/freebsd-10-stable/sys/rpc/rpcsec_gss/ |
H A D | svc_rpcsec_gss.c | 1489 svc_rpc_gss_wrap(SVCAUTH *auth, struct mbuf **mp) argument 1496 cc = (struct svc_rpc_gss_cookedcred *) auth->svc_ah_private; 1509 svc_rpc_gss_unwrap(SVCAUTH *auth, struct mbuf **mp) argument 1516 cc = (struct svc_rpc_gss_cookedcred *) auth->svc_ah_private; 1529 svc_rpc_gss_release(SVCAUTH *auth) argument 1536 cc = (struct svc_rpc_gss_cookedcred *) auth->svc_ah_private;
|
/freebsd-10-stable/sys/contrib/ipfilter/netinet/ |
H A D | fil.c | 1701 u_short optmsk = 0, secmsk = 0, auth = 0; local 1851 auth = doi & 0xffff; 1863 auth = doi & 0xffff; 1883 if (auth && !(auth & 0x0100)) 1884 auth &= 0xff00; 1887 fi->fi_auth = auth; 1902 u_short secmsk = 0, auth = 0; local 1911 auth = *(s + 3); 1912 auth * [all...] |
/freebsd-10-stable/sys/net80211/ |
H A D | ieee80211_ioctl.c | 1470 * For shared key auth, just continue the 2669 const struct ieee80211_authenticator *auth; local 2752 auth = ieee80211_authenticator_get(ireq->i_val); 2753 if (auth == NULL) 2782 vap->iv_auth = auth;
|
/freebsd-10-stable/sys/dev/usb/wlan/ |
H A D | if_rsu.c | 1054 struct r92s_fw_cmd_auth auth; local 1067 memset(&auth, 0, sizeof(auth)); 1069 auth.mode = R92S_AUTHMODE_WPA; 1070 auth.dot1x = (ni->ni_authmode == IEEE80211_AUTH_8021X); 1072 auth.mode = R92S_AUTHMODE_OPEN; 1073 DPRINTF("setting auth mode to %d\n", auth.mode); 1074 error = rsu_fw_cmd(sc, R92S_CMD_SET_AUTH, &auth, sizeof(auth)); [all...] |
/freebsd-10-stable/contrib/ntp/ntpq/ |
H A D | ntpq.c | 1287 int auth, 1337 if (!auth && !always_auth) { 1471 int auth, 1479 return doqueryex(opcode, associd, auth, qsize, qdata, rstatus, 1492 int auth, 1519 res = sendrequest(opcode, associd, auth, qsize, qdata); 2434 * auth_delay - set delay for auth requests 1284 sendrequest( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata ) argument 1468 doquery( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata ) argument 1489 doqueryex( int opcode, associd_t associd, int auth, size_t qsize, const char *qdata, u_short *rstatus, size_t *rsize, const char **rdata, int quiet ) argument
|
H A D | ntpq-subs.c | 580 int auth, 592 return doquery(op, associd, auth, datalen, data, rstatus, dsize, 1144 const char *auth; local 1158 "ind assid status conf reach auth condition last_event cnt\n"); 1174 auth = "yes"; 1176 auth = "none"; 1184 auth = "ok "; 1186 auth = "bad"; 1188 auth = "none"; 1304 assoc_cache[i].status, conf, reach, auth, 576 doquerylist( struct varlist *vlist, int op, associd_t associd, int auth, u_short *rstatus, size_t *dsize, const char **datap ) argument [all...] |
/freebsd-10-stable/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 863 * REQ_LEN_NOMAC + 4 + 16 with the auth bit enabled. When using a 875 int auth, 905 if (!auth || (keyid_entered && info_auth_keyid == 0)) { 973 int auth, 1018 res = sendrequest(implcode, reqcode, auth, qitems, qsize, qdata); 1654 * my_delay - set delay for auth requests 872 sendrequest( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata ) argument 970 doquery( int implcode, int reqcode, int auth, size_t qitems, size_t qsize, const char *qdata, size_t *ritems, size_t *rsize, const char **rdata, int quiet_mask, int esize ) argument
|
/freebsd-10-stable/contrib/ntp/ntpd/ |
H A D | ntp_config.c | 403 if (ptree->auth.keys) { 404 free(ptree->auth.keys); 405 ptree->auth.keys = NULL; 408 if (ptree->auth.keysdir) { 409 free(ptree->auth.keysdir); 410 ptree->auth.keysdir = NULL; 413 if (ptree->auth.ntp_signd_socket) { 414 free(ptree->auth.ntp_signd_socket); 415 ptree->auth.ntp_signd_socket = NULL; 657 atrv = HEAD_PFIFO(ptree->auth [all...] |
/freebsd-10-stable/sys/fs/nfs/ |
H A D | nfs_commonkrpc.c | 127 uid_t ca_uid; /* uid that corresponds to this auth */ 128 AUTH *ca_auth; /* RPC auth handle */ 405 AUTH *auth; local 423 auth = rpc_gss_secfind_call(nrp->nr_client, cred, 426 auth = rpc_gss_seccreate_call(nrp->nr_client, cred, 429 return (auth); 431 if (auth != NULL) 432 return (auth); 499 AUTH *auth; local 623 auth [all...] |
/freebsd-10-stable/release/tools/ |
H A D | gce.conf | 65 *.err;kern.warning;auth.notice;mail.crit /dev/console
|
/freebsd-10-stable/contrib/wpa/src/rsn_supp/ |
H A D | wpa.c | 435 os_memcpy(buf, ptk->u.auth.tx_mic_key, 8); 436 os_memcpy(ptk->u.auth.tx_mic_key, ptk->u.auth.rx_mic_key, 8); 437 os_memcpy(ptk->u.auth.rx_mic_key, buf, 8); 2324 * @bridge_ifname: Optional bridge interface name (for pre-auth)
|
/freebsd-10-stable/sys/geom/eli/ |
H A D | g_eli_integrity.c | 160 u_char *srcdata, *dstdata, *auth; local 181 auth = srcdata + encr_secsize * nsec; 189 if (bcmp(srcdata, auth, sc->sc_alen) != 0) { 220 auth += sc->sc_alen; 417 u_char *p, *data, *auth, *authkey, *plaindata; local 438 auth = NULL; /* Silence compiler warning. */ 442 auth = data + encr_secsize * nsec; 443 p = auth + sc->sc_alen * nsec; 484 bcopy(data, auth, sc->sc_alen); 485 auth [all...] |
/freebsd-10-stable/contrib/ntp/include/ |
H A D | ntp_request.h | 144 char mac[MAX_MDG_LEN]; /* (optional) auth code */ 154 char mac[MAX_MDG_LEN]; /* (optional) auth code */ 225 #define AUTH_SEQ(auth, seq) ((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
|
H A D | ntp_config.h | 239 auth_node auth; member in struct:config_tree_tag
|
/freebsd-10-stable/contrib/wpa/src/common/ |
H A D | wpa_common.h | 186 } auth; member in union:wpa_ptk::__anon418
|
/freebsd-10-stable/crypto/openssh/ |
H A D | auth.h | 1 /* $OpenBSD: auth.h,v 1.88 2016/05/04 14:04:40 markus Exp $ */ 141 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *); 153 #include "auth-pam.h"
|
/freebsd-10-stable/crypto/openssh/regress/ |
H A D | integrity.sh | 15 macs="$macs `${SSH} -Q cipher-auth`" 41 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
|
H A D | cert-userkey.sh | 172 auth=$1 173 if test "x$auth" = "xauthorized_keys" ; then 187 _prefix="${ktype} privsep $privsep $auth" 242 verbose "$tid: ${ktype} $auth revoked CA key" 256 verbose "$tid: $auth CA does not authenticate" 284 for auth in $auth_choice ; do 287 if test "x$auth" = "xauthorized_keys" ; then 304 verbose "$tid: $ident auth $auth expect $result $ktype"
|
/freebsd-10-stable/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 119 Requires: /etc/pam.d/system-auth 512 - pull cvs patch to not cut off challengeresponse auth needlessly 575 limit users to pubkey and rsa auth (#34378) 648 - Extract patch from CVS to handle auth banners (in the client).
|
/freebsd-10-stable/lib/libtelnet/ |
H A D | Makefile | 20 SRCS+= encrypt.c auth.c enc_des.c sra.c pk.c
|
/freebsd-10-stable/etc/ |
H A D | syslog.conf | 8 *.err;kern.warning;auth.notice;mail.crit /dev/console 11 auth.info;authpriv.info /var/log/auth.log
|
/freebsd-10-stable/usr.sbin/rpcbind/ |
H A D | rpcb_svc_com.c | 616 AUTH *auth; local 839 auth = authnone_create(); 844 auth = authunix_create(au->aup_machname, 847 if (auth == NULL) /* fall back */ 848 auth = authnone_create(); 858 if (auth == NULL) { 866 if (!AUTH_MARSHALL(auth, &outxdr)) { 869 AUTH_DESTROY(auth); 875 AUTH_DESTROY(auth);
|
/freebsd-10-stable/sys/rpc/ |
H A D | clnt_vc.c | 293 AUTH *auth; local 318 auth = ext->rc_auth; 321 auth = cl->cl_auth; 374 (! AUTH_MARSHALL(auth, xid, &xdrs, 420 AUTH_VALIDATE(auth, xid, NULL, NULL); 527 if (!AUTH_VALIDATE(auth, xid, 534 ("auth validated but no result")); 545 AUTH_REFRESH(auth, &reply_msg)) { 575 if (auth && stat != RPC_SUCCESS) 576 AUTH_VALIDATE(auth, xi [all...] |
/freebsd-10-stable/sbin/mount_nfs/ |
H A D | mount_nfs.c | 97 long auth; member in struct:nfhret 841 nfhret.auth = secflavor; 882 secname = sec_num_to_name(nfhret.auth); 991 long auth, authcnt, authfnd = 0; local 1011 if (!xdr_long(xdrsp, &auth)) 1013 if (np->auth == -1) { 1014 np->auth = auth; 1016 } else if (auth == np->auth) { [all...] |
/freebsd-10-stable/usr.sbin/ctld/ |
H A D | ctld.h | 54 struct auth { struct 55 TAILQ_ENTRY(auth) a_next; 89 TAILQ_HEAD(, auth) ag_auths; 310 const struct auth *auth_new_chap(struct auth_group *ag, 312 const struct auth *auth_new_chap_mutual(struct auth_group *ag, 315 const struct auth *auth_find(const struct auth_group *ag,
|