Searched refs:auth (Results 76 - 100 of 249) sorted by relevance

12345678910

/freebsd-10-stable/usr.bin/csup/
H A DMakefile5 auth.c \
/freebsd-10-stable/usr.sbin/ppp/
H A Dprompt.h45 u_char auth; /* Local Authorized status */ member in struct:prompt
H A Dradius.h46 struct authinfo *auth; /* Tell this about success/failure */ member in struct:radius::__anon12239
/freebsd-10-stable/crypto/openssh/regress/
H A Dcipher-speed.sh28 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
H A Dintegrity.sh15 macs="$macs `${SSH} -Q cipher-auth`"
41 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
/freebsd-10-stable/sys/cddl/contrib/opensolaris/uts/common/os/
H A Dfm.c874 * auth nvlist_t <auth>
878 * Note that auth and hc-id are optional members.
885 fm_fmri_hc_set_common(nvlist_t *fmri, int version, const nvlist_t *auth) argument
898 if (auth != NULL && nvlist_add_nvlist(fmri, FM_FMRI_AUTHORITY,
899 (nvlist_t *)auth) != 0) {
908 fm_fmri_hc_set(nvlist_t *fmri, int version, const nvlist_t *auth, argument
916 if (!fm_fmri_hc_set_common(fmri, version, auth))
958 * auth nvlist_t <auth>
966 fm_fmri_dev_set(nvlist_t *fmri_dev, int version, const nvlist_t *auth, const char *devpath, const char *devid, const char *tpl0) argument
1012 fm_fmri_cpu_set(nvlist_t *fmri_cpu, int version, const nvlist_t *auth, uint32_t cpu_id, uint8_t *cpu_maskp, const char *serial_idp) argument
1063 fm_fmri_mem_set(nvlist_t *fmri, int version, const nvlist_t *auth, const char *unum, const char *serial, uint64_t offset) argument
1303 fm_fmri_hc_create(nvlist_t *fmri, int version, const nvlist_t *auth, nvlist_t *snvl, nvlist_t *bboard, int npairs, ...) argument
[all...]
/freebsd-10-stable/lib/libc/rpc/
H A Dauthdes_prot.c45 #include <rpc/auth.h>
/freebsd-10-stable/sys/geom/eli/
H A Dg_eli_integrity.c160 u_char *srcdata, *dstdata, *auth; local
181 auth = srcdata + encr_secsize * nsec;
189 if (bcmp(srcdata, auth, sc->sc_alen) != 0) {
220 auth += sc->sc_alen;
417 u_char *p, *data, *auth, *authkey, *plaindata; local
438 auth = NULL; /* Silence compiler warning. */
442 auth = data + encr_secsize * nsec;
443 p = auth + sc->sc_alen * nsec;
484 bcopy(data, auth, sc->sc_alen);
485 auth
[all...]
/freebsd-10-stable/usr.sbin/ctld/
H A Ddiscovery.c219 const struct auth *auth; local
256 auth = auth_find(ag, conn->conn_user);
257 if (auth == NULL) {
263 error = chap_authenticate(conn->conn_chap, auth->a_secret);
H A Dctld.h54 struct auth { struct
55 TAILQ_ENTRY(auth) a_next;
89 TAILQ_HEAD(, auth) ag_auths;
310 const struct auth *auth_new_chap(struct auth_group *ag,
312 const struct auth *auth_new_chap_mutual(struct auth_group *ag,
315 const struct auth *auth_find(const struct auth_group *ag,
/freebsd-10-stable/sys/netinet/
H A Dsctp_auth.c399 * shared key (if available). draft-ietf-tsvwg-auth specifies the specific
1539 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid)
1545 if ((stcb == NULL) || (auth == NULL))
1550 bzero(auth->hmac, SCTP_SIZE32(digestlen));
1579 auth->shared_key_id = htons(keyid);
1583 m, auth_offset, auth->hmac);
1626 sctp_handle_auth(struct sctp_tcb *stcb, struct sctp_auth_chunk *auth, argument
1637 /* auth is checked for NULL by caller */
1638 chunklen = ntohs(auth->ch.chunk_length);
1639 if (chunklen < sizeof(*auth)) {
1538 sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) argument
1754 struct sctp_authkey_event *auth; local
[all...]
/freebsd-10-stable/contrib/wpa/wpa_supplicant/
H A Dibss_rsn.c35 wpa_auth_sta_deinit(peer->auth);
309 if (peer->auth && cb(peer->auth, cb_ctx))
405 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr);
406 if (peer->auth == NULL) {
412 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth,
423 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC))
426 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth))
616 wpa_receive(ibss_rsn->auth_group, peer->auth, tmp, len);
/freebsd-10-stable/sys/rpc/
H A Dclnt_bck.c195 AUTH *auth; local
220 auth = ext->rc_auth;
223 auth = cl->cl_auth;
263 (!AUTH_MARSHALL(auth, xid, &xdrs,
312 AUTH_VALIDATE(auth, xid, NULL, NULL);
418 if (!AUTH_VALIDATE(auth, xid,
424 ("auth validated but no result"));
434 if (nrefreshes > 0 && AUTH_REFRESH(auth, &reply_msg)) {
463 if (auth && stat != RPC_SUCCESS)
464 AUTH_VALIDATE(auth, xi
[all...]
H A Dauthunix_prot.c53 #include <rpc/auth.h>
/freebsd-10-stable/contrib/wpa/src/radius/
H A Dradius.c348 u8 auth[MD5_MAC_LEN]; local
351 os_memset(auth, 0, MD5_MAC_LEN);
354 auth, MD5_MAC_LEN);
378 u8 auth[MD5_MAC_LEN]; local
383 os_memset(auth, 0, MD5_MAC_LEN);
385 auth, MD5_MAC_LEN);
422 u8 auth[MD5_MAC_LEN]; local
425 os_memset(auth, 0, MD5_MAC_LEN);
427 auth, MD5_MAC_LEN);
505 u8 auth[MD5_MAC_LE local
750 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local
797 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
[all...]
/freebsd-10-stable/sbin/mount_nfs/
H A Dmount_nfs.c97 long auth; member in struct:nfhret
841 nfhret.auth = secflavor;
882 secname = sec_num_to_name(nfhret.auth);
991 long auth, authcnt, authfnd = 0; local
1011 if (!xdr_long(xdrsp, &auth))
1013 if (np->auth == -1) {
1014 np->auth = auth;
1016 } else if (auth == np->auth) {
[all...]
/freebsd-10-stable/contrib/serf/auth/
H A Dauth_basic.c20 #include <auth/auth.h>
/freebsd-10-stable/etc/
H A Dnewsyslog.conf22 /var/log/auth.log 600 7 100 @0101T JC
/freebsd-10-stable/sys/net80211/
H A Dieee80211_crypto_ccmp.c300 uint8_t auth[AES_BLOCK_LEN], uint8_t s0[AES_BLOCK_LEN])
379 rijndael_encrypt(ctx, b0, auth);
380 xor_block(auth, aad, AES_BLOCK_LEN);
381 rijndael_encrypt(ctx, auth, auth);
382 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN);
383 rijndael_encrypt(ctx, auth, auth);
297 ccmp_init_blocks(rijndael_ctx *ctx, struct ieee80211_frame *wh, u_int64_t pn, size_t dlen, uint8_t b0[AES_BLOCK_LEN], uint8_t aad[2 * AES_BLOCK_LEN], uint8_t auth[AES_BLOCK_LEN], uint8_t s0[AES_BLOCK_LEN]) argument
/freebsd-10-stable/contrib/telnet/libtelnet/
H A Drsaencpwd.c85 #include "auth.h"
105 static KTEXT_ST auth; variable
210 memmove((void *)auth.dat, (void *)data, auth.length = cnt);
226 r = accept_rsa_encpwd(&auth, key, challenge,
/freebsd-10-stable/crypto/heimdal/appl/telnet/libtelnet/
H A Drsaencpwd.c86 #include "auth.h"
106 static KTEXT_ST auth; variable
210 memmove(auth.dat, data, auth.length = cnt);
226 r = accept_rsa_encpwd(&auth, key, challenge,
/freebsd-10-stable/crypto/heimdal/appl/telnet/telnet/
H A Dtelnet_locl.h161 #include <libtelnet/auth.h>
/freebsd-10-stable/crypto/openssl/engines/vendor_defns/
H A Dhw_ubsec.h44 unsigned char auth[MAX_MAC_KEY_LENGTH]; member in struct:ubsec_crypto_context_s
/freebsd-10-stable/contrib/wpa/src/eap_peer/
H A Dikev2.c556 u8 method, const u8 *auth, size_t auth_len)
570 u8 method, const u8 *auth,
602 os_memcmp(auth, auth_data, auth_len) != 0) {
605 auth, auth_len);
621 const u8 *auth, size_t auth_len)
625 if (auth == NULL) {
636 auth_method = auth[0];
637 auth += 4;
641 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
645 return ikev2_process_auth_cert(data, auth_method, auth,
555 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
569 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
620 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/freebsd-10-stable/contrib/wpa/src/eap_server/
H A Dikev2.c590 u8 method, const u8 *auth, size_t auth_len)
604 u8 method, const u8 *auth,
636 os_memcmp(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
657 if (auth == NULL) {
668 auth_method = auth[0];
669 auth += 4;
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
677 return ikev2_process_auth_cert(data, auth_method, auth,
589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]

Completed in 295 milliseconds

12345678910