/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/ |
H A D | ah4.c | 129 memcpy(ah->auth_data, icv, ahp->icv_trunc_len); 179 memset(ah->auth_data, 0, ahp->icv_trunc_len); 228 memcpy(ah->auth_data, icv, ahp->icv_trunc_len); 246 u8 *auth_data; local 257 auth_data = ah_tmp_auth(work_iph, ihl); 258 icv = ah_tmp_icv(ahp->ahash, auth_data, ahp->icv_trunc_len); 260 err = memcmp(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG: 0; 281 u8 *auth_data; local 329 auth_data = ah_tmp_auth(work_iph, ihl); 330 icv = ah_tmp_icv(ahash, auth_data, ah [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv6/ |
H A D | ah6.c | 316 memcpy(ah->auth_data, icv, ahp->icv_trunc_len); 373 memset(ah->auth_data, 0, ahp->icv_trunc_len); 432 memcpy(ah->auth_data, icv, ahp->icv_trunc_len); 451 u8 *auth_data; local 462 auth_data = ah_tmp_auth(work_iph, hdr_len); 463 icv = ah_tmp_icv(ahp->ahash, auth_data, ahp->icv_trunc_len); 465 err = memcmp(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG: 0; 499 u8 *auth_data; local 553 auth_data = ah_tmp_auth(work_iph, hdr_len); 554 icv = ah_tmp_icv(ahash, auth_data, ah [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | kerberos_verify.c | 314 DATA_BLOB auth_data; local 332 ZERO_STRUCT(auth_data); 467 got_auth_data = get_auth_data_from_tkt(mem_ctx, &auth_data, tkt); 474 pac_ret = decode_pac_data(mem_ctx, &auth_data, context, keyblock, client_principal, authtime, pac_data); 479 data_blob_free(&auth_data); 516 data_blob_free(&auth_data);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | ip.h | 127 __u8 auth_data[0]; /* Variable len but >=4. Mind the 64 bit alignment! */ member in struct:ip_auth_hdr
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/ospfd/ |
H A D | ospf_packet.h | 89 u_char auth_data [OSPF_AUTH_SIMPLE_SIZE]; member in union:ospf_header::__anon7639
|
H A D | ospf_packet.c | 2041 if (!memcmp (OSPF_IF_PARAM (oi, auth_simple), ospfh->u.auth_data, OSPF_AUTH_SIMPLE_SIZE)) 2076 /* clear auth_data for checksum. */ 2077 memset (ospfh->u.auth_data, 0, OSPF_AUTH_SIMPLE_SIZE); 2319 memset (ospfh->u.auth_data, 0, OSPF_AUTH_SIMPLE_SIZE); 2333 /* memset (ospfh->u.auth_data, 0, sizeof (ospfh->u.auth_data)); */ 2336 memcpy (ospfh->u.auth_data, OSPF_IF_PARAM (oi, auth_simple), 2357 /* memset (ospfh->u.auth_data, 0, sizeof (ospfh->u.auth_data)); */
|
H A D | ospf_dump.c | 655 strncpy (buf, ospfh->u.auth_data, 8);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/ |
H A D | cli_pipe.c | 913 prs_struct *auth_data) 939 prs_mem_free(auth_data); 949 if (!prs_copy_data_in(auth_data, (char *)tkt_wrapped.data, tkt_wrapped.length)) { 951 prs_mem_free(auth_data); 972 prs_struct *auth_data) 989 prs_mem_free(auth_data); 999 if (!prs_copy_data_in(auth_data, (char *)spnego_msg.data, spnego_msg.length)) { 1001 prs_mem_free(auth_data); 1019 prs_struct *auth_data) 1035 prs_mem_free(auth_data); 910 create_krb5_auth_bind_req( struct rpc_pipe_client *cli, enum pipe_auth_level auth_level, RPC_HDR_AUTH *pauth_out, prs_struct *auth_data) argument 969 create_spnego_ntlmssp_auth_rpc_bind_req( struct rpc_pipe_client *cli, enum pipe_auth_level auth_level, RPC_HDR_AUTH *pauth_out, prs_struct *auth_data) argument 1016 create_ntlmssp_auth_rpc_bind_req( struct rpc_pipe_client *cli, enum pipe_auth_level auth_level, RPC_HDR_AUTH *pauth_out, prs_struct *auth_data) argument 1057 create_schannel_auth_rpc_bind_req( struct rpc_pipe_client *cli, enum pipe_auth_level auth_level, RPC_HDR_AUTH *pauth_out, prs_struct *auth_data) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/tcpdump-4.4.0/ |
H A D | print-bfd.c | 101 u_int8_t auth_data; member in struct:bfd_auth_header_t
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | clikrb5.c | 275 BOOL unwrap_pac(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, DATA_BLOB *unwrapped_pac_data) argument 281 if (!auth_data->length) { 285 asn1_load(&data, *auth_data); 312 BOOL get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt) argument 336 got_auth_data_pac = unwrap_pac(mem_ctx, &auth_data_wrapped, auth_data); 364 got_auth_data_pac = unwrap_pac(mem_ctx, &auth_data_wrapped, auth_data);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/bio/ |
H A D | bss_dgram.c | 971 int auth_data = 0, auth_forward = 0; local 1033 auth_data = 1; 1040 OPENSSL_assert(auth_data); 1346 int ii, auth_data = 0, auth_forward = 0; local 1366 auth_data = 1; 1373 if (!auth_data || !auth_forward) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/bio/ |
H A D | bss_dgram.c | 971 int auth_data = 0, auth_forward = 0; local 1033 auth_data = 1; 1040 OPENSSL_assert(auth_data); 1346 int ii, auth_data = 0, auth_forward = 0; local 1366 auth_data = 1; 1373 if (!auth_data || !auth_forward) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | includes.h | 1133 BOOL get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/be2iscsi/ |
H A D | be_cmds.h | 274 struct mgmt_auth_method_format auth_data; member in struct:mgmt_conn_login_options
|
H A D | be_main.c | 245 negotiated_login_options.auth_data.chap. 248 negotiated_login_options.auth_data.chap. 254 negotiated_login_options.auth_data.chap. 257 negotiated_login_options.auth_data.chap. 264 negotiated_login_options.auth_data.chap. 267 negotiated_login_options.auth_data.chap. 274 negotiated_login_options.auth_data.chap. 277 negotiated_login_options.auth_data.chap.
|