/freebsd-11-stable/contrib/unbound/services/ |
H A D | authzone.c | 168 auth_packed_rrset_copy_region(struct auth_zone* z, struct auth_data* node, 220 struct dns_msg* msg, struct auth_data* node, struct auth_rrset* rrset) 245 struct dns_msg* msg, struct auth_data* node, struct auth_rrset* rrset) 269 struct dns_msg* msg, struct auth_data* node, struct auth_rrset* rrset) 326 struct auth_data* a = (struct auth_data*)z1; 327 struct auth_data* b = (struct auth_data*)z2; 362 auth_data_delete(struct auth_data* n) 380 struct auth_data* 1733 RBTREE_FOR(n, struct auth_data*, &z->data) argument [all...] |
H A D | authzone.h | 117 * rbtree of struct auth_data */ 151 struct auth_data { struct 631 /** compare auth_data for sorted rbtree */
|
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-bfd.c | 99 uint8_t auth_data; member in struct:bfd_auth_header_t
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpa_priv.c | 284 params.auth_data = ((u8 *) (auth + 1)) + auth->ie_len;
|
H A D | sme.c | 665 params.auth_data = wpabuf_head(resp); 749 params.auth_data = wpabuf_head(resp);
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 606 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 622 auth_data) < 0) { 635 os_memcmp_const(auth, auth_data, auth_len) != 0) { 640 auth_data, prf->hash_len);
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 538 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 554 auth_data) < 0) { 567 os_memcmp_const(auth, auth_data, auth_len) != 0) { 572 auth_data, prf->hash_len);
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_privsep.c | 282 os_memcpy(pos, params->auth_data, params->auth_data_len);
|
H A D | driver.h | 652 * auth_data - Additional elements for Authentication frame 658 const u8 *auth_data; member in struct:wpa_driver_auth_params 661 * auth_data_len - Length of auth_data buffer in octets
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 375 u8 *auth_data) 417 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
H A D | ikev2_common.h | 292 u8 *auth_data);
|
/freebsd-11-stable/crypto/openssh/ |
H A D | session.h | 51 char *auth_data; member in struct:Session
|
H A D | session.c | 1200 s->display != NULL && s->auth_proto != NULL && s->auth_data != NULL; 1214 s->auth_data); 1227 s->auth_data); 1241 s->auth_proto, s->auth_data); 1251 s->auth_data); 1980 if (s->auth_proto != NULL || s->auth_data != NULL) { 1987 s->auth_data = packet_get_string(NULL); 1992 xauth_valid_string(s->auth_data)) 2000 free(s->auth_data); 2002 s->auth_data [all...] |
/freebsd-11-stable/crypto/openssl/crypto/bio/ |
H A D | bss_dgram.c | 971 int auth_data = 0, auth_forward = 0; local 1033 auth_data = 1; 1040 OPENSSL_assert(auth_data); 1346 int ii, auth_data = 0, auth_forward = 0; local 1366 auth_data = 1; 1373 if (!auth_data || !auth_forward) {
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | krb5tgs.c | 734 AuthorizationData *auth_data, 873 * auth_data since it's signed by the KDC. 881 if (auth_data) { 894 for(i = 0; i < auth_data->len ; i++) { 895 ret = add_AuthorizationData(et.authorization_data, &auth_data->val[i]); 1147 AuthorizationData **auth_data, 1163 *auth_data = NULL; 1367 ALLOC(*auth_data); 1368 if (*auth_data == NULL) { 1373 ret = decode_AuthorizationData(ad.data, ad.length, *auth_data, NUL 724 tgs_make_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const krb5_keyblock *replykey, int rk_is_subkey, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, krb5_principal server_principal, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_principals spp, const krb5_data *rspac, const METHOD_DATA *enc_pa_data, const char **e_text, krb5_data *reply) argument 1135 tgs_parse_request(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, const PA_DATA *tgs_req, hdb_entry_ex **krbtgt, krb5_enctype *krbtgt_etype, krb5_ticket **ticket, const char **e_text, const char *from, const struct sockaddr *from_addr, time_t **csec, int **cusec, AuthorizationData **auth_data, krb5_keyblock **replykey, int *rk_is_subkey) argument 1469 tgs_build_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ *req, KDC_REQ_BODY *b, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, const krb5_keyblock *replykey, int rk_is_subkey, krb5_ticket *ticket, krb5_data *reply, const char *from, const char **e_text, AuthorizationData **auth_data, const struct sockaddr *from_addr) argument 2288 AuthorizationData *auth_data = NULL; local [all...] |
/freebsd-11-stable/crypto/heimdal/appl/ftp/ftpd/ |
H A D | security.c | 467 adat(char *auth_data) argument 470 void *buf = malloc(strlen(auth_data)); 472 len = base64_decode(auth_data, buf);
|
/freebsd-11-stable/crypto/heimdal/appl/ftp/ftp/ |
H A D | security.c | 467 adat(char *auth_data) argument 470 void *buf = malloc(strlen(auth_data)); 472 len = base64_decode(auth_data, buf);
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | build_auth.c | 38 krb5_authdata **auth_data) 82 ALLOC(*auth_data, 1); 83 if (*auth_data == NULL) { 89 ALLOC_SEQ(*auth_data, 1); 90 if ((*auth_data)->val == NULL) { 91 free(*auth_data); 97 (*auth_data)->val[0].ad_type = KRB5_AUTHDATA_IF_RELEVANT; 98 (*auth_data)->val[0].ad_data.length = len; 99 (*auth_data)->val[0].ad_data.data = buf; 37 make_etypelist(krb5_context context, krb5_authdata **auth_data) argument
|