Searched refs:auth (Results 1 - 25 of 249) sorted by last modified time

12345678910

/freebsd-10-stable/sys/rpc/rpcsec_gss/
H A Dsvc_rpcsec_gss.c1489 svc_rpc_gss_wrap(SVCAUTH *auth, struct mbuf **mp) argument
1496 cc = (struct svc_rpc_gss_cookedcred *) auth->svc_ah_private;
1509 svc_rpc_gss_unwrap(SVCAUTH *auth, struct mbuf **mp) argument
1516 cc = (struct svc_rpc_gss_cookedcred *) auth->svc_ah_private;
1529 svc_rpc_gss_release(SVCAUTH *auth) argument
1536 cc = (struct svc_rpc_gss_cookedcred *) auth->svc_ah_private;
/freebsd-10-stable/sys/contrib/ipfilter/netinet/
H A Dfil.c1701 u_short optmsk = 0, secmsk = 0, auth = 0; local
1851 auth = doi & 0xffff;
1863 auth = doi & 0xffff;
1883 if (auth && !(auth & 0x0100))
1884 auth &= 0xff00;
1887 fi->fi_auth = auth;
1902 u_short secmsk = 0, auth = 0; local
1911 auth = *(s + 3);
1912 auth *
[all...]
/freebsd-10-stable/sys/net80211/
H A Dieee80211_ioctl.c1470 * For shared key auth, just continue the
2669 const struct ieee80211_authenticator *auth; local
2752 auth = ieee80211_authenticator_get(ireq->i_val);
2753 if (auth == NULL)
2782 vap->iv_auth = auth;
/freebsd-10-stable/sys/dev/usb/wlan/
H A Dif_rsu.c1054 struct r92s_fw_cmd_auth auth; local
1067 memset(&auth, 0, sizeof(auth));
1069 auth.mode = R92S_AUTHMODE_WPA;
1070 auth.dot1x = (ni->ni_authmode == IEEE80211_AUTH_8021X);
1072 auth.mode = R92S_AUTHMODE_OPEN;
1073 DPRINTF("setting auth mode to %d\n", auth.mode);
1074 error = rsu_fw_cmd(sc, R92S_CMD_SET_AUTH, &auth, sizeof(auth));
[all...]
/freebsd-10-stable/contrib/ntp/ntpq/
H A Dntpq.c1287 int auth,
1337 if (!auth && !always_auth) {
1471 int auth,
1479 return doqueryex(opcode, associd, auth, qsize, qdata, rstatus,
1492 int auth,
1519 res = sendrequest(opcode, associd, auth, qsize, qdata);
2434 * auth_delay - set delay for auth requests
1284 sendrequest( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata ) argument
1468 doquery( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata ) argument
1489 doqueryex( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata, int quiet ) argument
H A Dntpq-subs.c580 int auth,
592 return doquery(op, associd, auth, datalen, data, rstatus, dsize,
1144 const char *auth; local
1158 "ind assid status conf reach auth condition last_event cnt\n");
1174 auth = "yes";
1176 auth = "none";
1184 auth = "ok ";
1186 auth = "bad";
1188 auth = "none";
1304 assoc_cache[i].status, conf, reach, auth,
576 doquerylist( struct varlist *vlist, int op, associd_t associd, int auth, u_short *rstatus, size_t *dsize, const char **datap ) argument
[all...]
/freebsd-10-stable/contrib/ntp/ntpdc/
H A Dntpdc.c863 * REQ_LEN_NOMAC + 4 + 16 with the auth bit enabled. When using a
875 int auth,
905 if (!auth || (keyid_entered && info_auth_keyid == 0)) {
973 int auth,
1018 res = sendrequest(implcode, reqcode, auth, qitems, qsize, qdata);
1654 * my_delay - set delay for auth requests
872 sendrequest( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata ) argument
970 doquery( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata, size_t *ritems, size_t *rsize, const char **rdata, int quiet_mask, int esize ) argument
/freebsd-10-stable/contrib/ntp/ntpd/
H A Dntp_config.c403 if (ptree->auth.keys) {
404 free(ptree->auth.keys);
405 ptree->auth.keys = NULL;
408 if (ptree->auth.keysdir) {
409 free(ptree->auth.keysdir);
410 ptree->auth.keysdir = NULL;
413 if (ptree->auth.ntp_signd_socket) {
414 free(ptree->auth.ntp_signd_socket);
415 ptree->auth.ntp_signd_socket = NULL;
657 atrv = HEAD_PFIFO(ptree->auth
[all...]
/freebsd-10-stable/sys/fs/nfs/
H A Dnfs_commonkrpc.c127 uid_t ca_uid; /* uid that corresponds to this auth */
128 AUTH *ca_auth; /* RPC auth handle */
405 AUTH *auth; local
423 auth = rpc_gss_secfind_call(nrp->nr_client, cred,
426 auth = rpc_gss_seccreate_call(nrp->nr_client, cred,
429 return (auth);
431 if (auth != NULL)
432 return (auth);
499 AUTH *auth; local
623 auth
[all...]
/freebsd-10-stable/release/tools/
H A Dgce.conf65 *.err;kern.warning;auth.notice;mail.crit /dev/console
/freebsd-10-stable/contrib/wpa/src/rsn_supp/
H A Dwpa.c435 os_memcpy(buf, ptk->u.auth.tx_mic_key, 8);
436 os_memcpy(ptk->u.auth.tx_mic_key, ptk->u.auth.rx_mic_key, 8);
437 os_memcpy(ptk->u.auth.rx_mic_key, buf, 8);
2324 * @bridge_ifname: Optional bridge interface name (for pre-auth)
/freebsd-10-stable/sys/geom/eli/
H A Dg_eli_integrity.c160 u_char *srcdata, *dstdata, *auth; local
181 auth = srcdata + encr_secsize * nsec;
189 if (bcmp(srcdata, auth, sc->sc_alen) != 0) {
220 auth += sc->sc_alen;
417 u_char *p, *data, *auth, *authkey, *plaindata; local
438 auth = NULL; /* Silence compiler warning. */
442 auth = data + encr_secsize * nsec;
443 p = auth + sc->sc_alen * nsec;
484 bcopy(data, auth, sc->sc_alen);
485 auth
[all...]
/freebsd-10-stable/contrib/ntp/include/
H A Dntp_request.h144 char mac[MAX_MDG_LEN]; /* (optional) auth code */
154 char mac[MAX_MDG_LEN]; /* (optional) auth code */
225 #define AUTH_SEQ(auth, seq) ((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
H A Dntp_config.h239 auth_node auth; member in struct:config_tree_tag
/freebsd-10-stable/contrib/wpa/src/common/
H A Dwpa_common.h186 } auth; member in union:wpa_ptk::__anon418
/freebsd-10-stable/crypto/openssh/
H A Dauth.h1 /* $OpenBSD: auth.h,v 1.88 2016/05/04 14:04:40 markus Exp $ */
141 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *);
153 #include "auth-pam.h"
/freebsd-10-stable/crypto/openssh/regress/
H A Dintegrity.sh15 macs="$macs `${SSH} -Q cipher-auth`"
41 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
H A Dcert-userkey.sh172 auth=$1
173 if test "x$auth" = "xauthorized_keys" ; then
187 _prefix="${ktype} privsep $privsep $auth"
242 verbose "$tid: ${ktype} $auth revoked CA key"
256 verbose "$tid: $auth CA does not authenticate"
284 for auth in $auth_choice ; do
287 if test "x$auth" = "xauthorized_keys" ; then
304 verbose "$tid: $ident auth $auth expect $result $ktype"
/freebsd-10-stable/crypto/openssh/contrib/redhat/
H A Dopenssh.spec119 Requires: /etc/pam.d/system-auth
512 - pull cvs patch to not cut off challengeresponse auth needlessly
575 limit users to pubkey and rsa auth (#34378)
648 - Extract patch from CVS to handle auth banners (in the client).
/freebsd-10-stable/lib/libtelnet/
H A DMakefile20 SRCS+= encrypt.c auth.c enc_des.c sra.c pk.c
/freebsd-10-stable/etc/
H A Dsyslog.conf8 *.err;kern.warning;auth.notice;mail.crit /dev/console
11 auth.info;authpriv.info /var/log/auth.log
/freebsd-10-stable/usr.sbin/rpcbind/
H A Drpcb_svc_com.c616 AUTH *auth; local
839 auth = authnone_create();
844 auth = authunix_create(au->aup_machname,
847 if (auth == NULL) /* fall back */
848 auth = authnone_create();
858 if (auth == NULL) {
866 if (!AUTH_MARSHALL(auth, &outxdr)) {
869 AUTH_DESTROY(auth);
875 AUTH_DESTROY(auth);
/freebsd-10-stable/sys/rpc/
H A Dclnt_vc.c293 AUTH *auth; local
318 auth = ext->rc_auth;
321 auth = cl->cl_auth;
374 (! AUTH_MARSHALL(auth, xid, &xdrs,
420 AUTH_VALIDATE(auth, xid, NULL, NULL);
527 if (!AUTH_VALIDATE(auth, xid,
534 ("auth validated but no result"));
545 AUTH_REFRESH(auth, &reply_msg)) {
575 if (auth && stat != RPC_SUCCESS)
576 AUTH_VALIDATE(auth, xi
[all...]
/freebsd-10-stable/sbin/mount_nfs/
H A Dmount_nfs.c97 long auth; member in struct:nfhret
841 nfhret.auth = secflavor;
882 secname = sec_num_to_name(nfhret.auth);
991 long auth, authcnt, authfnd = 0; local
1011 if (!xdr_long(xdrsp, &auth))
1013 if (np->auth == -1) {
1014 np->auth = auth;
1016 } else if (auth == np->auth) {
[all...]
/freebsd-10-stable/usr.sbin/ctld/
H A Dctld.h54 struct auth { struct
55 TAILQ_ENTRY(auth) a_next;
89 TAILQ_HEAD(, auth) ag_auths;
310 const struct auth *auth_new_chap(struct auth_group *ag,
312 const struct auth *auth_new_chap_mutual(struct auth_group *ag,
315 const struct auth *auth_find(const struct auth_group *ag,

Completed in 259 milliseconds

12345678910