Searched refs:auth_data (Results 1 - 12 of 12) sorted by relevance

/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dbuild_auth.c38 krb5_authdata **auth_data)
82 ALLOC(*auth_data, 1);
83 if (*auth_data == NULL) {
89 ALLOC_SEQ(*auth_data, 1);
90 if ((*auth_data)->val == NULL) {
91 free(*auth_data);
97 (*auth_data)->val[0].ad_type = KRB5_AUTHDATA_IF_RELEVANT;
98 (*auth_data)->val[0].ad_data.length = len;
99 (*auth_data)->val[0].ad_data.data = buf;
37 make_etypelist(krb5_context context, krb5_authdata **auth_data) argument
/freebsd-10.0-release/crypto/openssh/
H A Dsession.h51 char *auth_data; member in struct:Session
H A Dsession.c355 s->auth_data = packet_get_string(&data_len);
373 free(s->auth_data);
375 s->auth_data = NULL;
1345 s->display != NULL && s->auth_proto != NULL && s->auth_data != NULL;
1358 s->auth_data);
1371 s->auth_data);
1385 s->auth_proto, s->auth_data);
1395 s->auth_data);
2158 if (s->auth_proto != NULL || s->auth_data != NULL) {
2165 s->auth_data
[all...]
/freebsd-10.0-release/crypto/heimdal/kdc/
H A Dkrb5tgs.c734 AuthorizationData *auth_data,
873 * auth_data since it's signed by the KDC.
881 if (auth_data) {
894 for(i = 0; i < auth_data->len ; i++) {
895 ret = add_AuthorizationData(et.authorization_data, &auth_data->val[i]);
1147 AuthorizationData **auth_data,
1163 *auth_data = NULL;
1367 ALLOC(*auth_data);
1368 if (*auth_data == NULL) {
1373 ret = decode_AuthorizationData(ad.data, ad.length, *auth_data, NUL
724 tgs_make_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const krb5_keyblock *replykey, int rk_is_subkey, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, krb5_principal server_principal, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_principals spp, const krb5_data *rspac, const METHOD_DATA *enc_pa_data, const char **e_text, krb5_data *reply) argument
1135 tgs_parse_request(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, const PA_DATA *tgs_req, hdb_entry_ex **krbtgt, krb5_enctype *krbtgt_etype, krb5_ticket **ticket, const char **e_text, const char *from, const struct sockaddr *from_addr, time_t **csec, int **cusec, AuthorizationData **auth_data, krb5_keyblock **replykey, int *rk_is_subkey) argument
1469 tgs_build_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ *req, KDC_REQ_BODY *b, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, const krb5_keyblock *replykey, int rk_is_subkey, krb5_ticket *ticket, krb5_data *reply, const char *from, const char **e_text, AuthorizationData **auth_data, const struct sockaddr *from_addr) argument
2288 AuthorizationData *auth_data = NULL; local
[all...]
/freebsd-10.0-release/contrib/tcpdump/
H A Dprint-bfd.c101 u_int8_t auth_data; member in struct:bfd_auth_header_t
/freebsd-10.0-release/crypto/heimdal/appl/ftp/ftp/
H A Dsecurity.c467 adat(char *auth_data) argument
470 void *buf = malloc(strlen(auth_data));
472 len = base64_decode(auth_data, buf);
/freebsd-10.0-release/crypto/heimdal/appl/ftp/ftpd/
H A Dsecurity.c467 adat(char *auth_data) argument
470 void *buf = malloc(strlen(auth_data));
472 len = base64_decode(auth_data, buf);
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Dikev2_common.h296 u8 *auth_data);
H A Dikev2_common.c437 u8 *auth_data)
479 (const u8 **) &sign_data, &sign_len, auth_data) < 0)
431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Dikev2.c573 u8 auth_data[IKEV2_MAX_HASH_LEN]; local
589 auth_data) < 0) {
602 os_memcmp(auth, auth_data, auth_len) != 0) {
607 auth_data, prf->hash_len);
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Dikev2.c607 u8 auth_data[IKEV2_MAX_HASH_LEN]; local
623 auth_data) < 0) {
636 os_memcmp(auth, auth_data, auth_len) != 0) {
641 auth_data, prf->hash_len);
/freebsd-10.0-release/crypto/openssl/crypto/bio/
H A Dbss_dgram.c910 int auth_data = 0, auth_forward = 0; local
962 if (*p == OPENSSL_SCTP_DATA_CHUNK_TYPE) auth_data = 1;
968 OPENSSL_assert(auth_data);
1272 int ii, auth_data = 0, auth_forward = 0; local
1286 if (*p == OPENSSL_SCTP_DATA_CHUNK_TYPE) auth_data = 1;
1292 if (!auth_data || !auth_forward)

Completed in 173 milliseconds