/external/libppp/src/ |
pap.c | 83 pap_Req(struct authinfo *authp) 85 struct bundle *bundle = authp->physical->dl->bundle; 99 lh.id = authp->id; 109 link_PushPacket(&authp->physical->link, bp, bundle, 110 LINK_QUEUES(&authp->physical->link) - 1, PROTO_PAP); 114 SendPapCode(struct authinfo *authp, int code, const char *message) 122 lh.id = authp->id; 138 link_PushPacket(&authp->physical->link, bp, authp->physical->dl->bundle, 139 LINK_QUEUES(&authp->physical->link) - 1, PROTO_PAP) 183 struct authinfo *authp = &p->dl->pap; local [all...] |
auth.c | 388 struct authinfo *authp = (struct authinfo *)vauthp; local 390 timer_Stop(&authp->authtimer); 391 if (--authp->retry > 0) { 392 authp->id++; 393 (*authp->fn.req)(authp); 394 timer_Start(&authp->authtimer); 397 datalink_AuthNotOk(authp->physical->dl); 402 auth_Init(struct authinfo *authp, struct physical *p, auth_func req, 405 memset(authp, '\0', sizeof(struct authinfo)) [all...] |
chap.c | 487 chap_ChallengeInit(struct authinfo *authp) 489 struct chap *chap = auth2chap(authp); 493 len = strlen(authp->physical->dl->bundle->cfg.auth.name); 500 if (*authp->physical->dl->bundle->radius.cfg.file) { 509 if (authp->physical->link.lcp.want_authtype == 0x80) 511 else if (authp->physical->link.lcp.want_authtype == 0x81) 519 memcpy(cp, authp->physical->dl->bundle->cfg.auth.name, len); 524 chap_Challenge(struct authinfo *authp) 526 struct chap *chap = auth2chap(authp); 530 authp->physical->link.lcp.want_authtype) [all...] |
radius.c | 893 radius_Authenticate(struct radius *r, struct authinfo *authp, const char *name, 947 switch (authp->physical->link.lcp.want_auth) { 960 switch (authp->physical->link.lcp.want_authtype) { 1016 authp->physical->link.lcp.want_authtype); 1025 if (Enabled(authp->physical->dl->bundle, OPT_NAS_IP_ADDRESS) && 1035 if (Enabled(authp->physical->dl->bundle, OPT_NAS_IDENTIFIER) && 1051 radius_put_physical_details(r, authp->physical); 1055 r->cx.auth = authp; [all...] |
/external/kernel-headers/original/linux/sunrpc/ |
svcauth.h | 61 * If there is a problem with the authentication *authp should be set. 71 * DENIED - authp holds reason for denial. 85 * DENIED - authp holds a reason for MSG_DENIED 98 int (*accept)(struct svc_rqst *rq, u32 *authp); 115 extern int svc_authenticate(struct svc_rqst *rqstp, u32 *authp);
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
d1_clnt.c | 1051 krb5_data authenticator, *authp = NULL; local 1067 authp = NULL; 1069 if (KRB5SENDAUTH) authp = &authenticator; 1072 krb5rc = kssl_cget_tkt(kssl_ctx, &enc_ticket, authp, 1120 if (authp && authp->length) 1122 s2n(authp->length,p); 1123 memcpy(p, authp->data, authp->length); 1124 p+= authp->length [all...] |
s3_clnt.c | 2391 krb5_data authenticator, *authp = NULL; local [all...] |
/external/openssl/ssl/ |
d1_clnt.c | 1051 krb5_data authenticator, *authp = NULL; local 1067 authp = NULL; 1069 if (KRB5SENDAUTH) authp = &authenticator; 1072 krb5rc = kssl_cget_tkt(kssl_ctx, &enc_ticket, authp, 1120 if (authp && authp->length) 1122 s2n(authp->length,p); 1123 memcpy(p, authp->data, authp->length); 1124 p+= authp->length [all...] |
s3_clnt.c | 2392 krb5_data authenticator, *authp = NULL; local [all...] |