/freebsd-10.3-release/crypto/heimdal/lib/krb5/ |
H A D | build_ap_req.c | 41 krb5_data authenticator, 63 ap.authenticator.etype = enctype; 64 ap.authenticator.kvno = NULL; 65 ap.authenticator.cipher = authenticator; 37 krb5_build_ap_req(krb5_context context, krb5_enctype enctype, krb5_creds *cred, krb5_flags ap_options, krb5_data authenticator, krb5_data *retdata) argument
|
H A D | auth_context.c | 48 ALLOC(p->authenticator, 1); 49 if (!p->authenticator) { 54 memset (p->authenticator, 0, sizeof(*p->authenticator)); 72 krb5_free_authenticator(context, &auth_context->authenticator); 452 krb5_authenticator *authenticator) 454 *authenticator = malloc(sizeof(**authenticator)); 455 if (*authenticator == NULL) { 460 copy_Authenticator(auth_context->authenticator, 450 krb5_auth_con_getauthenticator(krb5_context context, krb5_auth_context auth_context, krb5_authenticator *authenticator) argument 467 krb5_free_authenticator(krb5_context context, krb5_authenticator *authenticator) argument [all...] |
H A D | mk_req_ext.c | 47 krb5_data authenticator; local 131 &authenticator, 139 in_creds, ap_req_options, authenticator, outbuf);
|
H A D | rd_rep.c | 89 if ((*repl)->ctime != auth_context->authenticator->ctime || 90 (*repl)->cusec != auth_context->authenticator->cusec)
|
H A D | rd_req.c | 73 Authenticator *authenticator, 101 authenticator, &len); 185 ad = auth_context->authenticator->authorization_data; 280 krb5_authenticator authenticator; local 285 &authenticator); 288 if(authenticator->cksum == NULL) { 289 krb5_free_authenticator(context, &authenticator); 294 krb5_free_authenticator(context, &authenticator); 305 authenticator->cksum); 308 krb5_free_authenticator(context, &authenticator); 70 decrypt_authenticator(krb5_context context, EncryptionKey *key, EncryptedData *enc_part, Authenticator *authenticator, krb5_key_usage usage) argument [all...] |
H A D | mk_rep.c | 54 body.ctime = auth_context->authenticator->ctime; 55 body.cusec = auth_context->authenticator->cusec;
|
H A D | build_auth.c | 170 auth_context->authenticator->ctime = auth.ctime; 171 auth_context->authenticator->cusec = auth.cusec;
|
H A D | krb5.h | 202 authenticator subkey (section 5.4.1) */ 208 authenticator subkey), encrypted with the tgs session key 215 encrypted with the tgs authenticator subkey (section 5.4.2) */ 220 /* AP-REQ Authenticator (includes application authenticator 636 krb5_authenticator authenticator; member in struct:krb5_auth_context_data
|
/freebsd-10.3-release/contrib/wpa/src/radius/ |
H A D | radius.c | 391 os_memcpy(msg->hdr->authenticator, req_authenticator, 392 sizeof(msg->hdr->authenticator)); 405 md5_vector(4, addr, len, msg->hdr->authenticator); 434 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); 443 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) 462 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); 467 md5_vector(2, addr, len, msg->hdr->authenticator); 494 return os_memcmp(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; 521 if (os_memcmp(msg->hdr->authenticator, has [all...] |
H A D | radius.h | 22 u8 authenticator[16]; member in struct:radius_hdr
|
H A D | radius_server.c | 598 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator, 616 hdr->authenticator) < 0) { 661 hdr->authenticator) < 734 radius_msg_get_hdr(msg)->authenticator, 16) == 0) { 845 os_memcpy(sess->last_authenticator, hdr->authenticator, 16);
|
/freebsd-10.3-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | accept_sec_context.c | 502 krb5_authenticator authenticator; local 506 &authenticator); 513 if (authenticator->cksum == NULL) { 514 krb5_free_authenticator(context, &authenticator); 519 if (authenticator->cksum->cksumtype == CKSUMTYPE_GSSAPI) { 522 authenticator->cksum, 526 krb5_free_authenticator(context, &authenticator); 537 krb5_free_authenticator(context, &authenticator); 551 authenticator->cksum); 552 krb5_free_authenticator(context, &authenticator); [all...] |
H A D | init_sec_context.c | 528 krb5_data authenticator; local 648 &authenticator, 663 authenticator,
|
/freebsd-10.3-release/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 125 * authenticator[4] EncryptedData 136 KRB5_ENCDATA *authenticator; member in struct:krb5_ap_req_st 180 /*- -- Unencrypted authenticator 182 * authenticator-vno[0] INTEGER,
|
H A D | krb5_asn.c | 104 ASN1_EXP(KRB5_APREQBODY, authenticator, KRB5_ENCDATA, 4),
|
/freebsd-10.3-release/contrib/wpa/src/wps/ |
H A D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, argument 23 if (authenticator == NULL) { 31 "validating authenticator"); 44 if (os_memcmp(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) {
|
H A D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member in struct:wps_parse_attr
|
H A D | wps_validate.c | 764 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) argument 766 if (authenticator == NULL) { 1380 wps_validate_authenticator(attr.authenticator, 1)) { 1468 wps_validate_authenticator(attr.authenticator, 1)) { 1506 wps_validate_authenticator(attr.authenticator, 1)) { 1573 wps_validate_authenticator(attr.authenticator, 1)) { 1640 wps_validate_authenticator(attr.authenticator, 1)) { 1708 wps_validate_authenticator(attr.authenticator, 1)) { 1782 wps_validate_authenticator(attr.authenticator, 1)) {
|
H A D | wps_i.h | 171 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator,
|
H A D | wps_enrollee.c | 877 wps_process_authenticator(wps, attr->authenticator, msg) || 960 wps_process_authenticator(wps, attr->authenticator, msg) || 1015 wps_process_authenticator(wps, attr->authenticator, msg)) { 1072 wps_process_authenticator(wps, attr->authenticator, msg)) {
|
H A D | wps_attr_parse.c | 299 attr->authenticator = pos;
|
/freebsd-10.3-release/crypto/openssl/ssl/ |
H A D | s3_srvr.c | 2417 krb5_data authenticator; local 2447 authenticator.length = i; 2449 if (n < (long)(enc_ticket.length + authenticator.length + 6)) { 2455 authenticator.data = (char *)p; 2456 p += authenticator.length; 2472 if (n != (long)(enc_ticket.length + authenticator.length + 2492 * Note: no authenticator is not considered an error, ** but will 2495 if ((krb5rc = kssl_check_authent(kssl_ctx, &authenticator,
|
H A D | d1_clnt.c | 1080 krb5_data authenticator, *authp = NULL; local 1098 authp = &authenticator; 1136 ** optional authenticator omitted. 1156 s2n(0, p); /* null authenticator length */
|
H A D | kssl.c | 798 * Return true:1 if p "looks like" the start of the real authenticator 897 * Return pointer to start of real authenticator within authenticator, or 899 * Decrypted authenticator looks like this: 1034 * If authenp is non-NULL, also return encrypted authenticator, 1040 * 20010606 VRS May also return optional authenticator. 1149 authenp->length = i2d_KRB5_ENCDATA(ap_req->authenticator, NULL); 1153 i2d_KRB5_ENCDATA(ap_req->authenticator, &adp); 1954 * The authenticator client time is checked to be within clockskew secs of 1996 * Decode and decrypt given DER-encoded authenticator, the [all...] |
/freebsd-10.3-release/crypto/heimdal/kdc/ |
H A D | kx509.c | 315 &req->authenticator,
|