HomeSort by: relevance | last modified time | path
    Searched refs:auth_len (Results 1 - 20 of 20) sorted by relevancy

  /src/lib/libc/rpc/
svc_auth_unix.c 78 u_int auth_len; local
88 auth_len = (u_int)msg->rm_call.cb_cred.oa_length;
89 xdrmem_create(&xdrs, msg->rm_call.cb_cred.oa_base, auth_len,XDR_DECODE);
90 buf = XDR_INLINE(&xdrs, auth_len);
118 if ((5 + gid_len) * BYTES_PER_XDR_UNIT + str_len > auth_len) {
119 (void) printf("bad auth_len gid %ld str %ld auth %u\n",
120 (long)gid_len, (long)str_len, auth_len);
  /src/external/bsd/tcpdump/dist/
print-bfd.c 102 nd_uint8_t auth_len; member in struct:bfd_auth_header_t
192 uint8_t auth_type, auth_len; local
199 auth_len = GET_U_1(bfd_auth_header->auth_len);
202 auth_type, auth_len);
219 if (auth_len < AUTH_PASSWORD_FIELD_MIN_LEN ||
220 auth_len > AUTH_PASSWORD_FIELD_MAX_LEN) {
222 auth_len);
228 (void)nd_printn(ndo, pptr, auth_len - 3, NULL);
247 if (auth_len != AUTH_MD5_FIELD_LEN)
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
ikev2.c 523 u8 method, const u8 *auth, size_t auth_len)
538 size_t auth_len)
568 if (auth_len != prf->hash_len ||
569 os_memcmp_const(auth, auth_data, auth_len) != 0) {
572 auth, auth_len);
588 const u8 *auth, size_t auth_len)
597 if (auth_len < 4) {
605 auth_len -= 4;
608 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
613 auth_len);
    [all...]
  /src/external/bsd/wpa/dist/src/eap_server/
ikev2.c 589 u8 method, const u8 *auth, size_t auth_len)
604 size_t auth_len)
634 if (auth_len != prf->hash_len ||
635 os_memcmp_const(auth, auth_data, auth_len) != 0) {
638 auth, auth_len);
652 const u8 *auth, size_t auth_len)
661 if (auth_len < 4) {
669 auth_len -= 4;
672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
677 auth_len);
    [all...]
  /src/external/bsd/wpa/dist/src/eap_common/
eap_eke_common.c 411 os_memset(zeros, 0, sess->auth_len);
412 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len,
416 sess->shared_secret, sess->auth_len);
691 sess->ka, sess->auth_len);
693 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len,
709 sess->auth_len = eap_eke_auth_len(prf);
713 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 ||
eap_eke_common.h 75 int auth_len; member in struct:eap_eke_session
ikev2_common.h 307 size_t auth_len; member in struct:ikev2_payloads
ikev2_common.c 313 payloads->auth_len = pdatalen;
  /src/external/bsd/wpa/dist/src/ap/
wpa_auth_ft.c 64 * @auth_len: Length of authenticated TLVs in octets
76 const u8 *auth, const size_t auth_len,
81 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) };
87 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len);
480 const u8 *auth, const size_t auth_len,
484 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) };
491 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len);
532 size_t plain_len = 0, auth_len = 0; local
540 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0)
543 *packet_len = sizeof(u16) + auth_len + plain_len
916 size_t auth_len; member in struct:ft_remote_item
    [all...]
ieee802_11.c 7976 size_t nontx_profile_len, auth_len; local
7996 auth = wpa_auth_get_wpa_ie(bss->wpa_auth, &auth_len);
7998 rsn = get_ie(auth, auth_len, WLAN_EID_RSN);
8002 rsnx = get_ie(auth, auth_len, WLAN_EID_RSNX);
8106 size_t auth_len = 0; local
8150 auth = wpa_auth_get_wpa_ie(bss->wpa_auth, &auth_len);
8152 rsn = get_ie(auth, auth_len, WLAN_EID_RSN);
8158 rsnx = get_ie(auth, auth_len, WLAN_EID_RSNX);
  /src/sys/nfs/
nfs_iod.c 280 nfs_getauth(struct nfsmount *nmp, struct nfsreq *rep, kauth_cred_t cred, char **auth_str, int *auth_len, char *verf_str, int *verf_len, NFSKERBKEY_T key)
318 *auth_len = nmp->nm_authlen;
336 int *auth_len, char *verf_str, int verf_len)
368 *auth_len = 2 * NFSX_UNSIGNED;
nfs_clntsocket.c 512 int t1, s, error = 0, mrest_len, auth_len, auth_type; local
555 &auth_len, verf_str, verf_len)) {
557 &auth_len, verf_str, &verf_len, key);
618 auth_len = (((kauth_cred_ngroups(cred) > nmp->nm_numgrps) ?
622 m = nfsm_rpchead(cred, nmp->nm_flag, procnum, auth_type, auth_len,
nfs_subs.c 605 int auth_type, int auth_len, char *auth_str, int verf_len,
616 authsiz = nfsm_rndup(auth_len);
655 nfsm_build(tl, u_int32_t *, auth_len);
660 grpsiz = (auth_len >> 2) - 5;
666 siz = auth_len;
686 if ((siz = (nfsm_rndup(auth_len) - auth_len)) > 0) {
  /src/external/mpl/dhcp/dist/omapip/
protocol.c 164 unsigned auth_len; local
217 auth_len = 0;
227 status = omapi_connection_output_auth_length (c, &auth_len);
235 status = omapi_connection_put_uint32 (c, auth_len);
  /src/external/bsd/dhcpcd/dist/src/
dhcp.c 815 uint8_t *auth, auth_len; local
1101 auth_len = 0;
1113 auth_len = (uint8_t)alen;
1114 AREA_CHECK(auth_len);
1116 *p++ = auth_len;
1118 p += auth_len;
1241 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0)
1243 (uint8_t *)bootp, len, 4, type, auth, auth_len);
1267 size_t auth_len; local
1310 DHO_AUTHENTICATION, &auth_len);
3087 size_t auth_len; local
    [all...]
dhcp6.c 744 uint16_t auth_len; local
991 auth_len = 0;
1002 auth_len = (uint16_t)alen;
1003 len += sizeof(o) + auth_len;
1260 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0) {
1261 COPYIN1(D6_OPTION_AUTH, auth_len);
3471 uint16_t auth_len; local
3520 auth = dhcp6_findmoption(r, len, D6_OPTION_AUTH, &auth_len);
3523 (uint8_t *)r, len, 6, r->type, auth, auth_len) == NULL)
  /src/sys/dev/pci/qat/
qat_hw15reg.h 621 uint32_t auth_len; member in struct:fw_la_auth_req_params
qat_hw17.c 525 auth_param->auth_len = crda->crd_len;
qat_hw17reg.h 1907 uint32_t auth_len; member in struct:fw_la_auth_req_params
qat_hw15.c 793 auth_req->auth_len = crda->crd_len;

Completed in 193 milliseconds