if (!auth || (keyid_entered && info_auth_keyid == 0)) { 973 int auth, 1018 res = sendrequest(implcode, reqcode, auth, qitems, qsize, qdata); 1635 * my_delay - set delay for auth requests 872 sendrequest( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata ) argument 970 doquery( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata, size_t *ritems, size_t *rsize, const char **rdata, int quiet_mask, int esize ) argument
|
/freebsd-11-stable/sys/dev/drm2/ |
H A D | drm_ioc32.c | 226 int auth; /**< Is client authenticated? */ member in struct:drm_client32 247 c32->auth = client.auth;
|
H A D | drm.h | 232 int auth; /**< Is client authenticated? */ member in struct:drm_client
|
/freebsd-11-stable/crypto/openssl/crypto/bio/ |
H A D | bss_dgram.c | 973 struct sctp_authchunk auth; local 990 auth.sauth_chunk = OPENSSL_SCTP_DATA_CHUNK_TYPE; 992 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, 998 auth.sauth_chunk = OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE; 1000 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth,
|
/freebsd-11-stable/lib/libfetch/ |
H A D | http.c | 627 /* Http auth challenge schemes */ 1180 IN char * pszQop, /* qop-value: "", "auth", "auth-int" */ 1183 IN HASHHEX HEntity, /* H(entity body) if qop="auth-int" */ 1201 if (strcasecmp(pszQop, "auth-int") == 0) { 1235 * [nonce-count] | [auth-param] ) 1291 "qop=\"auth\", cnonce=\"%s\", nc=%s%s", 1312 char *upw, *auth; local 1319 auth = http_base64(upw); 1321 if (auth [all...] |
/freebsd-11-stable/contrib/libpcap/rpcapd/ |
H A D | daemon.c | 969 struct rpcap_auth auth; // RPCAP authentication header local 974 status = rpcapd_recv(pars->sockctrl, (char *) &auth, sizeof(struct rpcap_auth), &plen, errmsgbuf); 984 switch (ntohs(auth.type)) 1010 usernamelen = ntohs(auth.slen1); 1031 passwdlen = ntohs(auth.slen2);
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_ndis.c | 1718 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1723 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1741 "enc 0x%x auth 0x%x", 1742 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); 1778 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list " 1782 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d", 1787 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN; 1790 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED; 1829 "enc 0x%x auth 0x%x", 1830 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth); [all...] |
/freebsd-11-stable/contrib/ntp/ntpq/ |
H A D | ntpq.c | 1291 int auth, 1341 if (!auth && !always_auth) { 1475 int auth, 1483 return doqueryex(opcode, associd, auth, qsize, qdata, rstatus, 1496 int auth, 1523 res = sendrequest(opcode, associd, auth, qsize, qdata); 2438 * auth_delay - set delay for auth requests 1288 sendrequest( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata ) argument 1472 doquery( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata ) argument 1493 doqueryex( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata, int quiet ) argument
|
/freebsd-11-stable/contrib/ipfilter/tools/ |
H A D | ipfstat.c | 82 "cannot create new auth entry", 83 "packet queued for auth", 86 "auth feedback", 631 * ipfilter (state, auth, nat, fragments). 1830 * Show stats on how auth within IPFilter has been used 1836 ipfgeniter_t auth; local 1841 obj.ipfo_size = sizeof(auth); 1842 obj.ipfo_ptr = &auth; 1844 auth.igi_type = IPFGENITER_AUTH; 1845 auth [all...] |
/freebsd-11-stable/sys/dev/iwi/ |
H A D | if_iwireg.h | 431 uint8_t auth; /* type and key */ member in struct:iwi_associate
|
/freebsd-11-stable/sys/netinet6/ |
H A D | nd6_rtr.c | 1231 int auth; local 1235 auth = 0; 1242 auth = ((m->m_flags & M_AUTHIPHDR) && 1415 if (auth) {
|