/freebsd-11-stable/contrib/telnet/libtelnet/ |
H A D | krb4encpwd.c | 83 #include "auth.h" 99 #define KRB4_ENCPWD_CHALLENGE 3 /* Challenge for mutual auth. */ 104 static KTEXT_ST auth; variable 209 memmove((void *)auth.dat, (void *)data, auth.length = cnt); 214 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) {
|
H A D | rsaencpwd.c | 81 #include "auth.h" 101 static KTEXT_ST auth; variable 206 memmove((void *)auth.dat, (void *)data, auth.length = cnt); 222 r = accept_rsa_encpwd(&auth, key, challenge,
|
/freebsd-11-stable/contrib/libpcap/ |
H A D | pcap-new.c | 74 int pcap_findalldevs_ex(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument 346 return pcap_findalldevs_ex_remote(source, auth, alldevs, errbuf); 354 pcap_t *pcap_open(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument 400 return pcap_open_rpcap(source, snaplen, flags, read_timeout, auth, errbuf);
|
H A D | pcap-rpcap.c | 1824 * \param auth: authentication parameters that have to be sent. 1834 static int rpcap_doauth(SOCKET sockctrl, uint8 *ver, struct pcap_rmtauth *auth, char *errbuf) argument 1847 if (auth) 1849 switch (auth->type) 1857 if (auth->username) 1859 str_length = strlen(auth->username); 1867 if (auth->password) 1869 str_length = strlen(auth->password); 1884 auth_type = (uint16)auth->type; 1911 if (auth 2051 rpcap_setup_session(const char *source, struct pcap_rmtauth *auth, int *activep, SOCKET *sockctrlp, uint8 *protocol_versionp, char *host, char *port, char *iface, char *errbuf) argument 2186 pcap_open_rpcap(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument 2343 pcap_findalldevs_ex_remote(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument 2629 pcap_remoteact_accept(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, char *errbuf) argument [all...] |
/freebsd-11-stable/sys/geom/eli/ |
H A D | g_eli_integrity.c | 159 u_char *srcdata, *dstdata, *auth; local 180 auth = srcdata + encr_secsize * nsec; 188 if (bcmp(srcdata, auth, sc->sc_alen) != 0) { 219 auth += sc->sc_alen; 411 u_char *p, *data, *auth, *authkey, *plaindata; local 433 auth = NULL; /* Silence compiler warning. */ 437 auth = data + encr_secsize * nsec; 438 p = auth + sc->sc_alen * nsec; 479 bcopy(data, auth, sc->sc_alen); 480 auth [all...] |
/freebsd-11-stable/usr.sbin/ctld/ |
H A D | discovery.c | 221 const struct auth *auth; local 258 auth = auth_find(ag, conn->conn_user); 259 if (auth == NULL) { 265 error = chap_authenticate(conn->conn_chap, auth->a_secret);
|
H A D | ctld.h | 57 struct auth { struct 58 TAILQ_ENTRY(auth) a_next; 92 TAILQ_HEAD(, auth) ag_auths; 318 const struct auth *auth_new_chap(struct auth_group *ag, 320 const struct auth *auth_new_chap_mutual(struct auth_group *ag, 323 const struct auth *auth_find(const struct auth_group *ag,
|
/freebsd-11-stable/sys/netinet/ |
H A D | sctp_auth.c | 399 * shared key (if available). draft-ietf-tsvwg-auth specifies the specific 1546 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) 1552 if ((stcb == NULL) || (auth == NULL)) 1557 memset(auth->hmac, 0, SCTP_SIZE32(digestlen)); 1587 auth->shared_key_id = htons(keyid); 1591 m, auth_offset, auth->hmac); 1634 sctp_handle_auth(struct sctp_tcb *stcb, struct sctp_auth_chunk *auth, argument 1645 /* auth is checked for NULL by caller */ 1646 chunklen = ntohs(auth->ch.chunk_length); 1647 if (chunklen < sizeof(*auth)) { 1545 sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) argument 1762 struct sctp_authkey_event *auth; local [all...] |
/freebsd-11-stable/sys/rpc/ |
H A D | clnt_bck.c | 195 AUTH *auth; local 220 auth = ext->rc_auth; 223 auth = cl->cl_auth; 263 (!AUTH_MARSHALL(auth, xid, &xdrs, 312 AUTH_VALIDATE(auth, xid, NULL, NULL); 418 if (!AUTH_VALIDATE(auth, xid, 424 ("auth validated but no result")); 434 if (nrefreshes > 0 && AUTH_REFRESH(auth, &reply_msg)) { 463 if (auth && stat != RPC_SUCCESS) 464 AUTH_VALIDATE(auth, xi [all...] |
H A D | authunix_prot.c | 53 #include <rpc/auth.h>
|
/freebsd-11-stable/sbin/mount_nfs/ |
H A D | mount_nfs.c | 97 long auth; member in struct:nfhret 842 nfhret.auth = secflavor; 883 secname = sec_num_to_name(nfhret.auth); 992 long auth, authcnt, authfnd = 0; local 1012 if (!xdr_long(xdrsp, &auth)) 1014 if (np->auth == -1) { 1015 np->auth = auth; 1017 } else if (auth == np->auth) { [all...] |
/freebsd-11-stable/etc/ |
H A D | newsyslog.conf | 22 /var/log/auth.log 600 7 100 @0101T JC
|
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_crypto_ccmp.c | 314 uint8_t auth[AES_BLOCK_LEN], uint8_t s0[AES_BLOCK_LEN]) 393 rijndael_encrypt(ctx, b0, auth); 394 xor_block(auth, aad, AES_BLOCK_LEN); 395 rijndael_encrypt(ctx, auth, auth); 396 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); 397 rijndael_encrypt(ctx, auth, auth); 311 ccmp_init_blocks(rijndael_ctx *ctx, struct ieee80211_frame *wh, u_int64_t pn, size_t dlen, uint8_t b0[AES_BLOCK_LEN], uint8_t aad[2 * AES_BLOCK_LEN], uint8_t auth[AES_BLOCK_LEN], uint8_t s0[AES_BLOCK_LEN]) argument
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | integrity.sh | 13 macs="$macs `${SSH} -Q cipher-auth`" 40 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes_wrap.h | 67 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 70 const u8 *aad, size_t aad_len, const u8 *auth,
|
/freebsd-11-stable/contrib/serf/auth/ |
H A D | auth_basic.c | 25 #include <auth/auth.h>
|
/freebsd-11-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 86 #include "auth.h" 106 static KTEXT_ST auth; variable 210 memmove(auth.dat, data, auth.length = cnt); 226 r = accept_rsa_encpwd(&auth, key, challenge,
|
/freebsd-11-stable/crypto/heimdal/appl/telnet/telnet/ |
H A D | telnet_locl.h | 161 #include <libtelnet/auth.h>
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | wps_hostapd.h | 34 const char *auth, const char *encr, const char *key);
|
H A D | wpa_auth_ft.c | 58 * @auth: Pointer to authenticated TLVs 71 const u8 *auth, const size_t auth_len, 75 const u8 *ad[3] = { src_addr, auth, &type }; 82 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); 475 const u8 *auth, const size_t auth_len, 478 const u8 *ad[3] = { src_addr, auth, &type }; 486 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); 526 u8 *plain = NULL, *auth = NULL, *pos, *tmp; local 535 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0) 550 tmp = os_realloc(auth, auth_le 69 wpa_ft_rrb_decrypt(const u8 *key, const size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 **plain, size_t *plain_size) argument 473 wpa_ft_rrb_encrypt(const u8 *key, const size_t key_len, const u8 *plain, const size_t plain_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 *enc) argument 880 u8 *auth; member in struct:ft_remote_item 924 wpa_ft_rrb_seq_req(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *f_r0kh_id, size_t f_r0kh_id_len, const u8 *f_r1kh_id, const u8 *key, size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) argument 1022 wpa_ft_rrb_seq_chk(struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, int no_defer) argument 1092 wpa_ft_rrb_seq_accept(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *auth, size_t auth_len, const char *msgtype) argument 3577 wpa_ft_rrb_rx_pull(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument 3730 wpa_ft_rrb_rx_r1(struct wpa_authenticator *wpa_auth, const u8 *src_addr, u8 type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, u8 *s1kh_id_out, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) argument 3960 wpa_ft_rrb_rx_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument 4014 wpa_ft_rrb_rx_push(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument 4032 wpa_ft_rrb_rx_seq(struct wpa_authenticator *wpa_auth, const u8 *src_addr, int type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, struct ft_remote_seq **rkh_seq, u8 **key, size_t *key_len, struct ft_remote_r0kh **r0kh_out, struct ft_remote_r1kh **r1kh_out, struct ft_remote_r0kh **r0kh_wildcard_out, struct ft_remote_r1kh **r1kh_wildcard_out) argument 4150 wpa_ft_rrb_rx_seq_req(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument 4215 wpa_ft_rrb_rx_seq_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument 4438 const u8 *auth, *enc; local [all...] |
/freebsd-11-stable/crypto/openssl/engines/vendor_defns/ |
H A D | hw_ubsec.h | 44 unsigned char auth[MAX_MAC_KEY_LENGTH]; member in struct:ubsec_crypto_context_s
|
/freebsd-11-stable/usr.sbin/ppp/ |
H A D | Makefile | 7 SRCS= acf.c arp.c async.c auth.c bundle.c cbcp.c ccp.c chap.c chat.c \
|
/freebsd-11-stable/contrib/dma/ |
H A D | Makefile | 80 @if [ -e ${DESTDIR}${CONFDIR}/auth.conf ]; then \ 81 echo "Not overwriting ${DESTDIR}${CONFDIR}/auth.conf."; \ 83 echo ${INSTALL} -m 640 -o root -g mail auth.conf ${DESTDIR}${CONFDIR}; \ 84 ${INSTALL} -m 640 -o root -g mail auth.conf ${DESTDIR}${CONFDIR}; \
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 521 u8 method, const u8 *auth, size_t auth_len) 535 u8 method, const u8 *auth, 567 os_memcmp_const(auth, auth_data, auth_len) != 0) { 570 auth, auth_len); 586 const u8 *auth, size_t auth_len) 590 if (auth == NULL) { 601 auth_method = auth[0]; 602 auth += 4; 606 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 610 return ikev2_process_auth_cert(data, auth_method, auth, 520 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 534 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 585 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 589 u8 method, const u8 *auth, size_t auth_len) 603 u8 method, const u8 *auth, 635 os_memcmp_const(auth, auth_data, auth_len) != 0) { 638 auth, auth_len); 652 const u8 *auth, size_t auth_len) 656 if (auth == NULL) { 667 auth_method = auth[0]; 668 auth += 4; 672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 676 return ikev2_process_auth_cert(data, auth_method, auth, 588 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 602 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 651 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |