Searched refs:auth (Results 76 - 100 of 306) sorted by relevance

1234567891011>>

/freebsd-11-stable/contrib/telnet/libtelnet/
H A Dkrb4encpwd.c83 #include "auth.h"
99 #define KRB4_ENCPWD_CHALLENGE 3 /* Challenge for mutual auth. */
104 static KTEXT_ST auth; variable
209 memmove((void *)auth.dat, (void *)data, auth.length = cnt);
214 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) {
H A Drsaencpwd.c81 #include "auth.h"
101 static KTEXT_ST auth; variable
206 memmove((void *)auth.dat, (void *)data, auth.length = cnt);
222 r = accept_rsa_encpwd(&auth, key, challenge,
/freebsd-11-stable/contrib/libpcap/
H A Dpcap-new.c74 int pcap_findalldevs_ex(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument
346 return pcap_findalldevs_ex_remote(source, auth, alldevs, errbuf);
354 pcap_t *pcap_open(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument
400 return pcap_open_rpcap(source, snaplen, flags, read_timeout, auth, errbuf);
H A Dpcap-rpcap.c1824 * \param auth: authentication parameters that have to be sent.
1834 static int rpcap_doauth(SOCKET sockctrl, uint8 *ver, struct pcap_rmtauth *auth, char *errbuf) argument
1847 if (auth)
1849 switch (auth->type)
1857 if (auth->username)
1859 str_length = strlen(auth->username);
1867 if (auth->password)
1869 str_length = strlen(auth->password);
1884 auth_type = (uint16)auth->type;
1911 if (auth
2051 rpcap_setup_session(const char *source, struct pcap_rmtauth *auth, int *activep, SOCKET *sockctrlp, uint8 *protocol_versionp, char *host, char *port, char *iface, char *errbuf) argument
2186 pcap_open_rpcap(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument
2343 pcap_findalldevs_ex_remote(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument
2629 pcap_remoteact_accept(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, char *errbuf) argument
[all...]
/freebsd-11-stable/sys/geom/eli/
H A Dg_eli_integrity.c159 u_char *srcdata, *dstdata, *auth; local
180 auth = srcdata + encr_secsize * nsec;
188 if (bcmp(srcdata, auth, sc->sc_alen) != 0) {
219 auth += sc->sc_alen;
411 u_char *p, *data, *auth, *authkey, *plaindata; local
433 auth = NULL; /* Silence compiler warning. */
437 auth = data + encr_secsize * nsec;
438 p = auth + sc->sc_alen * nsec;
479 bcopy(data, auth, sc->sc_alen);
480 auth
[all...]
/freebsd-11-stable/usr.sbin/ctld/
H A Ddiscovery.c221 const struct auth *auth; local
258 auth = auth_find(ag, conn->conn_user);
259 if (auth == NULL) {
265 error = chap_authenticate(conn->conn_chap, auth->a_secret);
H A Dctld.h57 struct auth { struct
58 TAILQ_ENTRY(auth) a_next;
92 TAILQ_HEAD(, auth) ag_auths;
318 const struct auth *auth_new_chap(struct auth_group *ag,
320 const struct auth *auth_new_chap_mutual(struct auth_group *ag,
323 const struct auth *auth_find(const struct auth_group *ag,
/freebsd-11-stable/sys/netinet/
H A Dsctp_auth.c399 * shared key (if available). draft-ietf-tsvwg-auth specifies the specific
1546 struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid)
1552 if ((stcb == NULL) || (auth == NULL))
1557 memset(auth->hmac, 0, SCTP_SIZE32(digestlen));
1587 auth->shared_key_id = htons(keyid);
1591 m, auth_offset, auth->hmac);
1634 sctp_handle_auth(struct sctp_tcb *stcb, struct sctp_auth_chunk *auth, argument
1645 /* auth is checked for NULL by caller */
1646 chunklen = ntohs(auth->ch.chunk_length);
1647 if (chunklen < sizeof(*auth)) {
1545 sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset, struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t keyid) argument
1762 struct sctp_authkey_event *auth; local
[all...]
/freebsd-11-stable/sys/rpc/
H A Dclnt_bck.c195 AUTH *auth; local
220 auth = ext->rc_auth;
223 auth = cl->cl_auth;
263 (!AUTH_MARSHALL(auth, xid, &xdrs,
312 AUTH_VALIDATE(auth, xid, NULL, NULL);
418 if (!AUTH_VALIDATE(auth, xid,
424 ("auth validated but no result"));
434 if (nrefreshes > 0 && AUTH_REFRESH(auth, &reply_msg)) {
463 if (auth && stat != RPC_SUCCESS)
464 AUTH_VALIDATE(auth, xi
[all...]
H A Dauthunix_prot.c53 #include <rpc/auth.h>
/freebsd-11-stable/sbin/mount_nfs/
H A Dmount_nfs.c97 long auth; member in struct:nfhret
842 nfhret.auth = secflavor;
883 secname = sec_num_to_name(nfhret.auth);
992 long auth, authcnt, authfnd = 0; local
1012 if (!xdr_long(xdrsp, &auth))
1014 if (np->auth == -1) {
1015 np->auth = auth;
1017 } else if (auth == np->auth) {
[all...]
/freebsd-11-stable/etc/
H A Dnewsyslog.conf22 /var/log/auth.log 600 7 100 @0101T JC
/freebsd-11-stable/sys/net80211/
H A Dieee80211_crypto_ccmp.c314 uint8_t auth[AES_BLOCK_LEN], uint8_t s0[AES_BLOCK_LEN])
393 rijndael_encrypt(ctx, b0, auth);
394 xor_block(auth, aad, AES_BLOCK_LEN);
395 rijndael_encrypt(ctx, auth, auth);
396 xor_block(auth, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN);
397 rijndael_encrypt(ctx, auth, auth);
311 ccmp_init_blocks(rijndael_ctx *ctx, struct ieee80211_frame *wh, u_int64_t pn, size_t dlen, uint8_t b0[AES_BLOCK_LEN], uint8_t aad[2 * AES_BLOCK_LEN], uint8_t auth[AES_BLOCK_LEN], uint8_t s0[AES_BLOCK_LEN]) argument
/freebsd-11-stable/crypto/openssh/regress/
H A Dintegrity.sh13 macs="$macs `${SSH} -Q cipher-auth`"
40 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Daes_wrap.h67 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth);
70 const u8 *aad, size_t aad_len, const u8 *auth,
/freebsd-11-stable/contrib/serf/auth/
H A Dauth_basic.c25 #include <auth/auth.h>
/freebsd-11-stable/crypto/heimdal/appl/telnet/libtelnet/
H A Drsaencpwd.c86 #include "auth.h"
106 static KTEXT_ST auth; variable
210 memmove(auth.dat, data, auth.length = cnt);
226 r = accept_rsa_encpwd(&auth, key, challenge,
/freebsd-11-stable/crypto/heimdal/appl/telnet/telnet/
H A Dtelnet_locl.h161 #include <libtelnet/auth.h>
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dwps_hostapd.h34 const char *auth, const char *encr, const char *key);
H A Dwpa_auth_ft.c58 * @auth: Pointer to authenticated TLVs
71 const u8 *auth, const size_t auth_len,
75 const u8 *ad[3] = { src_addr, auth, &type };
82 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len);
475 const u8 *auth, const size_t auth_len,
478 const u8 *ad[3] = { src_addr, auth, &type };
486 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len);
526 u8 *plain = NULL, *auth = NULL, *pos, *tmp; local
535 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0)
550 tmp = os_realloc(auth, auth_le
69 wpa_ft_rrb_decrypt(const u8 *key, const size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 **plain, size_t *plain_size) argument
473 wpa_ft_rrb_encrypt(const u8 *key, const size_t key_len, const u8 *plain, const size_t plain_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 *enc) argument
880 u8 *auth; member in struct:ft_remote_item
924 wpa_ft_rrb_seq_req(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *f_r0kh_id, size_t f_r0kh_id_len, const u8 *f_r1kh_id, const u8 *key, size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) argument
1022 wpa_ft_rrb_seq_chk(struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, int no_defer) argument
1092 wpa_ft_rrb_seq_accept(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *auth, size_t auth_len, const char *msgtype) argument
3577 wpa_ft_rrb_rx_pull(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument
3730 wpa_ft_rrb_rx_r1(struct wpa_authenticator *wpa_auth, const u8 *src_addr, u8 type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, u8 *s1kh_id_out, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) argument
3960 wpa_ft_rrb_rx_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument
4014 wpa_ft_rrb_rx_push(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument
4032 wpa_ft_rrb_rx_seq(struct wpa_authenticator *wpa_auth, const u8 *src_addr, int type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, struct ft_remote_seq **rkh_seq, u8 **key, size_t *key_len, struct ft_remote_r0kh **r0kh_out, struct ft_remote_r1kh **r1kh_out, struct ft_remote_r0kh **r0kh_wildcard_out, struct ft_remote_r1kh **r1kh_wildcard_out) argument
4150 wpa_ft_rrb_rx_seq_req(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument
4215 wpa_ft_rrb_rx_seq_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument
4438 const u8 *auth, *enc; local
[all...]
/freebsd-11-stable/crypto/openssl/engines/vendor_defns/
H A Dhw_ubsec.h44 unsigned char auth[MAX_MAC_KEY_LENGTH]; member in struct:ubsec_crypto_context_s
/freebsd-11-stable/usr.sbin/ppp/
H A DMakefile7 SRCS= acf.c arp.c async.c auth.c bundle.c cbcp.c ccp.c chap.c chat.c \
/freebsd-11-stable/contrib/dma/
H A DMakefile80 @if [ -e ${DESTDIR}${CONFDIR}/auth.conf ]; then \
81 echo "Not overwriting ${DESTDIR}${CONFDIR}/auth.conf."; \
83 echo ${INSTALL} -m 640 -o root -g mail auth.conf ${DESTDIR}${CONFDIR}; \
84 ${INSTALL} -m 640 -o root -g mail auth.conf ${DESTDIR}${CONFDIR}; \
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Dikev2.c521 u8 method, const u8 *auth, size_t auth_len)
535 u8 method, const u8 *auth,
567 os_memcmp_const(auth, auth_data, auth_len) != 0) {
570 auth, auth_len);
586 const u8 *auth, size_t auth_len)
590 if (auth == NULL) {
601 auth_method = auth[0];
602 auth += 4;
606 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
610 return ikev2_process_auth_cert(data, auth_method, auth,
520 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
534 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
585 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Dikev2.c589 u8 method, const u8 *auth, size_t auth_len)
603 u8 method, const u8 *auth,
635 os_memcmp_const(auth, auth_data, auth_len) != 0) {
638 auth, auth_len);
652 const u8 *auth, size_t auth_len)
656 if (auth == NULL) {
667 auth_method = auth[0];
668 auth += 4;
672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
676 return ikev2_process_auth_cert(data, auth_method, auth,
588 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
602 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
651 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]

Completed in 287 milliseconds

1234567891011>>