/external/tcpdump/tests/ |
D | vrrp.out | 1 IP 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s, le… 2 IP 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 43, prio 191, authtype none, intvl 10s, leng… 4 IP 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s, le… 5 IP 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 43, prio 191, authtype none, intvl 10s, leng… 9 IP 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s, le… 10 IP 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 43, prio 191, authtype none, intvl 10s, leng… 14 IP 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 192, authtype simple, intvl 10s, le… 15 IP 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 43, prio 192, authtype none, intvl 10s, leng… 19 IP 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 192, authtype simple, intvl 10s, le… 20 IP 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 43, prio 192, authtype none, intvl 10s, leng… [all …]
|
D | vrrp-v.out | 2 … vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s… 4 … vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 43, prio 191, authtype none, intvl 10s, … 8 … vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s… 10 … vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 43, prio 191, authtype none, intvl 10s, … 16 … vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 191, authtype simple, intvl 10s… 18 … vrrp 10.0.0.91 > 224.0.0.18: VRRPv2, Advertisement, vrid 43, prio 191, authtype none, intvl 10s, … 24 … vrrp 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 192, authtype simple, intvl 10s… 26 … vrrp 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 43, prio 192, authtype none, intvl 10s, … 32 … vrrp 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 42, prio 192, authtype simple, intvl 10s… 34 … vrrp 10.0.0.92 > 224.0.0.18: VRRPv2, Advertisement, vrid 43, prio 192, authtype none, intvl 10s, … [all …]
|
/external/scapy/scapy/layers/ |
D | rip.py | 47 lambda pkt: pkt.authtype == 2), 49 lambda pkt: pkt.authtype == 3), 51 lambda pkt: pkt.authtype == 3), 53 lambda pkt: pkt.authtype == 3), 55 lambda pkt: pkt.authtype == 3), 57 lambda pkt: pkt.authtype == 3), 60 lambda pkt: pkt.authtype == 1)
|
/external/ipsec-tools/src/racoon/ |
D | proposal.c | 512 newtr->authtype = tr1->authtype; 594 if (tr1->authtype != tr2->authtype) { 598 s_ipsecdoi_attr_v(IPSECDOI_ATTR_AUTH, tr2->authtype), 599 s_ipsecdoi_attr_v(IPSECDOI_ATTR_AUTH, tr1->authtype)); 668 newtr->authtype = a->alg; 693 newtr->authtype = b->alg; 718 newtr->authtype = IPSECDOI_ATTR_AUTH_NONE; /*no auth*/ 979 s_ipsecdoi_attr_v(IPSECDOI_ATTR_AUTH, tr->authtype)); 986 s_ipsecdoi_attr_v(IPSECDOI_ATTR_AUTH, tr->authtype));
|
D | isakmp_xauth.h | 63 int authtype; member
|
D | proposal.h | 102 int authtype; /* authentication algorithm if ESP */ member
|
D | isakmp_xauth.c | 214 xst->authtype = XAUTH_TYPE_GENERIC; 1639 switch (xst->authtype) { 1653 "Unsupported authtype %d\n", xst->authtype); 1658 "Unexpected authtype %d\n", xst->authtype);
|
D | ipsec_doi.c | 3004 tr->authtype == IPSECDOI_ATTR_AUTH_NONE) 3035 if (tr->authtype != IPSECDOI_ATTR_AUTH_NONE) 3039 if (tr->authtype == IPSECDOI_ATTR_AUTH_NONE) { 3117 if ((pr->proto_id == IPSECDOI_PROTO_IPSEC_ESP && tr->authtype != IPSECDOI_ATTR_AUTH_NONE) 3119 x = isakmp_set_attr_l(x, IPSECDOI_ATTR_AUTH, tr->authtype); 4636 tr->authtype = IPSECDOI_ATTR_AUTH_NONE; 4778 if (tr->authtype != IPSECDOI_ATTR_AUTH_NONE) { 4784 tr->authtype = (u_int16_t)ntohs(d->lorv);
|
D | pfkey.c | 1088 pr->head->authtype, 1376 pr->head->authtype,
|
D | handler.c | 1199 if (alg->alg == approval->head->head->authtype) in revalidate_ph2()
|
D | oakley.c | 548 l = alg_ipsec_hmacdef_hashlen(tr->authtype);
|
/external/curl/src/ |
D | tool_getparam.c | 617 config->authtype |= CURLAUTH_BEARER; in getparameter() 692 config->authtype |= CURLAUTH_DIGEST; in getparameter() 694 config->authtype &= ~CURLAUTH_DIGEST; in getparameter() 700 config->authtype |= CURLAUTH_NEGOTIATE; in getparameter() 705 config->authtype &= ~CURLAUTH_NEGOTIATE; in getparameter() 711 config->authtype |= CURLAUTH_NTLM; in getparameter() 716 config->authtype &= ~CURLAUTH_NTLM; in getparameter() 722 config->authtype |= CURLAUTH_NTLM_WB; in getparameter() 727 config->authtype &= ~CURLAUTH_NTLM_WB; in getparameter() 732 config->authtype |= CURLAUTH_BASIC; in getparameter() [all …]
|
D | tool_cfgable.h | 53 unsigned long authtype; /* auth bitmask */ member
|
D | tool_operate.c | 717 if(config->authtype & (1UL << bitcheck++)) { in operate_do() 962 if(config->authtype) in operate_do() 963 my_setopt_bitmask(curl, CURLOPT_HTTPAUTH, (long)config->authtype); in operate_do()
|
/external/scapy/scapy/contrib/ |
D | ospf.py | 67 ConditionalField(XLongField("authdata", 0), lambda pkt:pkt.authtype != 2), 69 ConditionalField(XShortField("reserved", 0), lambda pkt:pkt.authtype == 2), 70 ConditionalField(ByteField("keyid", 1), lambda pkt:pkt.authtype == 2), 71 ConditionalField(ByteField("authdatalen", 0), lambda pkt:pkt.authtype == 2), 72 ConditionalField(XIntField("seq", 0), lambda pkt:pkt.authtype == 2), 87 if self.authtype == 2:
|
/external/curl/lib/ |
D | setopt.c | 2489 if(data->set.str[STRING_TLSAUTH_USERNAME_ORIG] && !data->set.ssl.authtype) in vsetopt() 2490 data->set.ssl.authtype = CURL_TLSAUTH_SRP; /* default to SRP */ in vsetopt() 2496 !data->set.proxy_ssl.authtype) in vsetopt() 2497 data->set.proxy_ssl.authtype = CURL_TLSAUTH_SRP; /* default to SRP */ in vsetopt() 2502 if(data->set.str[STRING_TLSAUTH_USERNAME_ORIG] && !data->set.ssl.authtype) in vsetopt() 2503 data->set.ssl.authtype = CURL_TLSAUTH_SRP; /* default to SRP */ in vsetopt() 2509 !data->set.proxy_ssl.authtype) in vsetopt() 2510 data->set.proxy_ssl.authtype = CURL_TLSAUTH_SRP; /* default to SRP */ in vsetopt() 2516 data->set.ssl.authtype = CURL_TLSAUTH_SRP; in vsetopt() 2518 data->set.ssl.authtype = CURL_TLSAUTH_NONE; in vsetopt() [all …]
|
D | urldata.h | 245 enum CURL_TLSAUTH authtype; /* TLS authentication type (default SRP) */ member
|
D | url.c | 473 set->ssl.authtype = CURL_TLSAUTH_NONE; in Curl_init_userdefined()
|
/external/openssh/ |
D | auth-sia.c | 99 ent->authtype = SIA_A_NONE; in session_setup_sia()
|
/external/tcpdump/ |
D | print-telnet.c | 359 static const char *authtype[] = { variable 460 ND_PRINT((ndo, " %s", STR_OR_ID(c, authtype))); in telnet_parse()
|
D | print-lwres.c | 60 lwres_uint16_t authtype; member 333 ND_PRINT((ndo, " authtype:0x%x", EXTRACT_16BITS(&np->authtype))); in lwres_print()
|
/external/curl/lib/vtls/ |
D | gtls.c | 583 if(SSL_SET_OPTION(authtype) == CURL_TLSAUTH_SRP) { in gtls_connect_step1() 877 if(SSL_SET_OPTION(authtype) == CURL_TLSAUTH_SRP) { in gtls_connect_step1() 1057 if(SSL_SET_OPTION(authtype) == CURL_TLSAUTH_SRP in gtls_connect_step3() 1690 if(SSL_SET_OPTION(authtype) == CURL_TLSAUTH_SRP in Curl_gtls_shutdown()
|
D | openssl.c | 2311 const enum CURL_TLSAUTH ssl_authtype = SSL_SET_OPTION(authtype); in ossl_connect_step1()
|
/external/scapy/test/ |
D | sslv2.uts | 141 assert(rc.authtype == 1)
|
D | regression.uts | 8076 s = raw(IP()/UDP(sport=520)/RIP()/RIPEntry()/RIPAuth(authtype=2, password="scapy"))
|