Searched refs:auth (Results 1 - 25 of 208) sorted by relevance

123456789

/netbsd-6-1-5-RELEASE/include/rpc/
H A Dauth.h1 /* $NetBSD: auth.h,v 1.16 2005/02/03 04:39:32 perry Exp $ */
31 * from: @(#)auth.h 1.17 88/02/08 SMI
32 * @(#)auth.h 2.3 88/08/07 4.0 RPCSRC
36 * auth.h, Authentication interface.
88 enum_t oa_flavor; /* flavor of auth */
89 caddr_t oa_base; /* address of more auth stuff */
119 * The ops and the auth handle provide the interface to the authenticators.
121 * AUTH *auth;
125 #define AUTH_NEXTVERF(auth) \
126 ((*((auth)
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/
H A Dtestsslproxy5 for auth in A B C BC; do
7 sh ./testssl $1 $2 $3 "-proxy -proxy_auth $auth -proxy_cond $cond"
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/java/
H A Djaas.conf4 com.sun.security.auth.module.Krb5LoginModule required;
/netbsd-6-1-5-RELEASE/lib/libc/rpc/
H A Dauth_unix.c69 #include <rpc/auth.h>
97 #define AUTH_PRIVATE(auth) ((struct audata *)auth->ah_private)
101 * Returns an auth handle with the given stuff in it.
115 AUTH *auth; local
119 * Allocate and set up auth handle
122 auth = mem_alloc(sizeof(*auth));
124 if (auth == NULL) {
136 auth
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dbuild_auth.c113 Authenticator auth; local
120 memset(&auth, 0, sizeof(auth));
122 auth.authenticator_vno = 5;
123 copy_Realm(&cred->client->realm, &auth.crealm);
124 copy_PrincipalName(&cred->client->name, &auth.cname);
126 krb5_us_timeofday (context, &auth.ctime, &auth.cusec);
128 ret = krb5_auth_con_getlocalsubkey(context, auth_context, &auth.subkey);
137 ALLOC(auth
[all...]
/netbsd-6-1-5-RELEASE/sys/external/bsd/drm/dist/tests/
H A Dauth.c68 struct drm_auth auth; local
76 /* Get a client magic number and pass it to the master for auth. */
77 auth.magic = 0; /* Quiet valgrind */
78 ret = ioctl(drmfd, DRM_IOCTL_GET_MAGIC, &auth);
82 ret = write(commfd[0], &auth.magic, sizeof(auth.magic));
84 err(1, "Couldn't write auth data");
93 struct drm_auth auth; local
97 auth.magic = 0xd0d0d0d0;
98 ret = ioctl(drmfd, DRM_IOCTL_AUTH_MAGIC, &auth);
[all...]
H A Dlock.c87 struct drm_auth auth; local
90 /* Get a client magic number and pass it to the master for auth. */
91 ret = ioctl(drmfd, DRM_IOCTL_GET_MAGIC, &auth);
95 ret = write(commfd[0], &auth.magic, sizeof(auth.magic));
97 err(1, "Couldn't write auth data");
103 struct drm_auth auth; local
108 ret = read(commfd[1], &auth.magic, sizeof(auth.magic));
112 ret = ioctl(drmfd, DRM_IOCTL_AUTH_MAGIC, &auth);
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpq/
H A Dlibntpq_subs.c47 int auth,
53 return doquerylist((struct varlist *)vlist, op, associd, auth,
43 ntpq_doquerylist( struct ntpq_varlist *vlist, int op, associd_t associd, int auth, u_short *rstatus, int *dsize, const char **datap ) argument
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/bin/sshd/
H A DMakefile10 SRCS= sshd.c auth-rhosts.c auth-passwd.c auth-rsa.c auth-rh-rsa.c \
12 auth.c auth1.c auth2.c auth-options.c session.c \
13 auth-chall.c auth2-chall.c groupaccess.c \
14 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
22 COPTS.auth
[all...]
/netbsd-6-1-5-RELEASE/etc/rc.d/
H A Dpwcheck21 logger -s -p auth.err \
/netbsd-6-1-5-RELEASE/usr.sbin/ldpd/
H A Dldp_command.h40 int auth; /* 1 if socket is authenticated */ member in struct:com_sock
/netbsd-6-1-5-RELEASE/share/examples/emul/ultrix/etc/
H A Dsvc.conf14 auth=local
/netbsd-6-1-5-RELEASE/etc/
H A Dsyslog.conf3 *.err;kern.*;auth.notice;authpriv.none;mail.crit /dev/console
4 *.info;auth,authpriv,cron,ftp,kern,lpr,mail.none /var/log/messages
10 auth,authpriv.info /var/log/authlog
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dauthfd.c127 ssh_request_reply(AuthenticationConnection *auth, Buffer *request, Buffer *reply) argument
137 if (atomicio(vwrite, auth->fd, buf, 4) != 4 ||
138 atomicio(vwrite, auth->fd, buffer_ptr(request),
147 if (atomicio(read, auth->fd, buf, 4) != 4) {
163 if (atomicio(read, auth->fd, buf, l) != l) {
197 AuthenticationConnection *auth; local
209 auth = xmalloc(sizeof(*auth));
210 auth->fd = sock;
211 buffer_init(&auth
223 ssh_close_authentication_connection(AuthenticationConnection *auth) argument
232 ssh_lock_agent(AuthenticationConnection *auth, int lock, const char *password) argument
255 ssh_get_num_identities(AuthenticationConnection *auth, int version) argument
305 ssh_get_first_identity(AuthenticationConnection *auth, char **comment, int version) argument
314 ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int version) argument
365 ssh_decrypt_challenge(AuthenticationConnection *auth, Key* key, BIGNUM *challenge, u_char session_id[16], u_int response_type, u_char response[16]) argument
416 ssh_agent_sign(AuthenticationConnection *auth, Key *key, u_char **sigp, u_int *lenp, u_char *data, u_int datalen) argument
536 ssh_add_identity_constrained(AuthenticationConnection *auth, Key *key, const char *comment, u_int life, u_int confirm) argument
593 ssh_remove_identity(AuthenticationConnection *auth, Key *key) argument
628 ssh_update_card(AuthenticationConnection *auth, int add, const char *reader_id, const char *pin, u_int life, u_int confirm) argument
670 ssh_remove_all_identities(AuthenticationConnection *auth, int version) argument
[all...]
/netbsd-6-1-5-RELEASE/sys/external/bsd/drm/dist/bsd-core/
H A Ddrm_auth.c140 struct drm_auth *auth = data; local
144 auth->magic = file_priv->magic;
150 auth->magic = old+1;
152 if (!atomic_cmpset_int(&sequence, old, auth->magic))
154 } while (drm_find_file(dev, auth->magic));
155 file_priv->magic = auth->magic;
156 drm_add_magic(dev, file_priv, auth->magic);
160 DRM_DEBUG("%u\n", auth->magic);
171 struct drm_auth *auth = data; local
174 DRM_DEBUG("%u\n", auth
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/
H A Dtsp_auth.c34 TSS_BOOL cas, /* continue auth session */
36 TPM_AUTH *auth)
59 if ((result = Init_AuthNonce(tspContext, cas, auth)))
72 if ((result = OIAP(tspContext, &auth->AuthHandle, &auth->NonceEven))) {
81 result = OIAP(tspContext, &auth->AuthHandle, &auth->NonceEven);
93 auth->fContinueAuthSession,
95 auth->NonceEven.nonce,
96 auth
31 secret_PerformAuth_OIAP(TSS_HOBJECT hAuthorizedObject, UINT32 ulPendingFn, TSS_HPOLICY hPolicy, TSS_BOOL cas, TCPA_DIGEST *hashDigest, TPM_AUTH *auth) argument
340 Init_AuthNonce(TSS_HCONTEXT tspContext, TSS_BOOL cas, TPM_AUTH * auth) argument
355 validateReturnAuth(BYTE *secret, BYTE *hash, TPM_AUTH *auth) argument
366 HMAC_Auth(BYTE * secret, BYTE * Digest, TPM_AUTH * auth) argument
381 OSAP_Calc(TSS_HCONTEXT tspContext, UINT16 EntityType, UINT32 EntityValue, BYTE * authSecret, BYTE * usageSecret, BYTE * migSecret, TCPA_ENCAUTH * encAuthUsage, TCPA_ENCAUTH * encAuthMig, BYTE * sharedSecret, TPM_AUTH * auth) argument
450 obj_policy_validate_auth_oiap(TSS_HPOLICY hPolicy, TCPA_DIGEST *hashDigest, TPM_AUTH *auth) argument
[all...]
H A Dtsp_get_flags.c34 TPM_AUTH auth; local
50 &digest, &auth)))
53 if ((result = TCS_API(tspContext)->GetCapabilityOwner(tspContext, &auth, &version,
66 return obj_policy_validate_auth_oiap(hPolicy, &digest, &auth);
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/wpa_gui/
H A Dnetworkconfig.ui.h41 int auth, encr = 0; local
43 auth = AUTH_WPA2_EAP;
45 auth = AUTH_WPA_EAP;
47 auth = AUTH_WPA2_PSK;
49 auth = AUTH_WPA_PSK;
51 auth = AUTH_NONE;
62 authSelect->setCurrentItem(auth);
63 authChanged(auth);
104 int auth = authSelect->currentItem(); local
106 if (auth
345 int auth = AUTH_NONE, encr = 0; local
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tcs/rpc/tcstp/
H A Drpc_counter.c69 TPM_AUTH auth; local
96 if (getData(TCSD_PACKET_TYPE_AUTH, 4, &auth, 0, &data->comm)) {
103 result = TCSP_CreateCounter_Internal(hContext, LabelSize, pLabel, encauth, &auth,
112 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm))
131 TPM_AUTH auth; local
141 if (getData(TCSD_PACKET_TYPE_AUTH, 2, &auth, 0, &data->comm))
146 result = TCSP_IncrementCounter_Internal(hContext, idCounter, &auth, &counterValue);
152 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm))
168 TPM_AUTH auth; local
178 if (getData(TCSD_PACKET_TYPE_AUTH, 2, &auth,
203 TPM_AUTH auth; local
[all...]
H A Drpc_dir.c37 TPM_AUTH auth; local
48 if (getData(TCSD_PACKET_TYPE_AUTH, 3, &auth, 0, &data->comm))
53 result = TCSP_DirWriteAuth_Internal(hContext, dirIndex, dirDigest, &auth);
59 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) {
H A Drpc_sign.c38 TPM_AUTH auth; local
66 result = getData(TCSD_PACKET_TYPE_AUTH, 4, &auth, 0, &data->comm);
73 pAuth = &auth;
87 if (setData(TCSD_PACKET_TYPE_AUTH, i++, &auth, 0, &data->comm)) {
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/tests/data/
H A Dslapd-whoami.conf43 by * auth
46 by anonymous auth
/netbsd-6-1-5-RELEASE/external/mit/xorg/bin/missing-apps/rstart/
H A DMakefile6 SRCS= auth.c server.c
/netbsd-6-1-5-RELEASE/x11/bin/rstart/
H A DMakefile6 SRCS= auth.c server.c
/netbsd-6-1-5-RELEASE/lib/libtelnet/
H A DMakefile13 SRCS= auth.c encrypt.c genget.c getent.c misc.c
35 .for f in auth enc_des kerberos5 pk

Completed in 270 milliseconds

123456789