| /src/crypto/external/cpl/trousers/dist/src/tspi/ |
| tsp_get_flags.c | 34 TPM_AUTH auth; local 50 &digest, &auth))) 53 if ((result = TCS_API(tspContext)->GetCapabilityOwner(tspContext, &auth, &version, 66 return obj_policy_validate_auth_oiap(hPolicy, &digest, &auth);
|
| tspi_dir.c | 33 TPM_AUTH auth; local 63 &hashDigest, &auth))) 66 if ((result = TCS_API(tspContext)->DirWriteAuth(tspContext, ulDirIndex, &dirValue, &auth))) 75 return obj_policy_validate_auth_oiap(hPolicy, &hashDigest, &auth);
|
| tsp_caps_tpm.c | 27 * sent. This will keep the owner auth code from being duplicated around the TSP. 40 TPM_AUTH auth; local 55 &digest, &auth))) 60 (BYTE *)&value, &auth))) 69 return obj_policy_validate_auth_oiap(hTPMPolicy, &digest, &auth);
|
| tspi_admin.c | 30 TPM_AUTH auth, *pAuth; local 53 FALSE, &hashDigest, &auth))) 56 if ((result = TCS_API(tspContext)->DisableOwnerClear(tspContext, &auth))) 65 if ((result = obj_policy_validate_auth_oiap(hPolicy, &hashDigest, &auth))) 80 FALSE, &hashDigest, &auth))) 83 if ((result = TCS_API(tspContext)->OwnerSetDisable(tspContext, fTpmState, &auth))) 92 if ((result = obj_policy_validate_auth_oiap(hPolicy, &hashDigest, &auth))) 125 pAuth = &auth; 165 FALSE, &hashDigest, &auth))) 168 if ((result = TCS_API(tspContext)->DisablePubekRead(tspContext, &auth))) [all...] |
| tspi_tick.c | 36 TPM_AUTH auth, *pAuth; local 77 FALSE, &digest, &auth))) { 81 pAuth = &auth;
|
| tspi_nv.c | 274 TPM_AUTH auth; local 318 &auth))) 324 rgbDataToWrite, &auth))) 334 &digest, &auth))) 350 &auth))) 356 rgbDataToWrite, &auth))) 366 &digest, &auth))) 401 TPM_AUTH auth; local 444 &auth))) 450 &auth, rgbDataRead)) [all...] |
| tspi_own.c | 75 /* Now, take ownership is ready to call. The auth structure should be complete 82 /* The final step is to validate the return Auth */ 102 LogDebug("auth data usage changed. Atmel bug. Fixing in key object"); 121 TPM_AUTH auth; local 142 &hashDigest, &auth))) 145 if ((result = TCS_API(tspContext)->OwnerClear(tspContext, &auth))) 148 /* validate auth */ 155 if ((result = obj_policy_validate_auth_oiap(hPolicy, &hashDigest, &auth)))
|
| /src/usr.sbin/ldpd/ |
| ldp_command.h | 40 int auth; /* 1 if socket is authenticated */ member in struct:com_sock
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| build_auth.c | 112 Authenticator auth; local 119 memset(&auth, 0, sizeof(auth)); 121 auth.authenticator_vno = 5; 122 ret = copy_Realm(&cred->client->realm, &auth.crealm); 125 ret = copy_PrincipalName(&cred->client->name, &auth.cname); 129 krb5_us_timeofday (context, &auth.ctime, &auth.cusec); 131 ret = krb5_auth_con_getlocalsubkey(context, auth_context, &auth.subkey); 140 ALLOC(auth.seq_number, 1) [all...] |
| /src/crypto/external/cpl/trousers/dist/src/tcs/rpc/tcstp/ |
| rpc_dir.c | 37 TPM_AUTH auth; local 51 if (getData(TCSD_PACKET_TYPE_AUTH, 3, &auth, 0, &data->comm)) 56 result = TCSP_DirWriteAuth_Internal(hContext, dirIndex, dirDigest, &auth); 62 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) {
|
| rpc_counter.c | 72 TPM_AUTH auth; local 102 if (getData(TCSD_PACKET_TYPE_AUTH, 4, &auth, 0, &data->comm)) { 109 result = TCSP_CreateCounter_Internal(hContext, LabelSize, pLabel, encauth, &auth, 118 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) 137 TPM_AUTH auth; local 150 if (getData(TCSD_PACKET_TYPE_AUTH, 2, &auth, 0, &data->comm)) 155 result = TCSP_IncrementCounter_Internal(hContext, idCounter, &auth, &counterValue); 161 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) 177 TPM_AUTH auth; local 190 if (getData(TCSD_PACKET_TYPE_AUTH, 2, &auth, 0, &data->comm) 215 TPM_AUTH auth; local [all...] |
| rpc_own.c | 147 TPM_AUTH auth; local 157 if (getData(TCSD_PACKET_TYPE_AUTH, 1, &auth, 0, &data->comm)) 162 result = TCSP_OwnerClear_Internal(hContext, &auth); 168 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) {
|
| rpc_sign.c | 38 TPM_AUTH auth; local 69 result = getData(TCSD_PACKET_TYPE_AUTH, 4, &auth, 0, &data->comm); 76 pAuth = &auth; 90 if (setData(TCSD_PACKET_TYPE_AUTH, i++, &auth, 0, &data->comm)) {
|
| rpc_tick.c | 73 TPM_AUTH auth, *pAuth; local 94 if (getData(TCSD_PACKET_TYPE_AUTH, 4, &auth, 0, &data->comm)) 97 pAuth = &auth;
|
| rpc_ek.c | 151 TPM_AUTH auth; local 161 if (getData(TCSD_PACKET_TYPE_AUTH, 1, &auth, 0, &data->comm)) 166 result = TCSP_OwnerReadPubek_Internal(hContext, &auth, &pubEKSize, &pubEK); 172 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) { 197 TPM_AUTH auth; local 204 if (getData(TCSD_PACKET_TYPE_AUTH, 1, &auth, 0, &data->comm)) 209 result = TCSP_DisablePubekRead_Internal(hContext, &auth); 215 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) {
|
| rpc_admin.c | 65 TPM_AUTH auth; local 75 if (getData(TCSD_PACKET_TYPE_AUTH, 1, &auth, 0, &data->comm)) 80 result = TCSP_DisableOwnerClear_Internal(hContext, &auth); 86 if (setData(TCSD_PACKET_TYPE_AUTH, 0, &auth, 0, &data->comm)) {
|
| /src/sys/external/bsd/drm/dist/bsd-core/ |
| drm_auth.c | 140 struct drm_auth *auth = data; local 144 auth->magic = file_priv->magic; 150 auth->magic = old+1; 152 if (!atomic_cmpset_int(&sequence, old, auth->magic)) 154 } while (drm_find_file(dev, auth->magic)); 155 file_priv->magic = auth->magic; 156 drm_add_magic(dev, file_priv, auth->magic); 160 DRM_DEBUG("%u\n", auth->magic); 171 struct drm_auth *auth = data; local 174 DRM_DEBUG("%u\n", auth->magic) [all...] |
| /src/crypto/external/bsd/openssh/bin/ssh/ |
| Makefile | 9 sshconnect.c sshconnect2.c mux.c auth.c auth-options.c 11 COPTS.auth.c= -DHOST_ONLY
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| mesh_rsn.h | 14 struct wpa_authenticator *auth; member in struct:mesh_rsn
|
| ibss_rsn.h | 18 /* we sent an AUTH message with seq 1 */ 40 struct wpa_state_machine *auth; member in struct:ibss_rsn_peer
|
| wps_supplicant.h | 23 const char *auth; member in struct:wps_new_ap_settings
|
| /src/lib/libpam/modules/pam_group/ |
| pam_group.c | 75 int pam_err, auth; local 96 auth = openpam_get_option(pamh, "authenticate") != NULL; 119 if (!auth) { 129 if (auth)
|
| /src/sys/external/bsd/drm2/dist/drm/ |
| drm_auth.c | 71 struct drm_auth *auth = data; local 82 auth->magic = file_priv->magic; 86 DRM_DEBUG("%u\n", auth->magic); 94 struct drm_auth *auth = data; local 97 DRM_DEBUG("%u\n", auth->magic); 100 file = idr_find(&file_priv->master->magic_map, auth->magic); 103 idr_replace(&file_priv->master->magic_map, NULL, auth->magic);
|
| /src/tests/rump/rumpkern/h_client/ |
| h_forkcli.c | 121 uint32_t *auth; local 128 auth = (void *)rf; 129 *(auth+3) = *(auth+3) ^ 0x1;
|
| /src/crypto/external/cpl/trousers/dist/src/include/ |
| authsess.h | 16 TPM_AUTH auth; member in struct:authsess
|