/netbsd-6-1-5-RELEASE/include/rpc/ |
H A D | auth.h | 1 /* $NetBSD: auth.h,v 1.16 2005/02/03 04:39:32 perry Exp $ */ 31 * from: @(#)auth.h 1.17 88/02/08 SMI 32 * @(#)auth.h 2.3 88/08/07 4.0 RPCSRC 36 * auth.h, Authentication interface. 88 enum_t oa_flavor; /* flavor of auth */ 89 caddr_t oa_base; /* address of more auth stuff */ 119 * The ops and the auth handle provide the interface to the authenticators. 121 * AUTH *auth; 125 #define AUTH_NEXTVERF(auth) \ 126 ((*((auth) [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/ |
H A D | testsslproxy | 5 for auth in A B C BC; do 7 sh ./testssl $1 $2 $3 "-proxy -proxy_auth $auth -proxy_cond $cond"
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/java/ |
H A D | jaas.conf | 4 com.sun.security.auth.module.Krb5LoginModule required;
|
/netbsd-6-1-5-RELEASE/lib/libc/rpc/ |
H A D | auth_unix.c | 69 #include <rpc/auth.h> 97 #define AUTH_PRIVATE(auth) ((struct audata *)auth->ah_private) 101 * Returns an auth handle with the given stuff in it. 115 AUTH *auth; local 119 * Allocate and set up auth handle 122 auth = mem_alloc(sizeof(*auth)); 124 if (auth == NULL) { 136 auth [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | build_auth.c | 113 Authenticator auth; local 120 memset(&auth, 0, sizeof(auth)); 122 auth.authenticator_vno = 5; 123 copy_Realm(&cred->client->realm, &auth.crealm); 124 copy_PrincipalName(&cred->client->name, &auth.cname); 126 krb5_us_timeofday (context, &auth.ctime, &auth.cusec); 128 ret = krb5_auth_con_getlocalsubkey(context, auth_context, &auth.subkey); 137 ALLOC(auth [all...] |
/netbsd-6-1-5-RELEASE/sys/external/bsd/drm/dist/tests/ |
H A D | auth.c | 68 struct drm_auth auth; local 76 /* Get a client magic number and pass it to the master for auth. */ 77 auth.magic = 0; /* Quiet valgrind */ 78 ret = ioctl(drmfd, DRM_IOCTL_GET_MAGIC, &auth); 82 ret = write(commfd[0], &auth.magic, sizeof(auth.magic)); 84 err(1, "Couldn't write auth data"); 93 struct drm_auth auth; local 97 auth.magic = 0xd0d0d0d0; 98 ret = ioctl(drmfd, DRM_IOCTL_AUTH_MAGIC, &auth); [all...] |
H A D | lock.c | 87 struct drm_auth auth; local 90 /* Get a client magic number and pass it to the master for auth. */ 91 ret = ioctl(drmfd, DRM_IOCTL_GET_MAGIC, &auth); 95 ret = write(commfd[0], &auth.magic, sizeof(auth.magic)); 97 err(1, "Couldn't write auth data"); 103 struct drm_auth auth; local 108 ret = read(commfd[1], &auth.magic, sizeof(auth.magic)); 112 ret = ioctl(drmfd, DRM_IOCTL_AUTH_MAGIC, &auth); [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpq/ |
H A D | libntpq_subs.c | 47 int auth, 53 return doquerylist((struct varlist *)vlist, op, associd, auth, 43 ntpq_doquerylist( struct ntpq_varlist *vlist, int op, associd_t associd, int auth, u_short *rstatus, int *dsize, const char **datap ) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/bin/sshd/ |
H A D | Makefile | 10 SRCS= sshd.c auth-rhosts.c auth-passwd.c auth-rsa.c auth-rh-rsa.c \ 12 auth.c auth1.c auth2.c auth-options.c session.c \ 13 auth-chall.c auth2-chall.c groupaccess.c \ 14 auth-skey.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \ 22 COPTS.auth [all...] |
/netbsd-6-1-5-RELEASE/etc/rc.d/ |
H A D | pwcheck | 21 logger -s -p auth.err \
|
/netbsd-6-1-5-RELEASE/usr.sbin/ldpd/ |
H A D | ldp_command.h | 40 int auth; /* 1 if socket is authenticated */ member in struct:com_sock
|
/netbsd-6-1-5-RELEASE/share/examples/emul/ultrix/etc/ |
H A D | svc.conf | 14 auth=local
|
/netbsd-6-1-5-RELEASE/etc/ |
H A D | syslog.conf | 3 *.err;kern.*;auth.notice;authpriv.none;mail.crit /dev/console 4 *.info;auth,authpriv,cron,ftp,kern,lpr,mail.none /var/log/messages 10 auth,authpriv.info /var/log/authlog
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | authfd.c | 127 ssh_request_reply(AuthenticationConnection *auth, Buffer *request, Buffer *reply) argument 137 if (atomicio(vwrite, auth->fd, buf, 4) != 4 || 138 atomicio(vwrite, auth->fd, buffer_ptr(request), 147 if (atomicio(read, auth->fd, buf, 4) != 4) { 163 if (atomicio(read, auth->fd, buf, l) != l) { 197 AuthenticationConnection *auth; local 209 auth = xmalloc(sizeof(*auth)); 210 auth->fd = sock; 211 buffer_init(&auth 223 ssh_close_authentication_connection(AuthenticationConnection *auth) argument 232 ssh_lock_agent(AuthenticationConnection *auth, int lock, const char *password) argument 255 ssh_get_num_identities(AuthenticationConnection *auth, int version) argument 305 ssh_get_first_identity(AuthenticationConnection *auth, char **comment, int version) argument 314 ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int version) argument 365 ssh_decrypt_challenge(AuthenticationConnection *auth, Key* key, BIGNUM *challenge, u_char session_id[16], u_int response_type, u_char response[16]) argument 416 ssh_agent_sign(AuthenticationConnection *auth, Key *key, u_char **sigp, u_int *lenp, u_char *data, u_int datalen) argument 536 ssh_add_identity_constrained(AuthenticationConnection *auth, Key *key, const char *comment, u_int life, u_int confirm) argument 593 ssh_remove_identity(AuthenticationConnection *auth, Key *key) argument 628 ssh_update_card(AuthenticationConnection *auth, int add, const char *reader_id, const char *pin, u_int life, u_int confirm) argument 670 ssh_remove_all_identities(AuthenticationConnection *auth, int version) argument [all...] |
/netbsd-6-1-5-RELEASE/sys/external/bsd/drm/dist/bsd-core/ |
H A D | drm_auth.c | 140 struct drm_auth *auth = data; local 144 auth->magic = file_priv->magic; 150 auth->magic = old+1; 152 if (!atomic_cmpset_int(&sequence, old, auth->magic)) 154 } while (drm_find_file(dev, auth->magic)); 155 file_priv->magic = auth->magic; 156 drm_add_magic(dev, file_priv, auth->magic); 160 DRM_DEBUG("%u\n", auth->magic); 171 struct drm_auth *auth = data; local 174 DRM_DEBUG("%u\n", auth [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | tsp_auth.c | 34 TSS_BOOL cas, /* continue auth session */ 36 TPM_AUTH *auth) 59 if ((result = Init_AuthNonce(tspContext, cas, auth))) 72 if ((result = OIAP(tspContext, &auth->AuthHandle, &auth->NonceEven))) { 81 result = OIAP(tspContext, &auth->AuthHandle, &auth->NonceEven); 93 auth->fContinueAuthSession, 95 auth->NonceEven.nonce, 96 auth 31 secret_PerformAuth_OIAP(TSS_HOBJECT hAuthorizedObject, UINT32 ulPendingFn, TSS_HPOLICY hPolicy, TSS_BOOL cas, TCPA_DIGEST *hashDigest, TPM_AUTH *auth) argument 340 Init_AuthNonce(TSS_HCONTEXT tspContext, TSS_BOOL cas, TPM_AUTH * auth) argument 355 validateReturnAuth(BYTE *secret, BYTE *hash, TPM_AUTH *auth) argument 366 HMAC_Auth(BYTE * secret, BYTE * Digest, TPM_AUTH * auth) argument 381 OSAP_Calc(TSS_HCONTEXT tspContext, UINT16 EntityType, UINT32 EntityValue, BYTE * authSecret, BYTE * usageSecret, BYTE * migSecret, TCPA_ENCAUTH * encAuthUsage, TCPA_ENCAUTH * encAuthMig, BYTE * sharedSecret, TPM_AUTH * auth) argument 450 obj_policy_validate_auth_oiap(TSS_HPOLICY hPolicy, TCPA_DIGEST *hashDigest, TPM_AUTH *auth) argument [all...] |
H A D | tsp_get_flags.c | 34 TPM_AUTH auth; local 50 &digest, &auth))) 53 if ((result = TCS_API(tspContext)->GetCapabilityOwner(tspContext, &auth, &version, 66 return obj_policy_validate_auth_oiap(hPolicy, &digest, &auth);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/wpa_gui/ |
H A D | networkconfig.ui.h | 41 int auth, encr = 0; local 43 auth = AUTH_WPA2_EAP; 45 auth = AUTH_WPA_EAP; 47 auth = AUTH_WPA2_PSK; 49 auth = AUTH_WPA_PSK; 51 auth = AUTH_NONE; 62 authSelect->setCurrentItem(auth); 63 authChanged(auth); 104 int auth = authSelect->currentItem(); local 106 if (auth 345 int auth = AUTH_NONE, encr = 0; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tcs/rpc/tcstp/ |
H A D | rpc_counter.c | 69 TPM_AUTH auth; local 96 if (getData(TCSD_PACKET_TYPE_AUTH, 4, &auth, 0, &data->comm)) { 103 result = TCSP_CreateCounter_Internal(hContext, LabelSize, pLabel, encauth, &auth, 112 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) 131 TPM_AUTH auth; local 141 if (getData(TCSD_PACKET_TYPE_AUTH, 2, &auth, 0, &data->comm)) 146 result = TCSP_IncrementCounter_Internal(hContext, idCounter, &auth, &counterValue); 152 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) 168 TPM_AUTH auth; local 178 if (getData(TCSD_PACKET_TYPE_AUTH, 2, &auth, 203 TPM_AUTH auth; local [all...] |
H A D | rpc_dir.c | 37 TPM_AUTH auth; local 48 if (getData(TCSD_PACKET_TYPE_AUTH, 3, &auth, 0, &data->comm)) 53 result = TCSP_DirWriteAuth_Internal(hContext, dirIndex, dirDigest, &auth); 59 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) {
|
H A D | rpc_sign.c | 38 TPM_AUTH auth; local 66 result = getData(TCSD_PACKET_TYPE_AUTH, 4, &auth, 0, &data->comm); 73 pAuth = &auth; 87 if (setData(TCSD_PACKET_TYPE_AUTH, i++, &auth, 0, &data->comm)) {
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/tests/data/ |
H A D | slapd-whoami.conf | 43 by * auth 46 by anonymous auth
|
/netbsd-6-1-5-RELEASE/external/mit/xorg/bin/missing-apps/rstart/ |
H A D | Makefile | 6 SRCS= auth.c server.c
|
/netbsd-6-1-5-RELEASE/x11/bin/rstart/ |
H A D | Makefile | 6 SRCS= auth.c server.c
|
/netbsd-6-1-5-RELEASE/lib/libtelnet/ |
H A D | Makefile | 13 SRCS= auth.c encrypt.c genget.c getent.c misc.c 35 .for f in auth enc_des kerberos5 pk
|