Searched refs:auth (Results 176 - 200 of 306) sorted by relevance

1234567891011>>

/freebsd-11-stable/sys/mips/cavium/cryptocteon/
H A Dcavium_crypto.c233 octo_calc_hash(uint8_t auth, unsigned char *key, uint64_t *inner, uint64_t *outer) argument
243 memcpy(hash_key, (uint8_t *) key, (auth ? 20 : 16));
245 if (auth) {
268 if (auth)
275 if (auth) {
281 memcpy(hash_key, (uint8_t *) key, (auth ? 20 : 16));
283 if (auth) {
306 if (auth)
313 if (auth) {
/freebsd-11-stable/sys/dev/usb/wlan/
H A Dif_rsu.c1360 struct r92s_fw_cmd_auth auth; local
1396 memset(&auth, 0, sizeof(auth));
1398 auth.mode = R92S_AUTHMODE_WPA;
1399 auth.dot1x = (ni->ni_authmode == IEEE80211_AUTH_8021X);
1401 auth.mode = R92S_AUTHMODE_OPEN;
1403 "%s: setting auth mode to %d\n",
1404 __func__, auth.mode);
1405 error = rsu_fw_cmd(sc, R92S_CMD_SET_AUTH, &auth, sizeof(auth));
[all...]
/freebsd-11-stable/contrib/apr-util/dbd/
H A Dapr_dbd_oracle.c128 OCISession *auth; member in struct:apr_dbd_t
556 ret->status = OCIHandleAlloc(dbd_oracle_env, (dvoid**)&ret->auth,
563 printf("OPEN ERROR %d (alloc auth): %s\n", ret->status, ret->buf);
576 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[0].value,
596 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[1].value,
616 ret->status = OCISessionBegin(ret->svc, ret->err, ret->auth,
636 ret->status = OCIAttrSet(ret->svc, OCI_HTYPE_SVCCTX, ret->auth, 0,
2103 switch (OCISessionEnd(handle->svc, handle->err, handle->auth,
2113 switch (OCIHandleFree((dvoid *) handle->auth, (ub4) OCI_HTYPE_SESSION)) {
/freebsd-11-stable/sbin/routed/
H A Dinput.c150 struct auth *ap;
951 struct auth *ap;
1002 "unknown MD5 RIPv2 auth len %#x"
/freebsd-11-stable/contrib/tcpdump/
H A Dprint-radius.c182 uint8_t auth[16]; /* Authenticator */ member in struct:radius_hdr
984 ND_PRINT((ndo, "%02x", rad->auth[auth_idx]));
/freebsd-11-stable/usr.sbin/ctld/
H A Duclparse.c60 const struct auth *ca;
65 log_warnx("chap section in auth-group \"%s\" is missing "
72 log_warnx("chap section in auth-group \"%s\" is missing "
89 const struct auth *ca;
95 log_warnx("chap-mutual section in auth-group \"%s\" is missing "
102 log_warnx("chap-mutual section in auth-group \"%s\" is missing "
109 log_warnx("chap-mutual section in auth-group \"%s\" is missing "
116 log_warnx("chap-mutual section in auth-group \"%s\" is missing "
148 auth_group = ucl_object_find_key(obj, "auth-group-name");
151 "\"auth
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_eke_common.c687 const struct wpabuf *msgs, u8 *auth)
695 wpabuf_head(msgs), wpabuf_len(msgs), auth);
686 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dwps_supplicant.c1391 settings->ssid_hex, settings->auth,
1865 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local
1878 auth++;
1888 else if (auth)
2083 if (settings->ssid_hex == NULL || settings->auth == NULL ||
2100 if (os_strcmp(settings->auth, "OPEN") == 0)
2102 else if (os_strcmp(settings->auth, "WPAPSK") == 0)
2104 else if (os_strcmp(settings->auth, "WPA2PSK") == 0)
/freebsd-11-stable/contrib/ntp/include/
H A Dntp_request.h144 char mac[MAX_MDG_LEN]; /* (optional) auth code */
154 char mac[MAX_MDG_LEN]; /* (optional) auth code */
225 #define AUTH_SEQ(auth, seq) ((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
/freebsd-11-stable/lib/libc/rpc/
H A Dkey_call.c52 #include <rpc/auth.h>
H A Dsvc_auth_des.c59 #include <rpc/auth.h>
/freebsd-11-stable/sys/nfs/
H A Dkrpc_subr.c64 #include <rpc/auth.h>
80 u_int32_t authtype; /* auth type */
81 u_int32_t authlen; /* auth length */
/freebsd-11-stable/sys/nlm/
H A Dnlm_advlock.c212 AUTH *auth; local
256 auth = authunix_create(cred);
261 ext.rc_auth = auth;
381 AUTH_DESTROY(auth);
/freebsd-11-stable/sys/net80211/
H A Dieee80211_proto.h219 const struct ieee80211_authenticator *ieee80211_authenticator_get(int auth);
225 * address of each received auth frame for validation.
/freebsd-11-stable/contrib/ntp/ntpdc/
H A Dntpdc.c863 * REQ_LEN_NOMAC + 4 + 16 with the auth bit enabled. When using a
875 int auth,
905 if (!auth || (keyid_entered && info_auth_keyid == 0)) {
973 int auth,
1018 res = sendrequest(implcode, reqcode, auth, qitems, qsize, qdata);
1635 * my_delay - set delay for auth requests
872 sendrequest( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata ) argument
970 doquery( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata, size_t *ritems, size_t *rsize, const char **rdata, int quiet_mask, int esize ) argument
/freebsd-11-stable/sys/dev/drm2/
H A Ddrm_ioc32.c226 int auth; /**< Is client authenticated? */ member in struct:drm_client32
247 c32->auth = client.auth;
H A Ddrm.h232 int auth; /**< Is client authenticated? */ member in struct:drm_client
/freebsd-11-stable/crypto/openssl/crypto/bio/
H A Dbss_dgram.c973 struct sctp_authchunk auth; local
990 auth.sauth_chunk = OPENSSL_SCTP_DATA_CHUNK_TYPE;
992 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth,
998 auth.sauth_chunk = OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE;
1000 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth,
/freebsd-11-stable/lib/libfetch/
H A Dhttp.c627 /* Http auth challenge schemes */
1180 IN char * pszQop, /* qop-value: "", "auth", "auth-int" */
1183 IN HASHHEX HEntity, /* H(entity body) if qop="auth-int" */
1201 if (strcasecmp(pszQop, "auth-int") == 0) {
1235 * [nonce-count] | [auth-param] )
1291 "qop=\"auth\", cnonce=\"%s\", nc=%s%s",
1312 char *upw, *auth; local
1319 auth = http_base64(upw);
1321 if (auth
[all...]
/freebsd-11-stable/contrib/libpcap/rpcapd/
H A Ddaemon.c969 struct rpcap_auth auth; // RPCAP authentication header local
974 status = rpcapd_recv(pars->sockctrl, (char *) &auth, sizeof(struct rpcap_auth), &plen, errmsgbuf);
984 switch (ntohs(auth.type))
1010 usernamelen = ntohs(auth.slen1);
1031 passwdlen = ntohs(auth.slen2);
/freebsd-11-stable/contrib/wpa/src/drivers/
H A Ddriver_ndis.c1718 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
1723 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
1741 "enc 0x%x auth 0x%x",
1742 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
1778 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list "
1782 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d",
1787 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
1790 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
1829 "enc 0x%x auth 0x%x",
1830 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
[all...]
/freebsd-11-stable/contrib/ntp/ntpq/
H A Dntpq.c1291 int auth,
1341 if (!auth && !always_auth) {
1475 int auth,
1483 return doqueryex(opcode, associd, auth, qsize, qdata, rstatus,
1496 int auth,
1523 res = sendrequest(opcode, associd, auth, qsize, qdata);
2438 * auth_delay - set delay for auth requests
1288 sendrequest( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata ) argument
1472 doquery( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata ) argument
1493 doqueryex( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata, int quiet ) argument
/freebsd-11-stable/contrib/ipfilter/tools/
H A Dipfstat.c82 "cannot create new auth entry",
83 "packet queued for auth",
86 "auth feedback",
631 * ipfilter (state, auth, nat, fragments).
1830 * Show stats on how auth within IPFilter has been used
1836 ipfgeniter_t auth; local
1841 obj.ipfo_size = sizeof(auth);
1842 obj.ipfo_ptr = &auth;
1844 auth.igi_type = IPFGENITER_AUTH;
1845 auth
[all...]
/freebsd-11-stable/sys/dev/iwi/
H A Dif_iwireg.h431 uint8_t auth; /* type and key */ member in struct:iwi_associate
/freebsd-11-stable/sys/netinet6/
H A Dnd6_rtr.c1231 int auth; local
1235 auth = 0;
1242 auth = ((m->m_flags & M_AUTHIPHDR) &&
1415 if (auth) {

Completed in 442 milliseconds

1234567891011>>