/macosx-10.10/eap8021x-198/ |
H A D | eapolcfg_auth.defs | 57 auth_data : OOBData; 63 auth_data : OOBData; 71 auth_data : OOBData; 76 auth_data : OOBData;
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | build_auth.c | 38 krb5_authdata **auth_data) 86 if (*auth_data == NULL) { 87 ALLOC(*auth_data, 1); 88 if (*auth_data == NULL) { 99 ret = add_AuthorizationData(*auth_data, &el); 146 if (auth_context->auth_data) { 152 ret = copy_AuthorizationData(auth.authorization_data, auth_context->auth_data); 37 make_etypelist(krb5_context context, krb5_authdata **auth_data) argument
|
H A D | auth_context.c | 63 p->auth_data = NULL; 85 if (auth_context->auth_data) { 86 free_AuthorizationData(auth_context->auth_data); 87 free(auth_context->auth_data); 536 if (auth_context->auth_data == NULL) { 537 auth_context->auth_data = calloc(1, sizeof(*auth_context->auth_data)); 538 if (auth_context->auth_data == NULL) 545 return add_AuthorizationData(auth_context->auth_data, &el);
|
H A D | krb5.h | 693 AuthorizationData *auth_data; member in struct:krb5_auth_context_data
|
/macosx-10.10/eap8021x-198/eapolcfg_auth.tproj/ |
H A D | eapolcfg_auth.c | 71 authorization_is_valid(const void * auth_data, int auth_data_length) argument 80 if (auth_data == NULL 85 auth_ext_p = (AuthorizationExternalForm *)auth_data; 156 OOBData_t auth_data, 169 if (authorization_is_valid(auth_data, auth_data_length) == FALSE) { 203 my_vm_deallocate((vm_address_t)auth_data, auth_data_length); 215 OOBData_t auth_data, 232 if (authorization_is_valid(auth_data, auth_data_length) == FALSE) { 261 my_vm_deallocate((vm_address_t)auth_data, auth_data_length); 275 OOBData_t auth_data, 155 eapolclientitemid_set_identity(mach_port_t server, OOBData_t auth_data, mach_msg_type_number_t auth_data_length, xmlData_t itemID_data, mach_msg_type_number_t itemID_data_length, OOBData_t id_handle, mach_msg_type_number_t id_handle_length, int * result) argument 214 eapolclientitemid_set_password(mach_port_t server, OOBData_t auth_data, mach_msg_type_number_t auth_data_length, xmlData_t itemID_data, mach_msg_type_number_t itemID_data_length, uint32_t flags, OOBData_t name, mach_msg_type_number_t name_length, OOBData_t password, mach_msg_type_number_t password_length, int * result) argument 274 eapolclientitemid_remove_password(mach_port_t server, OOBData_t auth_data, mach_msg_type_number_t auth_data_length, xmlData_t itemID_data, mach_msg_type_number_t itemID_data_length, int * result) argument 311 eapolclientitemid_check_password(mach_port_t server, OOBData_t auth_data, mach_msg_type_number_t auth_data_length, xmlData_t itemID_data, mach_msg_type_number_t itemID_data_length, OOBDataOut_t * name, mach_msg_type_number_t * name_length, boolean_t * password_set, int * result) argument [all...] |
/macosx-10.10/ruby-106/ruby/test/openssl/ |
H A D | test_cipher.rb | 150 cipher.auth_data = "aad" 157 decipher.auth_data = "aad" 168 cipher.auth_data = "aad" 175 decipher.auth_data = "aad" 185 cipher.auth_data = "aad" 192 decipher.auth_data = "aad" 203 cipher.auth_data = "aad" 209 decipher.auth_data = "daa" 220 cipher.auth_data = "aad" 226 decipher.auth_data [all...] |
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | session.h | 51 char *auth_data; member in struct:Session
|
H A D | session.c | 350 s->auth_data = packet_get_string(&data_len); 368 xfree(s->auth_data); 370 s->auth_data = NULL; 1347 s->display != NULL && s->auth_proto != NULL && s->auth_data != NULL; 1360 s->auth_data); 1373 s->auth_data); 1387 s->auth_proto, s->auth_data); 1397 s->auth_data); 2150 if (s->auth_proto != NULL || s->auth_data != NULL) { 2157 s->auth_data [all...] |
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | krb5tgs.c | 733 AuthorizationData *auth_data, 867 * auth_data since it's signed by the KDC. 875 if (auth_data) { 888 for(i = 0; i < auth_data->len ; i++) { 889 ret = add_AuthorizationData(et.authorization_data, &auth_data->val[i]); 1139 AuthorizationData **auth_data) 1151 *auth_data = NULL; 1354 ALLOC(*auth_data); 1355 if (*auth_data == NULL) { 1361 ret = decode_AuthorizationData(ad.data, ad.length, *auth_data, NUL 726 tgs_make_reply(kdc_request_t r, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, krb5_principal server_principal, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_principals spp, const krb5_data *rspac, const METHOD_DATA *enc_pa_data, krb5_data *reply) argument 1131 tgs_parse_request(kdc_request_t r, KDC_REQ_BODY *b, const PA_DATA *tgs_req, krb5_ticket **ticket, const char *from, const struct sockaddr *from_addr, time_t **csec, int **cusec, AuthorizationData **auth_data) argument 1475 tgs_build_reply(kdc_request_t r, KDC_REQ *req, KDC_REQ_BODY *b, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_ticket *ticket, krb5_data *reply, const char *from, AuthorizationData **auth_data, const struct sockaddr *from_addr) argument 2312 AuthorizationData *auth_data = NULL; local [all...] |
/macosx-10.10/tcpdump-61/tcpdump/ |
H A D | print-bfd.c | 101 u_int8_t auth_data; member in struct:bfd_auth_header_t
|
/macosx-10.10/Heimdal-398.1.2/appl/ftp/ftp/ |
H A D | security.c | 467 adat(char *auth_data) argument 470 void *buf = malloc(strlen(auth_data)); 472 len = base64_decode(auth_data, buf);
|
/macosx-10.10/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecDbKeychainItem.c | 678 CFMutableDictionaryRef auth_data = CFDictionaryCreateMutableCopy(NULL, 0, constraints); local 681 CFDictionaryAddValue(auth_data, key, value); 685 CFDataRef encoded = kc_plist_copy_der(auth_data, NULL); 686 CFReleaseSafe(auth_data);
|