Searched refs:auth (Results 1 - 25 of 230) sorted by relevance

12345678910

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/test/
H A Dtestsslproxy5 for auth in A B C BC; do
7 sh ./testssl $1 $2 $3 "-proxy -proxy_auth $auth -proxy_cond $cond"
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/drivers/char/drm/
H A Ddrm_auth.c147 drm_auth_t auth; local
151 auth.magic = priv->magic;
157 auth.magic = sequence++;
159 } while (drm_find_file(dev, auth.magic));
160 priv->magic = auth.magic;
161 drm_add_magic(dev, priv, auth.magic);
164 DRM_DEBUG("%u\n", auth.magic);
165 if (copy_to_user((drm_auth_t __user *) arg, &auth, sizeof(auth)))
186 drm_auth_t auth; local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/ieee80211/softmac/
H A Dieee80211softmac_auth.c31 /* Queues an auth request to the desired AP */
36 struct ieee80211softmac_auth_queue_item *auth; local
47 /* Queue the auth request */
48 auth = (struct ieee80211softmac_auth_queue_item *)
50 if(auth == NULL)
53 auth->net = net;
54 auth->mac = mac;
55 auth->retry = IEEE80211SOFTMAC_AUTH_RETRY_LIMIT;
56 auth->state = IEEE80211SOFTMAC_AUTH_OPEN_REQUEST;
57 INIT_DELAYED_WORK(&auth
76 struct ieee80211softmac_auth_queue_item *auth; local
136 ieee80211softmac_auth_resp(struct net_device *dev, struct ieee80211_auth *auth) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/sunrpc/
H A Dauth.c2 * linux/net/sunrpc/auth.c
63 struct rpc_auth *auth; local
67 auth = ERR_PTR(-EINVAL);
73 request_module("rpc-auth-%u", flavor);
77 auth = ops->create(clnt, pseudoflavor);
78 if (IS_ERR(auth))
79 return auth;
82 clnt->cl_auth = auth;
85 return auth;
89 rpcauth_destroy(struct rpc_auth *auth) argument
102 rpcauth_init_credcache(struct rpc_auth *auth, unsigned long expire) argument
138 rpcauth_free_credcache(struct rpc_auth *auth) argument
159 rpcauth_prune_expired(struct rpc_auth *auth, struct rpc_cred *cred, struct hlist_head *free) argument
175 rpcauth_gc_credcache(struct rpc_auth *auth, struct hlist_head *free) argument
196 rpcauth_lookup_credcache(struct rpc_auth *auth, struct auth_cred * acred, int flags) argument
259 rpcauth_lookupcred(struct rpc_auth *auth, int flags) argument
279 struct rpc_auth *auth = task->tk_auth; local
[all...]
H A DMakefile10 auth.o auth_null.o auth_unix.o \
H A Dauth_unix.c13 #include <linux/sunrpc/auth.h>
50 unx_destroy(struct rpc_auth *auth) argument
52 dprintk("RPC: destroying UNIX authenticator %p\n", auth);
53 rpcauth_free_credcache(auth);
60 unx_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) argument
62 return rpcauth_lookup_credcache(auth, acred, flags);
66 unx_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) argument
H A Dauth_null.c29 nul_destroy(struct rpc_auth *auth) argument
37 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dwinbindd_pam.c4 Winbind daemon - pam auth funcions
173 state->request.data.auth.user[sizeof(state->request.data.auth.user)-1]='\0';
176 state->request.data.auth.pass[sizeof(state->request.data.auth.pass)-1]='\0';
178 DEBUG(3, ("[%5lu]: pam auth %s\n", (unsigned long)state->pid,
179 state->request.data.auth.user));
181 if (!(mem_ctx = talloc_init("winbind pam auth for %s", state->request.data.auth.user))) {
189 parse_domain_user(state->request.data.auth
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/plugins/radius/
H A Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument
42 buf = auth->data;
107 vector = (char *)auth->vector;
143 memcpy ((char *) md5buf + secretlen, (char *) auth->vector,
200 AUTH_HDR *auth, *recv_auth; local
262 auth = (AUTH_HDR *) send_buffer;
263 auth->code = data->code;
264 auth->id = data->seq_nbr;
268 total_length = rc_pack_list(data->send_pairs, secret, auth) + AUTH_HDR_LEN;
270 auth
395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/ipv6/
H A Desp6.c68 alen = esp->auth.icv_trunc_len;
131 if (esp->auth.icv_full_len) {
134 memcpy(pskb_put(skb, trailer, alen), esp->auth.work_icv, alen);
150 int alen = esp->auth.icv_trunc_len;
167 if (esp->auth.icv_full_len) {
177 if (unlikely(memcmp(esp->auth.work_icv, sum, alen))) {
245 mtu -= x->props.header_len + esp->auth.icv_trunc_len;
288 crypto_free_hash(esp->auth.tfm);
289 esp->auth.tfm = NULL;
290 kfree(esp->auth
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/
H A Dutil.c42 ret = kerberos_set_password(ads->auth.kdc_server, service_principal, password, service_principal, new_password, ads->auth.time_offset);
H A Dads_struct.c128 SAFE_FREE((*ads)->auth.realm);
129 SAFE_FREE((*ads)->auth.password);
130 SAFE_FREE((*ads)->auth.user_name);
131 SAFE_FREE((*ads)->auth.kdc_server);
H A Dsasl.c33 DATA_BLOB blob, chal1, chal2, auth; local
41 if (!ads->auth.password) {
86 SMBencrypt(ads->auth.password, challenge,lmhash);
87 SMBNTencrypt(ads->auth.password, challenge,nthash);
92 /* this generates the actual auth packet */
99 ads->auth.user_name,
105 auth = spnego_gen_auth(blob);
113 /* now send the auth packet and we should be done */
114 cred.bv_val = (char *)auth.data;
115 cred.bv_len = auth
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/auth/
H A Dauth_skel.c51 (*auth_method)->auth = check_skel_security;
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/include/net/
H A Desp.h40 } auth; member in struct:esp_data
51 desc.tfm = esp->auth.tfm;
60 return crypto_hash_final(&desc, esp->auth.work_icv);
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/ipv4/
H A Desp4.c40 alen = esp->auth.icv_trunc_len;
131 if (esp->auth.icv_full_len) {
134 memcpy(pskb_put(skb, trailer, alen), esp->auth.work_icv, alen);
157 int alen = esp->auth.icv_trunc_len;
173 if (esp->auth.icv_full_len) {
183 if (unlikely(memcmp(esp->auth.work_icv, sum, alen))) {
275 mtu -= x->props.header_len + esp->auth.icv_trunc_len;
326 crypto_free_hash(esp->auth.tfm);
327 esp->auth.tfm = NULL;
328 kfree(esp->auth
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/
H A Dauth_builtin.c30 * Typically used as the first module in the auth chain, this allows
59 (*auth_method)->auth = check_guest_security;
111 (*auth_method)->auth = check_name_to_ntstatus_security;
160 (*auth_method)->auth = check_fixed_challenge_security;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/
H A Dgopher.c80 char hostname[1024], auth[1024], path[1024], buf[1024]; local
92 url_split(NULL, 0, auth, sizeof(auth), hostname, sizeof(hostname), &port,
H A Dhttp.c49 const char *auth, int *new_location);
58 char auth[1024]; local
72 url_split(NULL, 0, auth, sizeof(auth), hostname, sizeof(hostname), &port,
81 url_split(NULL, 0, auth, sizeof(auth), hostname, sizeof(hostname), &port,
99 if (http_connect(h, path, hoststr, auth, &location_changed) < 0)
209 const char *auth, int *new_location)
215 int auth_b64_len = strlen(auth)* 4 / 3 + 12;
222 av_base64_encode(auth_b64, auth_b64_len, auth, strle
208 http_connect(URLContext *h, const char *path, const char *hoststr, const char *auth, int *new_location) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/
H A Dkrb4.h29 int (*auth)(void *, struct connectdata *); member in struct:Curl_sec_client_mech
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/shared/
H A Dnvparse.h72 * WPA/WDS per link configuration. Parameters after 'auth' are
75 * When auth is "psk", the parameter list is:
78 * char *crypto, char *auth, char *ssid, char *passphrase);
81 char *crypto, char *auth, ...);
83 char *crypto, char *auth, ...);
H A Dhttp.c68 char *host = url, *path = "", auth[128] = { 0 }, line[512]; local
93 base64enc(host, auth, sizeof(auth));
122 if (strlen(auth))
123 fprintf(fp, "Authorization: Basic %s\r\n", auth);
H A Dwlif_utils.h46 int auth_blockout_time; /* update auth blockout retry interval */
47 unsigned int auth; /* shared key authentication optional (0) or required (1) */ member in struct:wsec_info_s
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/wget-1.12/tests/
H A DMakefile.am64 Test-auth-basic.px \
65 Test-auth-no-challenge.px \
66 Test-auth-no-challenge-url.px \
67 Test-auth-with-content-disposition.px \
117 Test-proxied-https-auth.px \
118 Test-proxy-auth-basic.px \
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/nfsd/
H A DMakefile8 export.o auth.o lockd.o nfscache.o nfsxdr.o stats.o

Completed in 243 milliseconds

12345678910