Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 25 of 199) sorted by path

12345678

/illumos-gate/usr/src/boot/libsa/
H A Dnfs.c197 uint32_t auth[7]; in nfs_getrootfh() member
H A Drpc.c114 struct auth_info *auth; in rpc_call() local
142 send_head -= sizeof(*auth); in rpc_call()
143 auth = (struct auth_info *)send_head; in rpc_call()
144 auth->authtype = htonl(RPCAUTH_NULL); in rpc_call()
145 auth->authlen = 0; in rpc_call()
150 send_head -= sizeof(*auth); in rpc_call()
151 auth = (struct auth_info *)send_head; in rpc_call()
152 auth->authtype = htonl(RPCAUTH_UNIX); in rpc_call()
153 auth->authlen = htonl(sizeof(struct auth_unix)); in rpc_call()
188 auth = &reply->rp_u.rpu_rok.rok_auth; in rpc_call()
[all …]
/illumos-gate/usr/src/cmd/acctadm/
H A Daconf.c370 char auth[NSS_BUFLEN_AUTHATTR]; in aconf_have_smf_auths() local
376 if (aconf_get_string("general", "action_authorization", auth, in aconf_have_smf_auths()
377 sizeof (auth)) == -1 || chkauthattr(auth, pw->pw_name) == 0) in aconf_have_smf_auths()
380 if (aconf_get_string("general", "value_authorization", auth, in aconf_have_smf_auths()
381 sizeof (auth)) == -1 || chkauthattr(auth, pw->pw_name) == 0) in aconf_have_smf_auths()
384 if (aconf_get_string("config", "value_authorization", auth, in aconf_have_smf_auths()
385 sizeof (auth)) == -1 || chkauthattr(auth, pw->pw_name) == 0) in aconf_have_smf_auths()
/illumos-gate/usr/src/cmd/auths/
H A Dauths.c177 auth_match(const char *pattern, const char *auth) in auth_match() argument
184 return (strncmp(pattern, auth, len - 1) == 0); in auth_match()
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dcommon.c1314 token_auth_needed(KMF_HANDLE_T handle, char *tokenlabel, int *auth) in token_auth_needed() argument
1321 *auth = 0; in token_auth_needed()
1330 *auth = (info.flags & CKF_LOGIN_REQUIRED); in token_auth_needed()
H A Dlist.c316 int auth = 0; in list_pk11_objects() local
334 rv = token_auth_needed(kmfhandle, token, &auth); in list_pk11_objects()
418 if (auth > 0 && (tokencred == NULL || in list_pk11_objects()
450 if (auth > 0 && (cred.cred == NULL)) { in list_pk11_objects()
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ftp/
H A DMakefile32 AUTH_OBJS = auth.o cmds_gss.o secure.o
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A DMakefile14 OBJS= auth.o ccp.o chap.o demand.o fsm.o ipcp.o ipv6cp.o \
H A Dauth.c505 int auth; local
540 auth = 0;
556 auth |= CHAP_PEER;
561 auth |= PAP_PEER;
583 auth |= CHAP_WITHPEER;
593 auth |= PAP_WITHPEER;
595 auth_pending[unit] = auth;
597 if (!auth)
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A DMakefile33 AUTH_OBJS= auth.o authenc.o kerberos5.o
H A Dkerberos5.c100 static krb5_data auth; /* telnetd gets session key from here */ variable
342 &check_data, new_creds, &auth); in kerberos5_send()
385 retval = krb5_send_data(ap, KRB_AUTH, auth.data, auth.length); in kerberos5_send()
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A DREADME487 phase2="auth=MSCHAPV2"
505 phase2="auth=MD5"
H A Dwpa.c983 (void) memcpy(buf, ptk->u.auth.tx_mic_key, 8); in wpa_supplicant_process_1_of_4()
984 (void) memcpy(ptk->u.auth.tx_mic_key, ptk->u.auth.rx_mic_key, 8); in wpa_supplicant_process_1_of_4()
985 (void) memcpy(ptk->u.auth.rx_mic_key, buf, 8); in wpa_supplicant_process_1_of_4()
H A Dwpa_impl.h157 } auth; member
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/in.routed/
H A Ddefs.h348 struct auth { /* authentication info */ struct
523 struct auth parm_auth[MAX_AUTH_KEYS];
640 extern void clr_ws_buf(struct ws_buf *, struct auth *);
793 extern struct auth *find_auth(struct interface *);
794 extern void end_md5_auth(struct ws_buf *, struct auth *);
H A Dinput.c168 struct auth *ap; in input()
1379 struct auth *ap; in ck_passwd()
H A Doutput.c56 struct auth *a;
246 struct auth *
249 struct auth *ap, *res = NULL; in find_auth()
286 clr_ws_buf(struct ws_buf *wb, struct auth *ap) in clr_ws_buf()
320 end_md5_auth(struct ws_buf *wb, struct auth *ap) in end_md5_auth()
H A Dparms.c504 struct auth k, *ap, *ap2; in get_passwd()
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.telnetd.c542 krb5_data auth; in kerberos5_is() local
550 auth.data = (char *)data; in kerberos5_is()
551 auth.length = cnt; in kerberos5_is()
602 err = krb5_rd_req(telnet_context, &auth_context, &auth, in kerberos5_is()
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/
H A Dipseckey.c1652 struct sadb_key *encrypt = NULL, *auth = NULL; in doaddup() local
2340 if (auth != NULL) { in doaddup()
2346 auth = parsekey(*argv, ebuf, 0); in doaddup()
2348 if (auth == NULL) { in doaddup()
2353 totallen += SADB_64TO8(auth->sadb_key_len); in doaddup()
2354 auth->sadb_key_exttype = SADB_EXT_KEY_AUTH; in doaddup()
2824 if (auth != NULL) { in doaddup()
2825 bcopy(auth, nexthdr, SADB_64TO8(auth->sadb_key_len)); in doaddup()
2826 nexthdr += auth->sadb_key_len; in doaddup()
2827 bzero(auth, SADB_64TO8(auth->sadb_key_len)); in doaddup()
[all …]
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/
H A Dsnoop_mount.c345 int i, auth, flavors; in print_auth() local
354 switch (auth = getxdr_u_long()) { in print_auth()
371 "%d", auth); in print_auth()
H A Dsnoop_rip.c53 const char *cmdstr, *auth; in interpret_rip() local
90 auth = ""; in interpret_rip()
99 auth = " +Auth"; in interpret_rip()
105 count, (len != 0 ? "?" : ""), auth); in interpret_rip()
H A Dsnoop_slp.c591 #define SKIPAUTH(auth) \ argument
592 if (auth && ((retlength = skip_v1authblock()) < 0)) \
611 #define DOAUTH(auth) \ argument
612 if (auth && slpv1_authblock() < 0) \
/illumos-gate/usr/src/cmd/dcs/sparc/sun4u/
H A Drdr_messages.c154 int (*auth)(int, struct sockaddr *, int); member
1400 (libdscp.auth(0, addr, len) != DSCP_OK)) { in rdr_auth()
4538 libdscp->auth = (int (*)(int, struct sockaddr *, int))dlsym(lib, in load_libdscp()
4543 (libdscp->auth == NULL)) { in load_libdscp()
/illumos-gate/usr/src/cmd/dfs.cmds/sharemgr/
H A Dcommands.c1202 int auth; in sa_create() local
1446 int auth; in sa_delete() local
2549 int auth; in sa_addshare() local
2782 !auth && verbose) { in sa_addshare()
3020 int auth; in sa_removeshare() local
3251 if (!auth && verbose) { in sa_removeshare()
3283 int auth; in sa_set_share() local
3901 int auth; in sa_set() local
4436 int auth; in sa_unset() local
4600 int auth = 1; in sa_enable_group() local
[all …]

12345678