Home
last modified time | relevance | path

Searched full:authenticator (Results 1 – 25 of 332) sorted by relevance

12345678910>>...14

/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dser_auth.c33 k5_size_authenticator(krb5_authenticator *authenticator, size_t *sizep) in k5_size_authenticator() argument
48 if (authenticator != NULL) { in k5_size_authenticator()
52 if (authenticator->client) in k5_size_authenticator()
53 kret = k5_size_principal(authenticator->client, &required); in k5_size_authenticator()
58 if (!kret && authenticator->checksum) in k5_size_authenticator()
59 kret = k5_size_checksum(authenticator->checksum, &required); in k5_size_authenticator()
62 if (!kret && authenticator->subkey) in k5_size_authenticator()
63 kret = k5_size_keyblock(authenticator->subkey, &required); in k5_size_authenticator()
66 if (!kret && authenticator->authorization_data) { in k5_size_authenticator()
69 for (i=0; !kret && authenticator->authorization_data[i]; i++) { in k5_size_authenticator()
[all …]
H A Dmk_req_ext.c58 checksum specifies the checksum to be used in the authenticator.
101 request.authenticator.ciphertext.data = NULL; in krb5_mk_req_extended()
180 /* Generate authenticator */ in krb5_mk_req_extended()
209 /* encode the authenticator */ in krb5_mk_req_extended()
217 scratch, &request.authenticator))) in krb5_mk_req_extended()
243 if (request.authenticator.ciphertext.data) { in krb5_mk_req_extended()
244 (void) memset(request.authenticator.ciphertext.data, 0, in krb5_mk_req_extended()
245 request.authenticator.ciphertext.length); in krb5_mk_req_extended()
246 free(request.authenticator.ciphertext.data); in krb5_mk_req_extended()
357 /* Set *authdata_out to appropriate authenticator authdata for the request,
/freebsd/contrib/telnet/libtelnet/
H A Dauth-proto.h55 Authenticator *findauthenticator(int, int);
64 void auth_finished(Authenticator *, int);
80 int kerberos4_init(Authenticator *, int);
81 int kerberos4_send(Authenticator *);
82 void kerberos4_is(Authenticator *, unsigned char *, int);
83 void kerberos4_reply(Authenticator *, unsigned char *, int);
84 int kerberos4_status(Authenticator *, char *, int);
89 int kerberos5_init(Authenticator *, int);
90 int kerberos5_send_mutual(Authenticator *);
91 int kerberos5_send_oneway(Authenticator *);
[all …]
H A Dauth.c96 static Authenticator *authenticated = 0;
110 Authenticator authenticators[] = {
178 static Authenticator NoAuth = { 0, 0, 0, 0, 0, 0, 0, 0 };
183 Authenticator *
186 Authenticator *ap = authenticators; in findauthenticator()
196 Authenticator *ap = authenticators; in auth_init()
266 Authenticator *ap; in auth_onoff()
307 Authenticator *ap; in auth_status()
337 Authenticator *ap = authenticators; in auth_request()
374 Authenticator *ap; in auth_send()
[all …]
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A Dauth-proto.h59 Authenticator *findauthenticator (int, int);
63 void auth_finished (Authenticator *, int);
83 int unsafe_init (Authenticator *, int);
84 int unsafe_send (Authenticator *);
85 void unsafe_is (Authenticator *, unsigned char *, int);
86 void unsafe_reply (Authenticator *, unsigned char *, int);
87 int unsafe_status (Authenticator *, char *, int);
92 int sra_init (Authenticator *, int);
93 int sra_send (Authenticator *);
94 void sra_is (Authenticator *, unsigned char *, int);
[all …]
H A Dauth.c98 static Authenticator *authenticated = 0;
109 Authenticator authenticators[] = {
172 static Authenticator NoAuth = { 0 };
177 Authenticator *
180 Authenticator *ap = authenticators; in findauthenticator()
190 Authenticator *ap = authenticators; in auth_init()
260 Authenticator *ap; in auth_onoff()
301 Authenticator *ap; in auth_status()
331 Authenticator *ap = authenticators; in auth_request()
368 Authenticator *ap; in auth_send()
[all …]
/freebsd/contrib/libfido2/man/
H A Dfido_cbor_info_new.3184 functions return pointers to the authenticator attestation GUID,
252 length in bytes supported by the authenticator as reported in
274 If the attribute is not advertised by the authenticator, the
280 function returns the maximum length in bytes of an authenticator's
287 authenticator as reported in
290 If the attribute is not advertised by the authenticator, the
305 retries are handled internally by the authenticator and the
308 If the attribute is not advertised by the authenticator,
316 supported by the authenticator, as defined in the FIDO Registry of
326 If the attribute is not advertised by the authenticator, the
[all …]
H A Dfido_dev_enable_entattest.337 .Nd CTAP 2.1 configuration authenticator API
53 CTAP 2.1 authenticator.
62 instructs the authenticator to include uniquely identifying
77 authenticator level for all known credentials.
81 the authenticator do not allow protection of U2F credentials, the
82 U2F subsystem will be disabled by the authenticator.
125 supported by the authenticator can be obtained using
129 authenticator in response to a
H A Dfido2-assert.1109 signed by the authenticator.
132 signed by the authenticator.
154 Asks the authenticator for user presence to be enabled or disabled.
156 Asks the authenticator for user verification to be enabled or
171 will use FIDO2 if supported by the authenticator, and fallback to
175 user verification from the authenticator.
177 was signed by the authenticator.
227 authenticator data (base64 blob);
251 authenticator data (base64 blob);
275 obtain an assertion from an authenticator a
[all...]
H A Dfido_dev_largeblob_get.355 allows binary blobs residing on a CTAP 2.1 authenticator to be
82 CBOR array is opaque to the authenticator.
90 function retrieves the authenticator's
117 and inserts the result in the authenticator's
141 function retrieves the authenticator's
158 function retrieves the authenticator's
171 function sets the authenticator's
214 encryption key is transmitted in the clear, and an authenticator's
H A Dfido_assert_new.3187 only be returned by the authenticator if user verification was
188 performed by the authenticator and multiple resident/discoverable
201 functions return pointers to the CBOR-encoded and raw authenticator data,
203 count, and authenticator data flags of statement
218 user verification was performed by the authenticator.
258 The authenticator data and signature parts of an assertion
261 The authenticator data returned by
263 is a CBOR-encoded byte string, as obtained from the authenticator.
H A Dfido2-cred.169 When making a credential, the authenticator may require the user
131 level was signed by the authenticator as
141 signed by the authenticator.
174 will use FIDO2 if supported by the authenticator, and fallback to
179 was signed by the authenticator.
221 authenticator data (base64 blob);
251 authenticator data (base64 blob);
294 In the case of Basic Attestation, the validity of the authenticator's
H A Dfido_cred_new.3246 functions return pointers to the CBOR-encoded and raw authenticator
247 data, client data hash, ID, authenticator attestation GUID,
268 The authenticator data, x509 certificate, and signature parts of a
278 function returns the authenticator data flags of
283 function returns the authenticator data signature counter of
286 The authenticator data returned by
288 is a CBOR-encoded byte string, as obtained from the authenticator.
/freebsd/contrib/wpa/hostapd/
H A DREADME2 Authenticator and RADIUS authentication server
57 server for MAC address based access control, IEEE 802.1X Authenticator
59 Authenticator and dynamic TKIP/CCMP keying.
108 IEEE 802.1X uses elements called Supplicant, Authenticator, Port
111 Server. An access point includes an Authenticator that relays the packets
113 Port Access Entity (PAE) with Authenticator functionality for
118 between a Supplicant and an Authenticator are sent using EAP over LAN
119 (EAPOL) and the Authenticator relays these frames to the Authentication
122 Authenticator, in which case there is no need for additional protocol
131 frames to be passed between the Supplicant and the Authenticator even
[all …]
/freebsd/crypto/krb5/src/lib/krad/
H A Dpacket.c150 /* Generate a random authenticator field. */
169 /* Generate a response authenticator field. */
185 * authenticator and the secret at the end. */ in auth_generate_response()
226 /* Determine if a packet requires a Message-Authenticator attribute. */
231 * Message-Authenticator is required only on UDP and TCP connections. */ in requires_msgauth()
237 * Message-Authenticator is required in Access-Request packets and all in requires_msgauth()
245 /* Check if the packet has a Message-Authenticator attribute. */
253 /* Return the beginning of the Message-Authenticator attribute in pkt, or NULL
273 * Calculate the message authenticator MAC for pkt as specified in RFC 2869
274 * section 5.14, placing the result in mac_out. Use the provided authenticator
[all …]
/freebsd/crypto/heimdal/lib/krb5/
H A Dauth_context.c48 ALLOC(p->authenticator, 1); in krb5_auth_con_init()
49 if (!p->authenticator) { in krb5_auth_con_init()
54 memset (p->authenticator, 0, sizeof(*p->authenticator)); in krb5_auth_con_init()
72 krb5_free_authenticator(context, &auth_context->authenticator); in krb5_auth_con_free()
452 krb5_authenticator *authenticator) in krb5_auth_con_getauthenticator() argument
454 *authenticator = malloc(sizeof(**authenticator)); in krb5_auth_con_getauthenticator()
455 if (*authenticator == NULL) { in krb5_auth_con_getauthenticator()
460 copy_Authenticator(auth_context->authenticator, in krb5_auth_con_getauthenticator()
461 *authenticator); in krb5_auth_con_getauthenticator()
468 krb5_authenticator *authenticator) in krb5_free_authenticator() argument
[all …]
H A Drd_req.c73 Authenticator *authenticator, in decrypt_authenticator() argument
101 authenticator, &len); in decrypt_authenticator()
185 ad = auth_context->authenticator->authorization_data; in find_etypelist()
280 krb5_authenticator authenticator; in krb5_verify_authenticator_checksum() local
285 &authenticator); in krb5_verify_authenticator_checksum()
288 if(authenticator->cksum == NULL) { in krb5_verify_authenticator_checksum()
289 krb5_free_authenticator(context, &authenticator); in krb5_verify_authenticator_checksum()
294 krb5_free_authenticator(context, &authenticator); in krb5_verify_authenticator_checksum()
305 authenticator->cksum); in krb5_verify_authenticator_checksum()
308 krb5_free_authenticator(context, &authenticator); in krb5_verify_authenticator_checksum()
[all …]
H A Dbuild_ap_req.c41 krb5_data authenticator, in krb5_build_ap_req() argument
63 ap.authenticator.etype = enctype; in krb5_build_ap_req()
64 ap.authenticator.kvno = NULL; in krb5_build_ap_req()
65 ap.authenticator.cipher = authenticator; in krb5_build_ap_req()
/freebsd/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm_i.h2 * IEEE 802.1X-2004 Authenticator - EAPOL state machine (internal definitions)
25 * struct eapol_authenticator - Global EAPOL authenticator data
37 * struct eapol_state_machine - Per-Supplicant Authenticator state machines
64 /* Authenticator PAE state machine */
114 /* Authenticator Key Transmit state machine */
130 /* Authenticator Statistics Table */
147 /* EAPOL/AAA <-> EAP full authenticator interface */
/freebsd/contrib/wpa/src/radius/
H A Dradius.c230 { RADIUS_ATTR_MESSAGE_AUTHENTICATOR, "Message-Authenticator",
436 "WARNING: Could not add Message-Authenticator"); in radius_msg_add_msg_auth()
452 /* Use already added Message-Authenticator attribute */ in radius_msg_auth_pos()
456 /* Add a Message-Authenticator attribute */ in radius_msg_auth_pos()
497 os_memcpy(msg->hdr->authenticator, req_authenticator, in radius_msg_finish_srv()
498 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv()
512 md5_vector(4, addr, len, msg->hdr->authenticator); in radius_msg_finish_srv()
536 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp()
546 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) in radius_msg_finish_das_resp()
565 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); in radius_msg_finish_acct()
[all …]
/freebsd/crypto/openssh/
H A Dssh-keygen.1392 Download resident keys from a FIDO authenticator.
396 the first touched authenticator.
398 .Sx FIDO AUTHENTICATOR
490 When generating FIDO authenticator-backed keys, the options listed in the
491 .Sx FIDO AUTHENTICATOR
693 FIDO authenticator-hosted keys, overriding the default of using
1029 of user presence (e.g. by having the user touch the authenticator).
1030 This option only makes sense for the FIDO authenticator algorithms
1045 This option only makes sense for the FIDO authenticator algorithms
1069 .Sh FIDO AUTHENTICATOR
[all …]
/freebsd/contrib/wpa/src/wps/
H A Dwps_attr_process.c16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument
23 if (authenticator == NULL) { in wps_process_authenticator()
24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator()
31 "validating authenticator"); in wps_process_authenticator()
35 /* Authenticator = HMAC-SHA256_AuthKey(M_prev || M_curr*) in wps_process_authenticator()
36 * (M_curr* is M_curr without the Authenticator attribute) in wps_process_authenticator()
45 os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
46 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator()
/freebsd/crypto/heimdal/doc/
H A Dwhatis.texi92 Before sending a message to @var{B}, @var{A} creates an authenticator
99 contains the session key that the authenticator was encrypted with,
100 @var{B} can now also decrypt the authenticator. To verify that @var{A}
102 with that of the authenticator. If everything matches, @var{B} now
111 An impostor, @var{C} could steal the authenticator and the ticket as it
113 @var{A}. The address in the ticket and the authenticator was added to
117 authenticator, @var{C} does not have much time in which to mount the
139 authenticator. One typical procedure is to add one to the checksum,
/freebsd/contrib/libfido2/examples/
H A Dinfo.c165 * Auxiliary function to print an authenticator's AAGUID on stdout.
179 * Auxiliary function to print an authenticator's maximum message size on
189 * Auxiliary function to print an authenticator's maximum number of credentials
199 * Auxiliary function to print an authenticator's maximum credential ID length
209 * Auxiliary function to print the maximum size of an authenticator's
219 * Auxiliary function to print the authenticator's estimated number of
235 * authenticator.
244 * Auxiliary function to print the authenticator's preferred (platform)
254 * Auxiliary function to print an authenticator's firmware version on stdout.
H A DREADME.adoc54 was signed by the authenticator. The device's attestation certificate
76 authenticator. The -v option requests user verification and checks
77 whether the user verification bit was signed by the authenticator.
80 specified, a FIDO2 hmac-secret is requested from the authenticator,
97 If set, libfido2 will produce a log of its transactions with the authenticator.

12345678910>>...14