| /src/lib/libc/rpc/ |
| svc_auth_unix.c | 78 u_int auth_len; local 88 auth_len = (u_int)msg->rm_call.cb_cred.oa_length; 89 xdrmem_create(&xdrs, msg->rm_call.cb_cred.oa_base, auth_len,XDR_DECODE); 90 buf = XDR_INLINE(&xdrs, auth_len); 118 if ((5 + gid_len) * BYTES_PER_XDR_UNIT + str_len > auth_len) { 119 (void) printf("bad auth_len gid %ld str %ld auth %u\n", 120 (long)gid_len, (long)str_len, auth_len);
|
| /src/external/bsd/tcpdump/dist/ |
| print-bfd.c | 102 nd_uint8_t auth_len; member in struct:bfd_auth_header_t 192 uint8_t auth_type, auth_len; local 199 auth_len = GET_U_1(bfd_auth_header->auth_len); 202 auth_type, auth_len); 219 if (auth_len < AUTH_PASSWORD_FIELD_MIN_LEN || 220 auth_len > AUTH_PASSWORD_FIELD_MAX_LEN) { 222 auth_len); 228 (void)nd_printn(ndo, pptr, auth_len - 3, NULL); 247 if (auth_len != AUTH_MD5_FIELD_LEN) [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| ikev2.c | 523 u8 method, const u8 *auth, size_t auth_len) 538 size_t auth_len) 568 if (auth_len != prf->hash_len || 569 os_memcmp_const(auth, auth_data, auth_len) != 0) { 572 auth, auth_len); 588 const u8 *auth, size_t auth_len) 597 if (auth_len < 4) { 605 auth_len -= 4; 608 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 613 auth_len); [all...] |
| /src/external/bsd/wpa/dist/src/eap_server/ |
| ikev2.c | 589 u8 method, const u8 *auth, size_t auth_len) 604 size_t auth_len) 634 if (auth_len != prf->hash_len || 635 os_memcmp_const(auth, auth_data, auth_len) != 0) { 638 auth, auth_len); 652 const u8 *auth, size_t auth_len) 661 if (auth_len < 4) { 669 auth_len -= 4; 672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 677 auth_len); [all...] |
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_eke_common.c | 411 os_memset(zeros, 0, sess->auth_len); 412 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, 416 sess->shared_secret, sess->auth_len); 691 sess->ka, sess->auth_len); 693 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, 709 sess->auth_len = eap_eke_auth_len(prf); 713 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 ||
|
| eap_eke_common.h | 75 int auth_len; member in struct:eap_eke_session
|
| ikev2_common.h | 307 size_t auth_len; member in struct:ikev2_payloads
|
| ikev2_common.c | 313 payloads->auth_len = pdatalen;
|
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth_ft.c | 64 * @auth_len: Length of authenticated TLVs in octets 76 const u8 *auth, const size_t auth_len, 81 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; 87 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); 480 const u8 *auth, const size_t auth_len, 484 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; 491 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); 532 size_t plain_len = 0, auth_len = 0; local 540 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0) 543 *packet_len = sizeof(u16) + auth_len + plain_len 916 size_t auth_len; member in struct:ft_remote_item [all...] |
| ieee802_11.c | 7976 size_t nontx_profile_len, auth_len; local 7996 auth = wpa_auth_get_wpa_ie(bss->wpa_auth, &auth_len); 7998 rsn = get_ie(auth, auth_len, WLAN_EID_RSN); 8002 rsnx = get_ie(auth, auth_len, WLAN_EID_RSNX); 8106 size_t auth_len = 0; local 8150 auth = wpa_auth_get_wpa_ie(bss->wpa_auth, &auth_len); 8152 rsn = get_ie(auth, auth_len, WLAN_EID_RSN); 8158 rsnx = get_ie(auth, auth_len, WLAN_EID_RSNX);
|
| /src/sys/nfs/ |
| nfs_iod.c | 280 nfs_getauth(struct nfsmount *nmp, struct nfsreq *rep, kauth_cred_t cred, char **auth_str, int *auth_len, char *verf_str, int *verf_len, NFSKERBKEY_T key) 318 *auth_len = nmp->nm_authlen; 336 int *auth_len, char *verf_str, int verf_len) 368 *auth_len = 2 * NFSX_UNSIGNED;
|
| nfs_clntsocket.c | 512 int t1, s, error = 0, mrest_len, auth_len, auth_type; local 555 &auth_len, verf_str, verf_len)) { 557 &auth_len, verf_str, &verf_len, key); 618 auth_len = (((kauth_cred_ngroups(cred) > nmp->nm_numgrps) ? 622 m = nfsm_rpchead(cred, nmp->nm_flag, procnum, auth_type, auth_len,
|
| nfs_subs.c | 605 int auth_type, int auth_len, char *auth_str, int verf_len, 616 authsiz = nfsm_rndup(auth_len); 655 nfsm_build(tl, u_int32_t *, auth_len); 660 grpsiz = (auth_len >> 2) - 5; 666 siz = auth_len; 686 if ((siz = (nfsm_rndup(auth_len) - auth_len)) > 0) {
|
| /src/external/mpl/dhcp/dist/omapip/ |
| protocol.c | 164 unsigned auth_len; local 217 auth_len = 0; 227 status = omapi_connection_output_auth_length (c, &auth_len); 235 status = omapi_connection_put_uint32 (c, auth_len);
|
| /src/external/bsd/dhcpcd/dist/src/ |
| dhcp.c | 815 uint8_t *auth, auth_len; local 1101 auth_len = 0; 1113 auth_len = (uint8_t)alen; 1114 AREA_CHECK(auth_len); 1116 *p++ = auth_len; 1118 p += auth_len; 1241 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0) 1243 (uint8_t *)bootp, len, 4, type, auth, auth_len); 1267 size_t auth_len; local 1310 DHO_AUTHENTICATION, &auth_len); 3087 size_t auth_len; local [all...] |
| dhcp6.c | 744 uint16_t auth_len; local 991 auth_len = 0; 1002 auth_len = (uint16_t)alen; 1003 len += sizeof(o) + auth_len; 1260 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0) { 1261 COPYIN1(D6_OPTION_AUTH, auth_len); 3471 uint16_t auth_len; local 3520 auth = dhcp6_findmoption(r, len, D6_OPTION_AUTH, &auth_len); 3523 (uint8_t *)r, len, 6, r->type, auth, auth_len) == NULL)
|
| /src/sys/dev/pci/qat/ |
| qat_hw15reg.h | 621 uint32_t auth_len; member in struct:fw_la_auth_req_params
|
| qat_hw17.c | 525 auth_param->auth_len = crda->crd_len;
|
| qat_hw17reg.h | 1907 uint32_t auth_len; member in struct:fw_la_auth_req_params
|
| qat_hw15.c | 793 auth_req->auth_len = crda->crd_len;
|