/freebsd-current/crypto/heimdal/appl/telnet/telnet/ |
H A D | telnet_locl.h | 161 #include <libtelnet/auth.h>
|
/freebsd-current/usr.sbin/ppp/ |
H A D | Makefile | 7 SRCS= acf.c arp.c async.c auth.c bundle.c cbcp.c ccp.c chap.c chat.c \
|
H A D | prompt.c | 53 #include "auth.h" 99 if (p->auth == LOCAL_AUTH) 336 p->auth = LOCAL_AUTH; 345 p->auth = *s->cfg.passwd ? LOCAL_NO_AUTH : LOCAL_AUTH; 534 arg->prompt->auth = LOCAL_AUTH; 536 arg->prompt->auth = LOCAL_NO_AUTH;
|
/freebsd-current/sys/rpc/ |
H A D | authunix_prot.c | 49 #include <rpc/auth.h>
|
/freebsd-current/contrib/telnet/libtelnet/ |
H A D | rsaencpwd.c | 77 #include "auth.h" 97 static KTEXT_ST auth; variable 202 memmove((void *)auth.dat, (void *)data, auth.length = cnt); 218 r = accept_rsa_encpwd(&auth, key, challenge,
|
H A D | kerberos5.c | 65 #include "auth.h" 83 #define KRB_RESPONSE 3 /* Response for mutual auth. */ 89 static krb5_data auth; variable 259 &cksum_data, ccache, &auth); 276 if (!Data(ap, KRB_AUTH, auth.data, auth.length)) { 313 auth.data = (char *)data; 314 auth.length = cnt; 355 &auth,
|
/freebsd-current/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 589 u8 method, const u8 *auth, size_t auth_len) 603 u8 method, const u8 *auth, 635 os_memcmp_const(auth, auth_data, auth_len) != 0) { 638 auth, auth_len); 652 const u8 *auth, size_t auth_len) 656 if (auth == NULL) { 667 auth_method = auth[0]; 668 auth += 4; 672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 676 return ikev2_process_auth_cert(data, auth_method, auth, 588 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 602 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 651 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/freebsd-current/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 523 u8 method, const u8 *auth, size_t auth_len) 537 u8 method, const u8 *auth, 569 os_memcmp_const(auth, auth_data, auth_len) != 0) { 572 auth, auth_len); 588 const u8 *auth, size_t auth_len) 592 if (auth == NULL) { 603 auth_method = auth[0]; 604 auth += 4; 608 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 612 return ikev2_process_auth_cert(data, auth_method, auth, 522 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 536 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 587 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
H A D | eap_sake.c | 23 u8 auth[EAP_SAKE_TEK_AUTH_LEN]; member in struct:eap_sake_data::__anon114 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/freebsd-current/contrib/dma/ |
H A D | Makefile | 80 @if [ -e ${DESTDIR}${CONFDIR}/auth.conf ]; then \ 81 echo "Not overwriting ${DESTDIR}${CONFDIR}/auth.conf."; \ 83 echo ${INSTALL} -m 640 -o root -g mail auth.conf ${DESTDIR}${CONFDIR}; \ 84 ${INSTALL} -m 640 -o root -g mail auth.conf ${DESTDIR}${CONFDIR}; \
|
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | sme.c | 1048 u.auth.variable)); 1055 resp->u.auth.auth_alg = host_to_le16(WLAN_AUTH_SAE); 1057 resp->u.auth.auth_transaction = host_to_le16(auth_transaction); 1058 resp->u.auth.status_code = host_to_le16(status_code); 1496 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth); 1505 if (le_to_host16(header->u.auth.auth_alg) == WLAN_AUTH_SAE) { 1509 wpa_s, le_to_host16(header->u.auth.auth_transaction), 1510 le_to_host16(header->u.auth.status_code), 1511 header->u.auth.variable, 1546 if (os_memcmp(wpa_s->pending_bssid, data->auth [all...] |
H A D | pasn_supplicant.c | 52 wpa_printf(MSG_DEBUG, "PASN: Auth work timeout - stopping auth"); 60 wpa_printf(MSG_DEBUG, "PASN: Cancel pasn-start-auth work"); 63 radio_remove_works(wpa_s, "pasn-start-auth", 0); 301 "PASN: FILS: ERP EAP-Initiate/Re-auth unavailable"); 427 "PASN: FILS auth without PFS not supported"); 1103 wpa_printf(MSG_DEBUG, "PASN: Failed building 1st auth frame"); 1112 wpa_printf(MSG_DEBUG, "PASN: Failed sending 1st auth frame"); 1252 if (radio_work_pending(wpa_s, "pasn-start-auth")) { 1287 if (radio_add_work(wpa_s, bss->freq, "pasn-start-auth", 1, 1351 len < offsetof(struct ieee80211_mgmt, u.auth [all...] |
/freebsd-current/contrib/wpa/src/ap/ |
H A D | wpa_auth_ft.c | 59 * @auth: Pointer to authenticated TLVs 72 const u8 *auth, const size_t auth_len, 76 const u8 *ad[3] = { src_addr, auth, &type }; 83 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); 476 const u8 *auth, const size_t auth_len, 479 const u8 *ad[3] = { src_addr, auth, &type }; 487 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); 527 u8 *plain = NULL, *auth = NULL, *pos, *tmp; local 536 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0) 551 tmp = os_realloc(auth, auth_le 70 wpa_ft_rrb_decrypt(const u8 *key, const size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 **plain, size_t *plain_size) argument 474 wpa_ft_rrb_encrypt(const u8 *key, const size_t key_len, const u8 *plain, const size_t plain_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 *enc) argument 881 u8 *auth; member in struct:ft_remote_item 925 wpa_ft_rrb_seq_req(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *f_r0kh_id, size_t f_r0kh_id_len, const u8 *f_r1kh_id, const u8 *key, size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) argument 1024 wpa_ft_rrb_seq_chk(struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, int no_defer) argument 1094 wpa_ft_rrb_seq_accept(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *auth, size_t auth_len, const char *msgtype) argument 3801 wpa_ft_rrb_rx_pull(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument 3958 wpa_ft_rrb_rx_r1(struct wpa_authenticator *wpa_auth, const u8 *src_addr, u8 type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, u8 *s1kh_id_out, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) argument 4188 wpa_ft_rrb_rx_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument 4242 wpa_ft_rrb_rx_push(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument 4260 wpa_ft_rrb_rx_seq(struct wpa_authenticator *wpa_auth, const u8 *src_addr, int type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, struct ft_remote_seq **rkh_seq, u8 **key, size_t *key_len, struct ft_remote_r0kh **r0kh_out, struct ft_remote_r1kh **r1kh_out, struct ft_remote_r0kh **r0kh_wildcard_out, struct ft_remote_r1kh **r1kh_wildcard_out) argument 4378 wpa_ft_rrb_rx_seq_req(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument 4447 wpa_ft_rrb_rx_seq_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) argument 4664 const u8 *auth, *enc; local [all...] |
/freebsd-current/sys/fs/nfs/ |
H A D | nfs_commonkrpc.c | 134 uid_t ca_uid; /* uid that corresponds to this auth */ 135 AUTH *ca_auth; /* RPC auth handle */ 585 AUTH *auth; local 605 auth = rpc_gss_secfind_call(nrp->nr_client, cred, 610 auth = rpc_gss_seccreate_call(nrp->nr_client, cred, 613 return (auth); 615 if (auth != NULL) 616 return (auth); 681 AUTH *auth; local 835 auth [all...] |
/freebsd-current/contrib/ntp/ntpd/ |
H A D | ntp_config.c | 410 if (ptree->auth.keys) { 411 free(ptree->auth.keys); 412 ptree->auth.keys = NULL; 415 if (ptree->auth.keysdir) { 416 free(ptree->auth.keysdir); 417 ptree->auth.keysdir = NULL; 420 if (ptree->auth.ntp_signd_socket) { 421 free(ptree->auth.ntp_signd_socket); 422 ptree->auth.ntp_signd_socket = NULL; 677 atrv = HEAD_PFIFO(ptree->auth [all...] |
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | store.c | 1219 * Write a auth data block to storage. 1222 * @param auth the auth data block to write. 1230 krb5_store_authdata(krb5_storage *sp, krb5_authdata auth) argument 1234 ret = krb5_store_int32(sp, auth.len); 1236 for(i = 0; i < auth.len; i++){ 1237 ret = krb5_store_int16(sp, auth.val[i].ad_type); 1239 ret = krb5_store_data(sp, auth.val[i].ad_data); 1246 * Read a auth data from the storage. 1249 * @param auth th 1257 krb5_ret_authdata(krb5_storage *sp, krb5_authdata *auth) argument [all...] |
/freebsd-current/sys/netpfil/ipfilter/netinet/ |
H A D | ip_auth.c | 157 /* Create a structre to store all of the run-time data for packet auth in */ 175 MUTEX_INIT(&softa->ipf_auth_mx, "ipf auth log mutex"); 177 cv_init(&softa->ipf_auth_wait, "ipf auth condvar", CV_DRIVER, NULL); 187 /* arg(I) - opaque pointer to auth context data */ 189 /* Allocate memory and initialise data structures used in handling auth */ 220 /* arg(I) - opaque pointer to auth context data */ 280 /* arg(I) - opaque pointer to auth context data */ 303 /* tmp(I) - value to assign to auth lock */ 348 * auth'd. 380 "ipf auth rul 964 frauth_t auth, *au = &auth; local 1077 frauth_t auth, *au = &auth, *fra; local [all...] |
/freebsd-current/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | kerberos5.c | 78 #include "auth.h" 105 #define KRB_RESPONSE 3 /* Response for mutual auth. */ 111 static krb5_data auth; variable 286 &cksum_data, ccache, &auth); 304 if (!Data(ap, KRB_AUTH, auth.data, auth.length)) { 356 auth.data = (char *)data; 357 auth.length = cnt; 398 &auth,
|
/freebsd-current/crypto/openssh/ |
H A D | xmss_fast.c | 72 void xmss_set_bds_state(bds_state *state, unsigned char *stack, int stackoffset, unsigned char *stacklevels, unsigned char *auth, unsigned char *keep, treehash_inst *treehash, unsigned char *retain, int next_leaf) argument 77 state->auth = auth; 225 memcpy(state->auth + nodeh*n, stack+(stackoffset-1)*n, n); 420 memcpy(state->auth + nodeh*n, state->stack+(state->stackoffset-1)*n, n); 442 * Returns the auth path for node leaf_idx and computes the auth path for the 478 memcpy(buf, state->auth + (tau-1) * n, n); 483 memcpy(state->keep + (tau >> 1)*n, state->auth + tau*n, n); 488 gen_leaf_wots(state->auth, sk_see [all...] |
/freebsd-current/contrib/wpa/src/radius/ |
H A D | radius.c | 371 u8 auth[MD5_MAC_LEN]; local 374 os_memset(auth, 0, MD5_MAC_LEN); 377 auth, MD5_MAC_LEN); 401 u8 auth[MD5_MAC_LEN]; local 406 os_memset(auth, 0, MD5_MAC_LEN); 408 auth, MD5_MAC_LEN); 445 u8 auth[MD5_MAC_LEN]; local 448 os_memset(auth, 0, MD5_MAC_LEN); 450 auth, MD5_MAC_LEN); 550 u8 auth[MD5_MAC_LE local 802 u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN]; local 849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument [all...] |
/freebsd-current/contrib/libpcap/ |
H A D | pcap-rpcap.c | 1960 * \param auth: authentication parameters that have to be sent. 1971 int *byte_swapped, struct pcap_rmtauth *auth, char *errbuf) 1986 if (auth) 1988 switch (auth->type) 1996 if (auth->username) 1998 str_length = strlen(auth->username); 2006 if (auth->password) 2008 str_length = strlen(auth->password); 2023 auth_type = (uint16)auth->type; 2050 if (auth 1970 rpcap_doauth(SOCKET sockctrl, SSL *ssl, uint8 *ver, int *byte_swapped, struct pcap_rmtauth *auth, char *errbuf) argument 2260 rpcap_setup_session(const char *source, struct pcap_rmtauth *auth, int *activep, SOCKET *sockctrlp, uint8 *uses_sslp, SSL **sslp, int rmt_flags, uint8 *protocol_versionp, int *byte_swappedp, char *host, char *port, char *iface, char *errbuf) argument 2438 pcap_open_rpcap(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument 2612 pcap_findalldevs_ex_remote(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument 2920 pcap_remoteact_accept_ex(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, int uses_ssl, char *errbuf) argument 3113 pcap_remoteact_accept(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, char *errbuf) argument [all...] |
/freebsd-current/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/nfs/ |
H A D | tst.call3.c | 347 AUTH *auth; local 370 auth = authsys_create_default(); 371 mountclient->cl_auth = auth; 394 client->cl_auth = auth;
|
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.h | 112 const struct wpabuf *msgs, u8 *auth);
|
/freebsd-current/crypto/heimdal/appl/login/ |
H A D | login.c | 136 static enum { NONE = 0, AUTH_KRB5 = 2, AUTH_OTP = 3 } auth; variable in typeref:enum:__anon6644 469 if (auth == AUTH_KRB5) { 533 auth = AUTH_KRB5; 539 auth = AUTH_OTP;
|
/freebsd-current/crypto/heimdal/appl/telnet/telnetd/ |
H A D | telnetd.h | 193 #include <libtelnet/auth.h>
|