HomeSort by: relevance | last modified time | path
    Searched refs:xauth (Results 1 - 13 of 13) sorted by relevancy

  /src/external/mit/xorg/bin/xauth/
Makefile 5 PROG= xauth
6 SRCS= xauth.c gethost.c process.c parsedpy.c
  /src/sys/net80211/
ieee80211_xauth.c 71 static const struct ieee80211_authenticator xauth = { variable in typeref:struct:ieee80211_authenticator
81 ieee80211_authenticator_register(IEEE80211_AUTH_8021X, &xauth);
82 ieee80211_authenticator_register(IEEE80211_AUTH_WPA, &xauth);
  /src/external/mit/xorg/bin/
Makefile 12 transset twm ucs2any viewres x11perf xauth xbiff xcalc \
  /src/crypto/dist/ipsec-tools/src/racoon/
admin.c 456 if (xauth_rmconf_used(&rmconf->xauth) == -1)
459 if (rmconf->xauth->login != NULL) {
460 vfree(rmconf->xauth->login);
461 rmconf->xauth->login = NULL;
463 if (rmconf->xauth->pass != NULL) {
464 vfree(rmconf->xauth->pass);
465 rmconf->xauth->pass = NULL;
468 rmconf->xauth->login = id;
469 rmconf->xauth->pass = key;
isakmp_xauth.c 128 struct xauth_state *xst = &iph1->mode_cfg->xauth;
134 "Xauth request while phase 1 is not completed\n");
140 "Xauth request whith Xauth state %d\n", xst->status);
144 plog(LLV_INFO, LOCATION, NULL, "Sending Xauth request\n");
191 struct xauth_state *xst = &iph1->mode_cfg->xauth;
195 "Xauth reply but peer did not declare "
196 "itself as Xauth capable\n");
202 "Xauth reply while Xauth state is %d\n", xst->status)
    [all...]
isakmp_cfg.h 163 struct xauth_state xauth; /* Xauth state, if revelant */ member in struct:isakmp_cfg_state
169 #define ISAKMP_CFG_VENDORID_XAUTH 0x01 /* Supports Xauth */
remoteconf.c 526 new->xauth = NULL;
641 if (new->xauth != NULL && new->xauth == rmconf->xauth) {
642 new->xauth = xauth_rmconf_dup(new->xauth);
643 if (new->xauth == NULL)
710 if (rmconf->xauth)
711 xauth_rmconf_delete(&rmconf->xauth);
remoteconf.h 161 struct xauth_rmconf *xauth; member in struct:remoteconf
isakmp_cfg.c 767 * Don't give an address to a peer that did not succeed Xauth
771 "Attempt to start phase config whereas Xauth failed\n");
1303 xauth_rmstate(&state->xauth);
1830 if (iph1->mode_cfg->xauth.authdata.generic.usr != NULL) {
1832 iph1->mode_cfg->xauth.authdata.generic.usr) != 0) {
cfparse.y 1708 yyerror("failed to set sainfo xauth group.\n");
2147 if (xauth_rmconf_used(&cur_rmconf->xauth) == -1) {
2148 yyerror("failed to allocate xauth state\n");
2152 if ((cur_rmconf->xauth->login = vdup($2)) == NULL) {
isakmp_agg.c 177 /* Do we need Xauth VID? */
188 "Xauth vendor ID generation failed\n");
608 !iph1->rmconf->xauth &&
1169 plog (LLV_INFO, LOCATION, NULL, "Adding xauth VID payload.\n");
1172 "Cannot create Xauth vendor ID\n");
oakley.c 1277 "but peer is no Xauth compliant\n");
1513 "but peer is no Xauth compliant\n");
1526 if (iph1->rmconf->xauth)
  /src/share/mk/
bsd.own.mk 1916 x11perf xauth xcalc xclipboard \

Completed in 62 milliseconds