Lines Matching +refs:val +refs:current

1932  * call. in case of ACC, the host must be the initiator because its current
1991 * current state unchanged and mark itself as auth_initiator.
2885 bzero(un_cval.md5.val, sizeof (MD5_CVAL));
2886 bcopy((void *)tmp, (void *)un_cval.md5.val,
2902 bzero(un_cval.sha1.val, sizeof (SHA1_CVAL));
2903 bcopy((void *)tmp, (void *)un_cval.sha1.val,
3347 bzero(un_cval.md5.val, LE_SWAP32(rsp_size));
3350 (void *)un_cval.md5.val,
3355 (void *)un_cval.md5.val,
3360 bzero(un_cval.sha1.val, LE_SWAP32(rsp_size));
3363 (void *)un_cval.sha1.val,
3368 (void *)un_cval.sha1.val,
5071 (unsigned char *)&(un_cval.md5.val[0]), MD5_LEN);
5099 (void *)&(un_cval.sha1.val[0]), SHA1_LEN);
5133 (void *)&(un_cval.md5.val[0]), MD5_LEN);
5175 (void *)&(un_cval.sha1.val[0]), SHA1_LEN);
5285 (unsigned char *)&(un_cval.md5.val[0]),
5316 (void *)&(un_cval.sha1.val[0]), SHA1_LEN);
5420 * C1:challenge received from the remote entity (g^x mod p): dh val
5461 (unsigned char *)&(un_cval.md5.val[0]), MD5_LEN);
5494 SHA1Update(&sha1ctx, (void *)&(un_cval.sha1.val[0]), SHA1_LEN);
6446 "hash_vf: val alloc failed (Non-NULL dh)");
6826 if (cfg[CFG_AUTH_ENABLE].current == 0) {
6835 if (port->vpi != 0 && cfg[CFG_AUTH_NPIV].current == 0) {
6854 if (!fabric_switch && cfg[CFG_AUTH_E2E].current == 0) {
7334 if (cfg[CFG_AUTH_ENABLE].current == 0) {
7341 if (port->vpi != 0 && cfg[CFG_AUTH_NPIV].current == 0) {
7354 if (!fabric_switch && cfg[CFG_AUTH_E2E].current == 0) {
7407 if (cfg[CFG_AUTH_ENABLE].current == 0) {
7412 if (port->vpi != 0 && cfg[CFG_AUTH_NPIV].current == 0) {
7421 if (!fabric_switch && cfg[CFG_AUTH_E2E].current == 0) {
7769 cfg[CFG_AUTH_TMO].current;
7771 cfg[CFG_AUTH_MODE].current;
7773 cfg[CFG_AUTH_BIDIR].current;
7775 (cfg[CFG_AUTH_TYPE].current & 0xF000) >> 12;
7777 (cfg[CFG_AUTH_TYPE].current & 0x0F00) >> 8;
7779 (cfg[CFG_AUTH_TYPE].current & 0x00F0) >> 4;
7781 (cfg[CFG_AUTH_TYPE].current & 0x000F);
7783 (cfg[CFG_AUTH_HASH].current & 0xF000) >> 12;
7785 (cfg[CFG_AUTH_HASH].current & 0x0F00) >> 8;
7787 (cfg[CFG_AUTH_HASH].current & 0x00F0) >> 4;
7789 (cfg[CFG_AUTH_HASH].current & 0x000F);
7791 (cfg[CFG_AUTH_GROUP].current & 0xF0000000) >> 28;
7793 (cfg[CFG_AUTH_GROUP].current & 0x0F000000) >> 24;
7795 (cfg[CFG_AUTH_GROUP].current & 0x00F00000) >> 20;
7797 (cfg[CFG_AUTH_GROUP].current & 0x000F0000) >> 16;
7799 (cfg[CFG_AUTH_GROUP].current & 0x0000F000) >> 12;
7801 (cfg[CFG_AUTH_GROUP].current & 0x00000F00) >> 8;
7803 (cfg[CFG_AUTH_GROUP].current & 0x000000F0) >> 4;
7805 (cfg[CFG_AUTH_GROUP].current & 0x0000000F);
7807 cfg[CFG_AUTH_INTERVAL].current;
8358 auth_cfg->authentication_timeout = cfg[CFG_AUTH_TMO].current;
8360 auth_cfg->authentication_timeout = cfg[CFG_AUTH_TMO].current;
8364 auth_cfg->authentication_mode = cfg[CFG_AUTH_MODE].current;
8366 auth_cfg->authentication_mode = cfg[CFG_AUTH_MODE].current;
8370 auth_cfg->bidirectional = cfg[CFG_AUTH_BIDIR].current;
8372 auth_cfg->bidirectional = cfg[CFG_AUTH_BIDIR].current;
8378 /* Set to current default */
8383 /* Set to current default */
8392 /* Set to current default */
8402 cfg[CFG_AUTH_INTERVAL].current;
8406 cfg[CFG_AUTH_INTERVAL].current;
9053 if (cfg[CFG_AUTH_ENABLE].current == 0) {
9132 if (cfg[CFG_AUTH_ENABLE].current == 0) {
9196 if (cfg[CFG_AUTH_ENABLE].current == 0) {
9317 if (cfg[CFG_AUTH_ENABLE].current == 0) {
9390 if (cfg[CFG_AUTH_ENABLE].current == 0) {
9461 if (cfg[CFG_AUTH_ENABLE].current == 0) {
9512 /* Check if current password should be checked */
9515 /* Verify current local password */
9534 * Make sure the new local pwd is not equal to the current
9566 /* Check if current password should be checked */
9569 /* Verify current remote password */
9588 * Make sure the new remote pwd is not equal to the current
9657 if (cfg[CFG_AUTH_ENABLE].current == 0) {
9738 if (cfg[CFG_AUTH_ENABLE].current == 0) {
9791 if (cfg[CFG_AUTH_ENABLE].current == 0) {