Searched refs:auth_data (Results 1 - 10 of 10) sorted by relevance

/macosx-10.9.5/eap8021x-180/
H A Deapolcfg_auth.defs57 auth_data : OOBData;
63 auth_data : OOBData;
71 auth_data : OOBData;
76 auth_data : OOBData;
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/
H A Dbuild_auth.c38 krb5_authdata **auth_data)
82 ALLOC(*auth_data, 1);
83 if (*auth_data == NULL) {
89 ALLOC_SEQ(*auth_data, 1);
90 if ((*auth_data)->val == NULL) {
91 free(*auth_data);
97 (*auth_data)->val[0].ad_type = KRB5_AUTHDATA_IF_RELEVANT;
98 (*auth_data)->val[0].ad_data.length = len;
99 (*auth_data)->val[0].ad_data.data = buf;
37 make_etypelist(krb5_context context, krb5_authdata **auth_data) argument
/macosx-10.9.5/eap8021x-180/eapolcfg_auth.tproj/
H A Deapolcfg_auth.c99 authorization_is_valid(const void * auth_data, int auth_data_length) argument
108 if (auth_data == NULL
113 auth_ext_p = (AuthorizationExternalForm *)auth_data;
184 OOBData_t auth_data,
197 if (authorization_is_valid(auth_data, auth_data_length) == FALSE) {
231 my_vm_deallocate((vm_address_t)auth_data, auth_data_length);
243 OOBData_t auth_data,
260 if (authorization_is_valid(auth_data, auth_data_length) == FALSE) {
289 my_vm_deallocate((vm_address_t)auth_data, auth_data_length);
303 OOBData_t auth_data,
183 eapolclientitemid_set_identity(mach_port_t server, OOBData_t auth_data, mach_msg_type_number_t auth_data_length, xmlData_t itemID_data, mach_msg_type_number_t itemID_data_length, OOBData_t id_handle, mach_msg_type_number_t id_handle_length, int * result) argument
242 eapolclientitemid_set_password(mach_port_t server, OOBData_t auth_data, mach_msg_type_number_t auth_data_length, xmlData_t itemID_data, mach_msg_type_number_t itemID_data_length, uint32_t flags, OOBData_t name, mach_msg_type_number_t name_length, OOBData_t password, mach_msg_type_number_t password_length, int * result) argument
302 eapolclientitemid_remove_password(mach_port_t server, OOBData_t auth_data, mach_msg_type_number_t auth_data_length, xmlData_t itemID_data, mach_msg_type_number_t itemID_data_length, int * result) argument
339 eapolclientitemid_check_password(mach_port_t server, OOBData_t auth_data, mach_msg_type_number_t auth_data_length, xmlData_t itemID_data, mach_msg_type_number_t itemID_data_length, OOBDataOut_t * name, mach_msg_type_number_t * name_length, boolean_t * password_set, int * result) argument
[all...]
/macosx-10.9.5/ruby-104/ruby/test/openssl/
H A Dtest_cipher.rb150 cipher.auth_data = "aad"
157 decipher.auth_data = "aad"
168 cipher.auth_data = "aad"
175 decipher.auth_data = "aad"
185 cipher.auth_data = "aad"
192 decipher.auth_data = "aad"
203 cipher.auth_data = "aad"
209 decipher.auth_data = "daa"
220 cipher.auth_data = "aad"
226 decipher.auth_data
[all...]
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dsession.h51 char *auth_data; member in struct:Session
H A Dsession.c350 s->auth_data = packet_get_string(&data_len);
368 xfree(s->auth_data);
370 s->auth_data = NULL;
1347 s->display != NULL && s->auth_proto != NULL && s->auth_data != NULL;
1360 s->auth_data);
1373 s->auth_data);
1387 s->auth_proto, s->auth_data);
1397 s->auth_data);
2150 if (s->auth_proto != NULL || s->auth_data != NULL) {
2157 s->auth_data
[all...]
/macosx-10.9.5/Heimdal-323.92.1/kdc/
H A Dkrb5tgs.c736 AuthorizationData *auth_data,
871 * auth_data since it's signed by the KDC.
879 if (auth_data) {
892 for(i = 0; i < auth_data->len ; i++) {
893 ret = add_AuthorizationData(et.authorization_data, &auth_data->val[i]);
1145 AuthorizationData **auth_data,
1161 *auth_data = NULL;
1365 ALLOC(*auth_data);
1366 if (*auth_data == NULL) {
1371 ret = decode_AuthorizationData(ad.data, ad.length, *auth_data, NUL
726 tgs_make_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const krb5_keyblock *replykey, int rk_is_subkey, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, krb5_principal server_principal, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_principals spp, const krb5_data *rspac, const METHOD_DATA *enc_pa_data, const char **e_text, krb5_data *reply) argument
1133 tgs_parse_request(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, const PA_DATA *tgs_req, hdb_entry_ex **krbtgt, krb5_enctype *krbtgt_etype, krb5_ticket **ticket, const char **e_text, const char *from, const struct sockaddr *from_addr, time_t **csec, int **cusec, AuthorizationData **auth_data, krb5_keyblock **replykey, int *rk_is_subkey) argument
1467 tgs_build_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ *req, KDC_REQ_BODY *b, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, const krb5_keyblock *replykey, int rk_is_subkey, krb5_ticket *ticket, krb5_data *reply, const char *from, const char **e_text, AuthorizationData **auth_data, const struct sockaddr *from_addr) argument
2306 AuthorizationData *auth_data = NULL; local
[all...]
/macosx-10.9.5/tcpdump-56/tcpdump/
H A Dprint-bfd.c101 u_int8_t auth_data; member in struct:bfd_auth_header_t
/macosx-10.9.5/Heimdal-323.92.1/appl/ftp/ftp/
H A Dsecurity.c467 adat(char *auth_data) argument
470 void *buf = malloc(strlen(auth_data));
472 len = base64_decode(auth_data, buf);
/macosx-10.9.5/cups-372.4/cups/scheduler/
H A Dauth.c143 static cupsd_authdata_t *auth_data; /* Current client being authenticated */ variable
721 auth_data = &data;
2532 data = auth_data;

Completed in 348 milliseconds