Searched refs:auth (Results 101 - 125 of 307) sorted by relevance

1234567891011>>

/freebsd-current/crypto/heimdal/appl/telnet/telnet/
H A Dtelnet_locl.h161 #include <libtelnet/auth.h>
/freebsd-current/usr.sbin/ppp/
H A DMakefile7 SRCS= acf.c arp.c async.c auth.c bundle.c cbcp.c ccp.c chap.c chat.c \
H A Dprompt.c53 #include "auth.h"
99 if (p->auth == LOCAL_AUTH)
336 p->auth = LOCAL_AUTH;
345 p->auth = *s->cfg.passwd ? LOCAL_NO_AUTH : LOCAL_AUTH;
534 arg->prompt->auth = LOCAL_AUTH;
536 arg->prompt->auth = LOCAL_NO_AUTH;
/freebsd-current/sys/rpc/
H A Dauthunix_prot.c49 #include <rpc/auth.h>
/freebsd-current/contrib/telnet/libtelnet/
H A Drsaencpwd.c77 #include "auth.h"
97 static KTEXT_ST auth; variable
202 memmove((void *)auth.dat, (void *)data, auth.length = cnt);
218 r = accept_rsa_encpwd(&auth, key, challenge,
H A Dkerberos5.c65 #include "auth.h"
83 #define KRB_RESPONSE 3 /* Response for mutual auth. */
89 static krb5_data auth; variable
259 &cksum_data, ccache, &auth);
276 if (!Data(ap, KRB_AUTH, auth.data, auth.length)) {
313 auth.data = (char *)data;
314 auth.length = cnt;
355 &auth,
/freebsd-current/contrib/wpa/src/eap_server/
H A Dikev2.c589 u8 method, const u8 *auth, size_t auth_len)
603 u8 method, const u8 *auth,
635 os_memcmp_const(auth, auth_data, auth_len) != 0) {
638 auth, auth_len);
652 const u8 *auth, size_t auth_len)
656 if (auth == NULL) {
667 auth_method = auth[0];
668 auth += 4;
672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
676 return ikev2_process_auth_cert(data, auth_method, auth,
588 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
602 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
651 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/freebsd-current/contrib/wpa/src/eap_peer/
H A Dikev2.c523 u8 method, const u8 *auth, size_t auth_len)
537 u8 method, const u8 *auth,
569 os_memcmp_const(auth, auth_data, auth_len) != 0) {
572 auth, auth_len);
588 const u8 *auth, size_t auth_len)
592 if (auth == NULL) {
603 auth_method = auth[0];
604 auth += 4;
608 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
612 return ikev2_process_auth_cert(data, auth_method, auth,
522 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
536 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
587 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
H A Deap_sake.c23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon114
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/freebsd-current/contrib/dma/
H A DMakefile80 @if [ -e ${DESTDIR}${CONFDIR}/auth.conf ]; then \
81 echo "Not overwriting ${DESTDIR}${CONFDIR}/auth.conf."; \
83 echo ${INSTALL} -m 640 -o root -g mail auth.conf ${DESTDIR}${CONFDIR}; \
84 ${INSTALL} -m 640 -o root -g mail auth.conf ${DESTDIR}${CONFDIR}; \
/freebsd-current/contrib/wpa/wpa_supplicant/
H A Dsme.c1048 u.auth.variable));
1055 resp->u.auth.auth_alg = host_to_le16(WLAN_AUTH_SAE);
1057 resp->u.auth.auth_transaction = host_to_le16(auth_transaction);
1058 resp->u.auth.status_code = host_to_le16(status_code);
1496 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth);
1505 if (le_to_host16(header->u.auth.auth_alg) == WLAN_AUTH_SAE) {
1509 wpa_s, le_to_host16(header->u.auth.auth_transaction),
1510 le_to_host16(header->u.auth.status_code),
1511 header->u.auth.variable,
1546 if (os_memcmp(wpa_s->pending_bssid, data->auth
[all...]
H A Dpasn_supplicant.c52 wpa_printf(MSG_DEBUG, "PASN: Auth work timeout - stopping auth");
60 wpa_printf(MSG_DEBUG, "PASN: Cancel pasn-start-auth work");
63 radio_remove_works(wpa_s, "pasn-start-auth", 0);
301 "PASN: FILS: ERP EAP-Initiate/Re-auth unavailable");
427 "PASN: FILS auth without PFS not supported");
1103 wpa_printf(MSG_DEBUG, "PASN: Failed building 1st auth frame");
1112 wpa_printf(MSG_DEBUG, "PASN: Failed sending 1st auth frame");
1252 if (radio_work_pending(wpa_s, "pasn-start-auth")) {
1287 if (radio_add_work(wpa_s, bss->freq, "pasn-start-auth", 1,
1351 len < offsetof(struct ieee80211_mgmt, u.auth
[all...]
/freebsd-current/contrib/wpa/src/ap/
H A Dwpa_auth_ft.c59 * @auth: Pointer to authenticated TLVs
72 const u8 *auth, const size_t auth_len,
76 const u8 *ad[3] = { src_addr, auth, &type };
83 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len);
476 const u8 *auth, const size_t auth_len,
479 const u8 *ad[3] = { src_addr, auth, &type };
487 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len);
527 u8 *plain = NULL, *auth = NULL, *pos, *tmp; local
536 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0)
551 tmp = os_realloc(auth, auth_le
70 wpa_ft_rrb_decrypt(const u8 *key, const size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 **plain, size_t *plain_size) argument
474 wpa_ft_rrb_encrypt(const u8 *key, const size_t key_len, const u8 *plain, const size_t plain_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 *enc) argument
881 u8 *auth; member in struct:ft_remote_item
925 wpa_ft_rrb_seq_req(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *f_r0kh_id, size_t f_r0kh_id_len, const u8 *f_r1kh_id, const u8 *key, size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) argument
1024 wpa_ft_rrb_seq_chk(struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, int no_defer) argument
1094 wpa_ft_rrb_seq_accept(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *auth, size_t auth_len, const char *msgtype) argument
3801 wpa_ft_rrb_rx_pull(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument
3958 wpa_ft_rrb_rx_r1(struct wpa_authenticator *wpa_auth, const u8 *src_addr, u8 type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, u8 *s1kh_id_out, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) argument
4188 wpa_ft_rrb_rx_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument
4242 wpa_ft_rrb_rx_push(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument
4260 wpa_ft_rrb_rx_seq(struct wpa_authenticator *wpa_auth, const u8 *src_addr, int type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, struct ft_remote_seq **rkh_seq, u8 **key, size_t *key_len, struct ft_remote_r0kh **r0kh_out, struct ft_remote_r1kh **r1kh_out, struct ft_remote_r0kh **r0kh_wildcard_out, struct ft_remote_r1kh **r1kh_wildcard_out) argument
4378 wpa_ft_rrb_rx_seq_req(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument
4447 wpa_ft_rrb_rx_seq_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument
4664 const u8 *auth, *enc; local
[all...]
/freebsd-current/sys/fs/nfs/
H A Dnfs_commonkrpc.c134 uid_t ca_uid; /* uid that corresponds to this auth */
135 AUTH *ca_auth; /* RPC auth handle */
585 AUTH *auth; local
605 auth = rpc_gss_secfind_call(nrp->nr_client, cred,
610 auth = rpc_gss_seccreate_call(nrp->nr_client, cred,
613 return (auth);
615 if (auth != NULL)
616 return (auth);
681 AUTH *auth; local
835 auth
[all...]
/freebsd-current/contrib/ntp/ntpd/
H A Dntp_config.c410 if (ptree->auth.keys) {
411 free(ptree->auth.keys);
412 ptree->auth.keys = NULL;
415 if (ptree->auth.keysdir) {
416 free(ptree->auth.keysdir);
417 ptree->auth.keysdir = NULL;
420 if (ptree->auth.ntp_signd_socket) {
421 free(ptree->auth.ntp_signd_socket);
422 ptree->auth.ntp_signd_socket = NULL;
677 atrv = HEAD_PFIFO(ptree->auth
[all...]
/freebsd-current/crypto/heimdal/lib/krb5/
H A Dstore.c1219 * Write a auth data block to storage.
1222 * @param auth the auth data block to write.
1230 krb5_store_authdata(krb5_storage *sp, krb5_authdata auth) argument
1234 ret = krb5_store_int32(sp, auth.len);
1236 for(i = 0; i < auth.len; i++){
1237 ret = krb5_store_int16(sp, auth.val[i].ad_type);
1239 ret = krb5_store_data(sp, auth.val[i].ad_data);
1246 * Read a auth data from the storage.
1249 * @param auth th
1257 krb5_ret_authdata(krb5_storage *sp, krb5_authdata *auth) argument
[all...]
/freebsd-current/sys/netpfil/ipfilter/netinet/
H A Dip_auth.c157 /* Create a structre to store all of the run-time data for packet auth in */
175 MUTEX_INIT(&softa->ipf_auth_mx, "ipf auth log mutex");
177 cv_init(&softa->ipf_auth_wait, "ipf auth condvar", CV_DRIVER, NULL);
187 /* arg(I) - opaque pointer to auth context data */
189 /* Allocate memory and initialise data structures used in handling auth */
220 /* arg(I) - opaque pointer to auth context data */
280 /* arg(I) - opaque pointer to auth context data */
303 /* tmp(I) - value to assign to auth lock */
348 * auth'd.
380 "ipf auth rul
964 frauth_t auth, *au = &auth; local
1077 frauth_t auth, *au = &auth, *fra; local
[all...]
/freebsd-current/crypto/heimdal/appl/telnet/libtelnet/
H A Dkerberos5.c78 #include "auth.h"
105 #define KRB_RESPONSE 3 /* Response for mutual auth. */
111 static krb5_data auth; variable
286 &cksum_data, ccache, &auth);
304 if (!Data(ap, KRB_AUTH, auth.data, auth.length)) {
356 auth.data = (char *)data;
357 auth.length = cnt;
398 &auth,
/freebsd-current/crypto/openssh/
H A Dxmss_fast.c72 void xmss_set_bds_state(bds_state *state, unsigned char *stack, int stackoffset, unsigned char *stacklevels, unsigned char *auth, unsigned char *keep, treehash_inst *treehash, unsigned char *retain, int next_leaf) argument
77 state->auth = auth;
225 memcpy(state->auth + nodeh*n, stack+(stackoffset-1)*n, n);
420 memcpy(state->auth + nodeh*n, state->stack+(state->stackoffset-1)*n, n);
442 * Returns the auth path for node leaf_idx and computes the auth path for the
478 memcpy(buf, state->auth + (tau-1) * n, n);
483 memcpy(state->keep + (tau >> 1)*n, state->auth + tau*n, n);
488 gen_leaf_wots(state->auth, sk_see
[all...]
/freebsd-current/contrib/wpa/src/radius/
H A Dradius.c371 u8 auth[MD5_MAC_LEN]; local
374 os_memset(auth, 0, MD5_MAC_LEN);
377 auth, MD5_MAC_LEN);
401 u8 auth[MD5_MAC_LEN]; local
406 os_memset(auth, 0, MD5_MAC_LEN);
408 auth, MD5_MAC_LEN);
445 u8 auth[MD5_MAC_LEN]; local
448 os_memset(auth, 0, MD5_MAC_LEN);
450 auth, MD5_MAC_LEN);
550 u8 auth[MD5_MAC_LE local
802 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local
849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
[all...]
/freebsd-current/contrib/libpcap/
H A Dpcap-rpcap.c1960 * \param auth: authentication parameters that have to be sent.
1971 int *byte_swapped, struct pcap_rmtauth *auth, char *errbuf)
1986 if (auth)
1988 switch (auth->type)
1996 if (auth->username)
1998 str_length = strlen(auth->username);
2006 if (auth->password)
2008 str_length = strlen(auth->password);
2023 auth_type = (uint16)auth->type;
2050 if (auth
1970 rpcap_doauth(SOCKET sockctrl, SSL *ssl, uint8 *ver, int *byte_swapped, struct pcap_rmtauth *auth, char *errbuf) argument
2260 rpcap_setup_session(const char *source, struct pcap_rmtauth *auth, int *activep, SOCKET *sockctrlp, uint8 *uses_sslp, SSL **sslp, int rmt_flags, uint8 *protocol_versionp, int *byte_swappedp, char *host, char *port, char *iface, char *errbuf) argument
2438 pcap_open_rpcap(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument
2612 pcap_findalldevs_ex_remote(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument
2920 pcap_remoteact_accept_ex(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, int uses_ssl, char *errbuf) argument
3113 pcap_remoteact_accept(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, char *errbuf) argument
[all...]
/freebsd-current/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/nfs/
H A Dtst.call3.c347 AUTH *auth; local
370 auth = authsys_create_default();
371 mountclient->cl_auth = auth;
394 client->cl_auth = auth;
/freebsd-current/contrib/wpa/src/eap_common/
H A Deap_eke_common.h112 const struct wpabuf *msgs, u8 *auth);
/freebsd-current/crypto/heimdal/appl/login/
H A Dlogin.c136 static enum { NONE = 0, AUTH_KRB5 = 2, AUTH_OTP = 3 } auth; variable in typeref:enum:__anon6644
469 if (auth == AUTH_KRB5) {
533 auth = AUTH_KRB5;
539 auth = AUTH_OTP;
/freebsd-current/crypto/heimdal/appl/telnet/telnetd/
H A Dtelnetd.h193 #include <libtelnet/auth.h>

Completed in 156 milliseconds

1234567891011>>