/illumos-gate/usr/src/boot/libsa/ |
H A D | nfs.c | 197 uint32_t auth[7]; in nfs_getrootfh() member
|
H A D | rpc.c | 114 struct auth_info *auth; in rpc_call() local 142 send_head -= sizeof(*auth); in rpc_call() 143 auth = (struct auth_info *)send_head; in rpc_call() 144 auth->authtype = htonl(RPCAUTH_NULL); in rpc_call() 145 auth->authlen = 0; in rpc_call() 150 send_head -= sizeof(*auth); in rpc_call() 151 auth = (struct auth_info *)send_head; in rpc_call() 152 auth->authtype = htonl(RPCAUTH_UNIX); in rpc_call() 153 auth->authlen = htonl(sizeof(struct auth_unix)); in rpc_call() 188 auth = &reply->rp_u.rpu_rok.rok_auth; in rpc_call() [all …]
|
/illumos-gate/usr/src/cmd/acctadm/ |
H A D | aconf.c | 370 char auth[NSS_BUFLEN_AUTHATTR]; in aconf_have_smf_auths() local 376 if (aconf_get_string("general", "action_authorization", auth, in aconf_have_smf_auths() 377 sizeof (auth)) == -1 || chkauthattr(auth, pw->pw_name) == 0) in aconf_have_smf_auths() 380 if (aconf_get_string("general", "value_authorization", auth, in aconf_have_smf_auths() 381 sizeof (auth)) == -1 || chkauthattr(auth, pw->pw_name) == 0) in aconf_have_smf_auths() 384 if (aconf_get_string("config", "value_authorization", auth, in aconf_have_smf_auths() 385 sizeof (auth)) == -1 || chkauthattr(auth, pw->pw_name) == 0) in aconf_have_smf_auths()
|
/illumos-gate/usr/src/cmd/auths/ |
H A D | auths.c | 177 auth_match(const char *pattern, const char *auth) in auth_match() argument 184 return (strncmp(pattern, auth, len - 1) == 0); in auth_match()
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | common.c | 1314 token_auth_needed(KMF_HANDLE_T handle, char *tokenlabel, int *auth) in token_auth_needed() argument 1321 *auth = 0; in token_auth_needed() 1330 *auth = (info.flags & CKF_LOGIN_REQUIRED); in token_auth_needed()
|
H A D | list.c | 316 int auth = 0; in list_pk11_objects() local 334 rv = token_auth_needed(kmfhandle, token, &auth); in list_pk11_objects() 418 if (auth > 0 && (tokencred == NULL || in list_pk11_objects() 450 if (auth > 0 && (cred.cred == NULL)) { in list_pk11_objects()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ftp/ |
H A D | Makefile | 32 AUTH_OBJS = auth.o cmds_gss.o secure.o
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | Makefile | 14 OBJS= auth.o ccp.o chap.o demand.o fsm.o ipcp.o ipv6cp.o \
|
H A D | auth.c | 505 int auth; local 540 auth = 0; 556 auth |= CHAP_PEER; 561 auth |= PAP_PEER; 583 auth |= CHAP_WITHPEER; 593 auth |= PAP_WITHPEER; 595 auth_pending[unit] = auth; 597 if (!auth)
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | Makefile | 33 AUTH_OBJS= auth.o authenc.o kerberos5.o
|
H A D | kerberos5.c | 100 static krb5_data auth; /* telnetd gets session key from here */ variable 342 &check_data, new_creds, &auth); in kerberos5_send() 385 retval = krb5_send_data(ap, KRB_AUTH, auth.data, auth.length); in kerberos5_send()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | README | 487 phase2="auth=MSCHAPV2" 505 phase2="auth=MD5"
|
H A D | wpa.c | 983 (void) memcpy(buf, ptk->u.auth.tx_mic_key, 8); in wpa_supplicant_process_1_of_4() 984 (void) memcpy(ptk->u.auth.tx_mic_key, ptk->u.auth.rx_mic_key, 8); in wpa_supplicant_process_1_of_4() 985 (void) memcpy(ptk->u.auth.rx_mic_key, buf, 8); in wpa_supplicant_process_1_of_4()
|
H A D | wpa_impl.h | 157 } auth; member
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/in.routed/ |
H A D | defs.h | 348 struct auth { /* authentication info */ struct 523 struct auth parm_auth[MAX_AUTH_KEYS]; 640 extern void clr_ws_buf(struct ws_buf *, struct auth *); 793 extern struct auth *find_auth(struct interface *); 794 extern void end_md5_auth(struct ws_buf *, struct auth *);
|
H A D | input.c | 168 struct auth *ap; in input() 1379 struct auth *ap; in ck_passwd()
|
H A D | output.c | 56 struct auth *a; 246 struct auth * 249 struct auth *ap, *res = NULL; in find_auth() 286 clr_ws_buf(struct ws_buf *wb, struct auth *ap) in clr_ws_buf() 320 end_md5_auth(struct ws_buf *wb, struct auth *ap) in end_md5_auth()
|
H A D | parms.c | 504 struct auth k, *ap, *ap2; in get_passwd()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 542 krb5_data auth; in kerberos5_is() local 550 auth.data = (char *)data; in kerberos5_is() 551 auth.length = cnt; in kerberos5_is() 602 err = krb5_rd_req(telnet_context, &auth_context, &auth, in kerberos5_is()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ |
H A D | ipseckey.c | 1652 struct sadb_key *encrypt = NULL, *auth = NULL; in doaddup() local 2340 if (auth != NULL) { in doaddup() 2346 auth = parsekey(*argv, ebuf, 0); in doaddup() 2348 if (auth == NULL) { in doaddup() 2353 totallen += SADB_64TO8(auth->sadb_key_len); in doaddup() 2354 auth->sadb_key_exttype = SADB_EXT_KEY_AUTH; in doaddup() 2824 if (auth != NULL) { in doaddup() 2825 bcopy(auth, nexthdr, SADB_64TO8(auth->sadb_key_len)); in doaddup() 2826 nexthdr += auth->sadb_key_len; in doaddup() 2827 bzero(auth, SADB_64TO8(auth->sadb_key_len)); in doaddup() [all …]
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/ |
H A D | snoop_mount.c | 345 int i, auth, flavors; in print_auth() local 354 switch (auth = getxdr_u_long()) { in print_auth() 371 "%d", auth); in print_auth()
|
H A D | snoop_rip.c | 53 const char *cmdstr, *auth; in interpret_rip() local 90 auth = ""; in interpret_rip() 99 auth = " +Auth"; in interpret_rip() 105 count, (len != 0 ? "?" : ""), auth); in interpret_rip()
|
H A D | snoop_slp.c | 591 #define SKIPAUTH(auth) \ argument 592 if (auth && ((retlength = skip_v1authblock()) < 0)) \ 611 #define DOAUTH(auth) \ argument 612 if (auth && slpv1_authblock() < 0) \
|
/illumos-gate/usr/src/cmd/dcs/sparc/sun4u/ |
H A D | rdr_messages.c | 154 int (*auth)(int, struct sockaddr *, int); member 1400 (libdscp.auth(0, addr, len) != DSCP_OK)) { in rdr_auth() 4538 libdscp->auth = (int (*)(int, struct sockaddr *, int))dlsym(lib, in load_libdscp() 4543 (libdscp->auth == NULL)) { in load_libdscp()
|
/illumos-gate/usr/src/cmd/dfs.cmds/sharemgr/ |
H A D | commands.c | 1202 int auth; in sa_create() local 1446 int auth; in sa_delete() local 2549 int auth; in sa_addshare() local 2782 !auth && verbose) { in sa_addshare() 3020 int auth; in sa_removeshare() local 3251 if (!auth && verbose) { in sa_removeshare() 3283 int auth; in sa_set_share() local 3901 int auth; in sa_set() local 4436 int auth; in sa_unset() local 4600 int auth = 1; in sa_enable_group() local [all …]
|