/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | testsslproxy | 5 for auth in A B C BC; do 7 sh ./testssl $1 $2 $3 "-proxy -proxy_auth $auth -proxy_cond $cond"
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/drivers/char/drm/ |
H A D | drm_auth.c | 147 drm_auth_t auth; local 151 auth.magic = priv->magic; 157 auth.magic = sequence++; 159 } while (drm_find_file(dev, auth.magic)); 160 priv->magic = auth.magic; 161 drm_add_magic(dev, priv, auth.magic); 164 DRM_DEBUG("%u\n", auth.magic); 165 if (copy_to_user((drm_auth_t __user *) arg, &auth, sizeof(auth))) 186 drm_auth_t auth; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/ieee80211/softmac/ |
H A D | ieee80211softmac_auth.c | 31 /* Queues an auth request to the desired AP */ 36 struct ieee80211softmac_auth_queue_item *auth; local 47 /* Queue the auth request */ 48 auth = (struct ieee80211softmac_auth_queue_item *) 50 if(auth == NULL) 53 auth->net = net; 54 auth->mac = mac; 55 auth->retry = IEEE80211SOFTMAC_AUTH_RETRY_LIMIT; 56 auth->state = IEEE80211SOFTMAC_AUTH_OPEN_REQUEST; 57 INIT_DELAYED_WORK(&auth 76 struct ieee80211softmac_auth_queue_item *auth; local 136 ieee80211softmac_auth_resp(struct net_device *dev, struct ieee80211_auth *auth) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/sunrpc/ |
H A D | auth.c | 2 * linux/net/sunrpc/auth.c 63 struct rpc_auth *auth; local 67 auth = ERR_PTR(-EINVAL); 73 request_module("rpc-auth-%u", flavor); 77 auth = ops->create(clnt, pseudoflavor); 78 if (IS_ERR(auth)) 79 return auth; 82 clnt->cl_auth = auth; 85 return auth; 89 rpcauth_destroy(struct rpc_auth *auth) argument 102 rpcauth_init_credcache(struct rpc_auth *auth, unsigned long expire) argument 138 rpcauth_free_credcache(struct rpc_auth *auth) argument 159 rpcauth_prune_expired(struct rpc_auth *auth, struct rpc_cred *cred, struct hlist_head *free) argument 175 rpcauth_gc_credcache(struct rpc_auth *auth, struct hlist_head *free) argument 196 rpcauth_lookup_credcache(struct rpc_auth *auth, struct auth_cred * acred, int flags) argument 259 rpcauth_lookupcred(struct rpc_auth *auth, int flags) argument 279 struct rpc_auth *auth = task->tk_auth; local [all...] |
H A D | Makefile | 10 auth.o auth_null.o auth_unix.o \
|
H A D | auth_unix.c | 13 #include <linux/sunrpc/auth.h> 50 unx_destroy(struct rpc_auth *auth) argument 52 dprintk("RPC: destroying UNIX authenticator %p\n", auth); 53 rpcauth_free_credcache(auth); 60 unx_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) argument 62 return rpcauth_lookup_credcache(auth, acred, flags); 66 unx_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) argument
|
H A D | auth_null.c | 29 nul_destroy(struct rpc_auth *auth) argument 37 nul_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | winbindd_pam.c | 4 Winbind daemon - pam auth funcions 173 state->request.data.auth.user[sizeof(state->request.data.auth.user)-1]='\0'; 176 state->request.data.auth.pass[sizeof(state->request.data.auth.pass)-1]='\0'; 178 DEBUG(3, ("[%5lu]: pam auth %s\n", (unsigned long)state->pid, 179 state->request.data.auth.user)); 181 if (!(mem_ctx = talloc_init("winbind pam auth for %s", state->request.data.auth.user))) { 189 parse_domain_user(state->request.data.auth [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/plugins/radius/ |
H A D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument 42 buf = auth->data; 107 vector = (char *)auth->vector; 143 memcpy ((char *) md5buf + secretlen, (char *) auth->vector, 200 AUTH_HDR *auth, *recv_auth; local 262 auth = (AUTH_HDR *) send_buffer; 263 auth->code = data->code; 264 auth->id = data->seq_nbr; 268 total_length = rc_pack_list(data->send_pairs, secret, auth) + AUTH_HDR_LEN; 270 auth 395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/ipv6/ |
H A D | esp6.c | 68 alen = esp->auth.icv_trunc_len; 131 if (esp->auth.icv_full_len) { 134 memcpy(pskb_put(skb, trailer, alen), esp->auth.work_icv, alen); 150 int alen = esp->auth.icv_trunc_len; 167 if (esp->auth.icv_full_len) { 177 if (unlikely(memcmp(esp->auth.work_icv, sum, alen))) { 245 mtu -= x->props.header_len + esp->auth.icv_trunc_len; 288 crypto_free_hash(esp->auth.tfm); 289 esp->auth.tfm = NULL; 290 kfree(esp->auth [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/ |
H A D | util.c | 42 ret = kerberos_set_password(ads->auth.kdc_server, service_principal, password, service_principal, new_password, ads->auth.time_offset);
|
H A D | ads_struct.c | 128 SAFE_FREE((*ads)->auth.realm); 129 SAFE_FREE((*ads)->auth.password); 130 SAFE_FREE((*ads)->auth.user_name); 131 SAFE_FREE((*ads)->auth.kdc_server);
|
H A D | sasl.c | 33 DATA_BLOB blob, chal1, chal2, auth; local 41 if (!ads->auth.password) { 86 SMBencrypt(ads->auth.password, challenge,lmhash); 87 SMBNTencrypt(ads->auth.password, challenge,nthash); 92 /* this generates the actual auth packet */ 99 ads->auth.user_name, 105 auth = spnego_gen_auth(blob); 113 /* now send the auth packet and we should be done */ 114 cred.bv_val = (char *)auth.data; 115 cred.bv_len = auth [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/auth/ |
H A D | auth_skel.c | 51 (*auth_method)->auth = check_skel_security;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/include/net/ |
H A D | esp.h | 40 } auth; member in struct:esp_data 51 desc.tfm = esp->auth.tfm; 60 return crypto_hash_final(&desc, esp->auth.work_icv);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/ipv4/ |
H A D | esp4.c | 40 alen = esp->auth.icv_trunc_len; 131 if (esp->auth.icv_full_len) { 134 memcpy(pskb_put(skb, trailer, alen), esp->auth.work_icv, alen); 157 int alen = esp->auth.icv_trunc_len; 173 if (esp->auth.icv_full_len) { 183 if (unlikely(memcmp(esp->auth.work_icv, sum, alen))) { 275 mtu -= x->props.header_len + esp->auth.icv_trunc_len; 326 crypto_free_hash(esp->auth.tfm); 327 esp->auth.tfm = NULL; 328 kfree(esp->auth [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/ |
H A D | auth_builtin.c | 30 * Typically used as the first module in the auth chain, this allows 59 (*auth_method)->auth = check_guest_security; 111 (*auth_method)->auth = check_name_to_ntstatus_security; 160 (*auth_method)->auth = check_fixed_challenge_security;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/ |
H A D | gopher.c | 80 char hostname[1024], auth[1024], path[1024], buf[1024]; local 92 url_split(NULL, 0, auth, sizeof(auth), hostname, sizeof(hostname), &port,
|
H A D | http.c | 49 const char *auth, int *new_location); 58 char auth[1024]; local 72 url_split(NULL, 0, auth, sizeof(auth), hostname, sizeof(hostname), &port, 81 url_split(NULL, 0, auth, sizeof(auth), hostname, sizeof(hostname), &port, 99 if (http_connect(h, path, hoststr, auth, &location_changed) < 0) 209 const char *auth, int *new_location) 215 int auth_b64_len = strlen(auth)* 4 / 3 + 12; 222 av_base64_encode(auth_b64, auth_b64_len, auth, strle 208 http_connect(URLContext *h, const char *path, const char *hoststr, const char *auth, int *new_location) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/ |
H A D | krb4.h | 29 int (*auth)(void *, struct connectdata *); member in struct:Curl_sec_client_mech
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/shared/ |
H A D | nvparse.h | 72 * WPA/WDS per link configuration. Parameters after 'auth' are 75 * When auth is "psk", the parameter list is: 78 * char *crypto, char *auth, char *ssid, char *passphrase); 81 char *crypto, char *auth, ...); 83 char *crypto, char *auth, ...);
|
H A D | http.c | 68 char *host = url, *path = "", auth[128] = { 0 }, line[512]; local 93 base64enc(host, auth, sizeof(auth)); 122 if (strlen(auth)) 123 fprintf(fp, "Authorization: Basic %s\r\n", auth);
|
H A D | wlif_utils.h | 46 int auth_blockout_time; /* update auth blockout retry interval */ 47 unsigned int auth; /* shared key authentication optional (0) or required (1) */ member in struct:wsec_info_s
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/wget-1.12/tests/ |
H A D | Makefile.am | 64 Test-auth-basic.px \ 65 Test-auth-no-challenge.px \ 66 Test-auth-no-challenge-url.px \ 67 Test-auth-with-content-disposition.px \ 117 Test-proxied-https-auth.px \ 118 Test-proxy-auth-basic.px \
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/nfsd/ |
H A D | Makefile | 8 export.o auth.o lockd.o nfscache.o nfsxdr.o stats.o
|