/freebsd-10-stable/usr.bin/csup/ |
H A D | Makefile | 5 auth.c \
|
/freebsd-10-stable/usr.sbin/ppp/ |
H A D | prompt.h | 45 u_char auth; /* Local Authorized status */ member in struct:prompt
|
H A D | radius.h | 46 struct authinfo *auth; /* Tell this about success/failure */ member in struct:radius::__anon12239
|
/freebsd-10-stable/crypto/openssh/regress/ |
H A D | cipher-speed.sh | 28 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
|
H A D | integrity.sh | 15 macs="$macs `${SSH} -Q cipher-auth`" 41 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
|
/freebsd-10-stable/sys/cddl/contrib/opensolaris/uts/common/os/ |
H A D | fm.c | 874 * auth nvlist_t <auth> 878 * Note that auth and hc-id are optional members. 885 fm_fmri_hc_set_common(nvlist_t *fmri, int version, const nvlist_t *auth) argument 898 if (auth != NULL && nvlist_add_nvlist(fmri, FM_FMRI_AUTHORITY, 899 (nvlist_t *)auth) != 0) { 908 fm_fmri_hc_set(nvlist_t *fmri, int version, const nvlist_t *auth, argument 916 if (!fm_fmri_hc_set_common(fmri, version, auth)) 958 * auth nvlist_t <auth> 966 fm_fmri_dev_set(nvlist_t *fmri_dev, int version, const nvlist_t *auth, const char *devpath, const char *devid, const char *tpl0) argument 1012 fm_fmri_cpu_set(nvlist_t *fmri_cpu, int version, const nvlist_t *auth, uint32_t cpu_id, uint8_t *cpu_maskp, const char *serial_idp) argument 1063 fm_fmri_mem_set(nvlist_t *fmri, int version, const nvlist_t *auth, const char *unum, const char *serial, uint64_t offset) argument 1303 fm_fmri_hc_create(nvlist_t *fmri, int version, const nvlist_t *auth, nvlist_t *snvl, nvlist_t *bboard, int npairs, ...) argument [all...] |
/freebsd-10-stable/lib/libc/rpc/ |
H A D | authdes_prot.c | 45 #include <rpc/auth.h>
|
/freebsd-10-stable/sys/geom/eli/ |
H A D | g_eli_integrity.c | 160 u_char *srcdata, *dstdata, *auth; local 181 auth = srcdata + encr_secsize * nsec; 189 if (bcmp(srcdata, auth, sc->sc_alen) != 0) { 220 auth += sc->sc_alen; 417 u_char *p, *data, *auth, *authkey, *plaindata; local 438 auth = NULL; /* Silence compiler warning. */ 442 auth = data + encr_secsize * nsec; 443 p = auth + sc->sc_alen * nsec; 484 bcopy(data, auth, sc->sc_alen); 485 auth [all...] |
/freebsd-10-stable/usr.sbin/ctld/ |
H A D | discovery.c | 219 const struct auth *auth; local 256 auth = auth_find(ag, conn->conn_user); 257 if (auth == NULL) { 263 error = chap_authenticate(conn->conn_chap, auth->a_secret);
|
H A D | ctld.h | 54 struct auth { struct 55 TAILQ_ENTRY(auth) a_next; 89 TAILQ_HEAD(, auth) ag_auths; 310 const struct auth *auth_new_chap(struct auth_group *ag, 312 const struct auth *auth_new_chap_mutual(struct auth_group *ag, 315 const struct auth *auth_find(const struct auth_group *ag,
|
/freebsd-10-stable/sys/netinet/ |
H A D | sctp_auth.c | 399 * shared key (if available). draft-ietf-tsvwg-auth specifies the specific 1539 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) 1545 if ((stcb == NULL) || (auth == NULL)) 1550 bzero(auth->hmac, SCTP_SIZE32(digestlen)); 1579 auth->shared_key_id = htons(keyid); 1583 m, auth_offset, auth->hmac); 1626 sctp_handle_auth(struct sctp_tcb *stcb, struct sctp_auth_chunk *auth, argument 1637 /* auth is checked for NULL by caller */ 1638 chunklen = ntohs(auth->ch.chunk_length); 1639 if (chunklen < sizeof(*auth)) { 1538 sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) argument 1754 struct sctp_authkey_event *auth; local [all...] |
/freebsd-10-stable/contrib/wpa/wpa_supplicant/ |
H A D | ibss_rsn.c | 35 wpa_auth_sta_deinit(peer->auth); 309 if (peer->auth && cb(peer->auth, cb_ctx)) 405 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr); 406 if (peer->auth == NULL) { 412 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 423 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) 426 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) 616 wpa_receive(ibss_rsn->auth_group, peer->auth, tmp, len);
|
/freebsd-10-stable/sys/rpc/ |
H A D | clnt_bck.c | 195 AUTH *auth; local 220 auth = ext->rc_auth; 223 auth = cl->cl_auth; 263 (!AUTH_MARSHALL(auth, xid, &xdrs, 312 AUTH_VALIDATE(auth, xid, NULL, NULL); 418 if (!AUTH_VALIDATE(auth, xid, 424 ("auth validated but no result")); 434 if (nrefreshes > 0 && AUTH_REFRESH(auth, &reply_msg)) { 463 if (auth && stat != RPC_SUCCESS) 464 AUTH_VALIDATE(auth, xi [all...] |
H A D | authunix_prot.c | 53 #include <rpc/auth.h>
|
/freebsd-10-stable/contrib/wpa/src/radius/ |
H A D | radius.c | 348 u8 auth[MD5_MAC_LEN]; local 351 os_memset(auth, 0, MD5_MAC_LEN); 354 auth, MD5_MAC_LEN); 378 u8 auth[MD5_MAC_LEN]; local 383 os_memset(auth, 0, MD5_MAC_LEN); 385 auth, MD5_MAC_LEN); 422 u8 auth[MD5_MAC_LEN]; local 425 os_memset(auth, 0, MD5_MAC_LEN); 427 auth, MD5_MAC_LEN); 505 u8 auth[MD5_MAC_LE local 750 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local 797 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument [all...] |
/freebsd-10-stable/sbin/mount_nfs/ |
H A D | mount_nfs.c | 97 long auth; member in struct:nfhret 841 nfhret.auth = secflavor; 882 secname = sec_num_to_name(nfhret.auth); 991 long auth, authcnt, authfnd = 0; local 1011 if (!xdr_long(xdrsp, &auth)) 1013 if (np->auth == -1) { 1014 np->auth = auth; 1016 } else if (auth == np->auth) { [all...] |
/freebsd-10-stable/contrib/serf/auth/ |
H A D | auth_basic.c | 20 #include <auth/auth.h>
|
/freebsd-10-stable/etc/ |
H A D | newsyslog.conf | 22 /var/log/auth.log 600 7 100 @0101T JC
|
/freebsd-10-stable/sys/net80211/ |
H A D | ieee80211_crypto_ccmp.c | 300 uint8_t auth[AES_BLOCK_LEN], uint8_t s0[AES_BLOCK_LEN]) 379 rijndael_encrypt(ctx, b0, auth); 380 xor_block(auth, aad, AES_BLOCK_LEN); 381 rijndael_encrypt(ctx, auth, auth); 382 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); 383 rijndael_encrypt(ctx, auth, auth); 297 ccmp_init_blocks(rijndael_ctx *ctx, struct ieee80211_frame *wh, u_int64_t pn, size_t dlen, uint8_t b0[AES_BLOCK_LEN], uint8_t aad[2 * AES_BLOCK_LEN], uint8_t auth[AES_BLOCK_LEN], uint8_t s0[AES_BLOCK_LEN]) argument
|
/freebsd-10-stable/contrib/telnet/libtelnet/ |
H A D | rsaencpwd.c | 85 #include "auth.h" 105 static KTEXT_ST auth; variable 210 memmove((void *)auth.dat, (void *)data, auth.length = cnt); 226 r = accept_rsa_encpwd(&auth, key, challenge,
|
/freebsd-10-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 86 #include "auth.h" 106 static KTEXT_ST auth; variable 210 memmove(auth.dat, data, auth.length = cnt); 226 r = accept_rsa_encpwd(&auth, key, challenge,
|
/freebsd-10-stable/crypto/heimdal/appl/telnet/telnet/ |
H A D | telnet_locl.h | 161 #include <libtelnet/auth.h>
|
/freebsd-10-stable/crypto/openssl/engines/vendor_defns/ |
H A D | hw_ubsec.h | 44 unsigned char auth[MAX_MAC_KEY_LENGTH]; member in struct:ubsec_crypto_context_s
|
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 556 u8 method, const u8 *auth, size_t auth_len) 570 u8 method, const u8 *auth, 602 os_memcmp(auth, auth_data, auth_len) != 0) { 605 auth, auth_len); 621 const u8 *auth, size_t auth_len) 625 if (auth == NULL) { 636 auth_method = auth[0]; 637 auth += 4; 641 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 645 return ikev2_process_auth_cert(data, auth_method, auth, 555 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 569 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 620 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/freebsd-10-stable/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 604 u8 method, const u8 *auth, 636 os_memcmp(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 657 if (auth == NULL) { 668 auth_method = auth[0]; 669 auth += 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 677 return ikev2_process_auth_cert(data, auth_method, auth, 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |