Home
last modified time | relevance | path

Searched +full:common +full:- +full:auth (Results 1 – 25 of 390) sorted by relevance

12345678910>>...16

/freebsd/usr.sbin/ctld/
H A Dctl.conf.547 .Bd -literal -offset indent
50 .No auth-group Ar name No {
55 .No portal-group Ar name No {
57 .\".Dl listen-iser Ar address
58 .Dl discovery-auth-group Ar name
62 .No transport-group Ar name No {
68 .Dl auth-group Ar name
69 .Dl portal-group Ar name
77 .Dl auth-group Ar name
78 .Dl transport-group Ar name
[all …]
/freebsd/secure/libexec/sshd-auth/
H A DMakefile4 PROG= sshd-auth
5 SRCS= sshd-auth.c \
6 auth2-methods.c \
7 auth-rhosts.c auth-passwd.c sshpty.c sshlogin.c servconf.c \
8 serverloop.c auth.c auth2.c auth-options.c session.c auth2-chall.c \
9 groupaccess.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
10 auth2-none.c auth2-passwd.c auth2-pubkey.c auth2-pubkeyfile.c \
11 auth2-gss.c gss-serv.c gss-serv-krb5.c \
12 monitor_wrap.c auth-krb5.c \
13 audit.c audit-bsm.c audit-linux.c platform.c \
[all …]
/freebsd/sys/dev/qat_c2xxx/
H A Dqat_hw15reg.h1 /* SPDX-License-Identifier: BSD-2-Clause AND BSD-3-Clause */
31 * Copyright(c) 2007-2013 Intel Corporation. All rights reserved.
72 /* -------------------------------------------------------------------------- */
91 /* QAT-AE Service Request Type IDs - 01 to 20 */
92 ARCH_IF_REQ_QAT_FW_INIT, /* QAT-FW Initialization Request */
93 ARCH_IF_REQ_QAT_FW_ADMIN, /* QAT-FW Administration Request */
94 ARCH_IF_REQ_QAT_FW_PKE, /* QAT-FW PKE Request */
95 ARCH_IF_REQ_QAT_FW_LA, /* QAT-FW Lookaside Request */
96 ARCH_IF_REQ_QAT_FW_IPSEC, /* QAT-FW IPSec Request */
97 ARCH_IF_REQ_QAT_FW_SSL, /* QAT-FW SSL Request */
[all …]
/freebsd/secure/libexec/sshd-session/
H A DMakefile4 PROG= sshd-session
5 SRCS= sshd-session.c auth-rhosts.c auth-passwd.c \
6 audit.c audit-bsm.c audit-linux.c platform.c \
8 auth.c auth2.c auth2-methods.c auth-options.c session.c \
9 auth2-chall.c groupaccess.c \
10 auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
11 auth2-none.c auth2-passwd.c auth2-pubkey.c auth2-pubkeyfile.c \
12 monitor.c monitor_wrap.c auth-krb5.c \
13 auth2-gss.c gss-serv.c gss-serv-krb5.c \
14 loginrec.c auth-pam.c auth-shadow.c auth-sia.c \
[all …]
/freebsd/contrib/wpa/wpa_supplicant/
H A Dibss_rsn.c2 * wpa_supplicant - IBSS RSN
3 * Copyright (c) 2009-2013, Jouni Malinen <j@w1.fi>
11 #include "common.h"
12 #include "common/wpa_ctrl.h"
20 #include "common/ieee802_11_defs.h"
32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer()
33 if (ether_addr_equal(addr, peer->addr)) in ibss_rsn_get_peer()
42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free()
43 wpa_sm_deinit(peer->supp); in ibss_rsn_free()
51 peer->supp_state = state; in supp_set_state()
[all …]
H A Dwpa_priv.c3 * Copyright (c) 2007-2009, Jouni Malinen <j@w1.fi>
16 #include "common.h"
18 #include "common/version.h"
21 #include "common/privsep_commands.h"
22 #include "common/ieee802_11_defs.h"
61 if (iface->drv_priv) { in wpa_priv_cmd_register()
63 if (iface->driver->deinit) in wpa_priv_cmd_register()
64 iface->driver->deinit(iface->drv_priv); in wpa_priv_cmd_register()
65 iface->drv_priv = NULL; in wpa_priv_cmd_register()
66 if (iface->drv_global_priv) { in wpa_priv_cmd_register()
[all …]
H A Dpasn_supplicant.c2 * wpa_supplicant - PASN processing
12 #include "common/ieee802_11_defs.h"
13 #include "common/ieee802_11_common.h"
14 #include "common/dragonfly.h"
15 #include "common/ptksa_cache.h"
53 wpabuf_free(awork->comeback); in wpas_pasn_free_auth_work()
54 awork->comeback = NULL; in wpas_pasn_free_auth_work()
63 wpa_printf(MSG_DEBUG, "PASN: Auth work timeout - stopping auth"); in wpas_pasn_auth_work_timeout()
73 wpa_printf(MSG_DEBUG, "PASN: Cancel pasn-start-auth work"); in wpas_pasn_cancel_auth_work()
76 radio_remove_works(wpa_s, "pasn-start-auth", 0); in wpas_pasn_cancel_auth_work()
[all …]
/freebsd/sys/dev/qat/qat_api/firmware/include/
H A Dicp_qat_fw_la.h1 /* SPDX-License-Identifier: BSD-3-Clause */
2 /* Copyright(c) 2007-2025 Intel Corporation */
43 /*!< Auth Request */
46 /*!< Cipher-Hash Request */
49 /*!< Hash-Cipher Request */
70 /*!< Auth Pre-Compute Request */
73 /*!< Auth Pre-Compute Request */
103 /**< LWs 16-19 */
122 /**< LW 22 - 23 */
124 /**< LW 24 - 25 */
[all …]
/freebsd/contrib/wpa/src/ap/
H A Dpreauth_auth.c2 * hostapd - Authenticator for IEEE 802.11i RSN pre-authentication
3 * Copyright (c) 2004-2007, Jouni Malinen <j@w1.fi>
13 #include "utils/common.h"
16 #include "common/wpa_common.h"
27 #define ETH_P_PREAUTH 0x88C7 /* IEEE 802.11i pre-authentication */
45 struct hostapd_data *hapd = piface->hapd; in rsn_preauth_receive()
50 wpa_printf(MSG_DEBUG, "RSN: receive pre-auth packet " in rsn_preauth_receive()
51 "from interface '%s'", piface->ifname); in rsn_preauth_receive()
53 wpa_printf(MSG_DEBUG, "RSN: too short pre-auth packet " in rsn_preauth_receive()
61 if (!ether_addr_equal(ethhdr->h_dest, hapd->own_addr)) { in rsn_preauth_receive()
[all …]
H A Dieee802_11_eht.c3 * Copyright (c) 2021-2022, Qualcomm Innovation Center, Inc.
10 #include "utils/common.h"
71 if (he_oper_chwidth != -1) in ieee80211_eht_mcs_set_size()
116 mode = hapd->iface->current_mode; in hostapd_eid_eht_capab_len()
120 eht_cap = &mode->eht_capab[opmode]; in hostapd_eid_eht_capab_len()
121 if (!eht_cap->eht_supported) in hostapd_eid_eht_capab_len()
124 len += ieee80211_eht_mcs_set_size(mode->mode, hapd->iconf->op_class, in hostapd_eid_eht_capab_len()
125 hapd->iconf->he_oper_chwidth, in hostapd_eid_eht_capab_len()
126 mode->he_capab[opmode].phy_cap, in hostapd_eid_eht_capab_len()
127 eht_cap->phy_cap); in hostapd_eid_eht_capab_len()
[all …]
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A DMakefile.am3 include $(top_srcdir)/Makefile.am.common
5 AM_CPPFLAGS += -I$(srcdir)/.. $(INCLUDE_hcrypto)
10 auth-proto.h \
11 auth.c \
12 auth.h \
13 enc-proto.h \
19 misc-proto.h \
H A Drsaencpwd.c1 /*-
68 * 94065, (415)595-8782, or from DIGITAL"
86 #include "auth.h"
106 static KTEXT_ST auth; variable
124 if (c == -1)
135 *p++ = ap->type;
136 *p++ = ap->way;
138 while (c-- > 0) {
145 printsub('>', &str_data[2], p - (&str_data[2]));
146 return(telnet_net_write(str_data, p - str_data));
[all …]
/freebsd/contrib/wpa/src/pasn/
H A Dpasn_initiator.c13 #include "utils/common.h"
14 #include "common/wpa_common.h"
15 #include "common/sae.h"
16 #include "common/ieee802_11_common.h"
17 #include "common/ieee802_11_defs.h"
18 #include "common/dragonfly.h"
33 pasn->pmksa = pmksa; in pasn_set_initiator_pmksa()
44 ret = sae_set_group(&pasn->sae, pasn->group); in wpas_pasn_wd_sae_commit()
50 ret = sae_prepare_commit_pt(&pasn->sae, pasn->pt, in wpas_pasn_wd_sae_commit()
51 pasn->own_addr, pasn->peer_addr, in wpas_pasn_wd_sae_commit()
[all …]
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/
H A Dlac_session.h1 /* SPDX-License-Identifier: BSD-3-Clause */
2 /* Copyright(c) 2007-2025 Intel Corporation */
27 * \ref cpaCySymSessionCtxGetSize(). Internally this memory is re-aligned on a
33 * <b>LAC Session Init</b>\n The session descriptor is re-aligned and
59 * - The perform function increments the reference count for the session.
60 * - The callback function decrements the reference count for the session.
61 * - The Remove function checks the reference count to ensure that it is 0.
64 * - \ref LacMem "Memory" - Inline memory functions
65 * - QatUtils: logging, locking & virt to phys translations.
83 * Common alignment attributes to ensure
[all …]
/freebsd/contrib/wpa/src/crypto/
H A Daes-ccm.c2 * Counter with CBC-MAC (CCM) with AES
4 * Copyright (c) 2010-2012, Jouni Malinen <j@w1.fi>
12 #include "common.h"
38 b[0] |= (((M - 2) / 2) /* M' */ << 3); in aes_ccm_auth_start()
39 b[0] |= (L - 1) /* L' */; in aes_ccm_auth_start()
40 os_memcpy(&b[1], nonce, 15 - L); in aes_ccm_auth_start()
41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start()
51 os_memset(aad_buf + 2 + aad_len, 0, sizeof(aad_buf) - 2 - aad_len); in aes_ccm_auth_start()
56 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start()
76 /* XOR zero-padded last block */ in aes_ccm_auth()
[all …]
/freebsd/contrib/wpa/src/common/
H A Ddpp_auth.c4 * Copyright (c) 2018-2020, The Linux Foundation
12 #include "utils/common.h"
13 #include "common/ieee802_11_common.h"
14 #include "common/wpa_ctrl.h"
34 wpa_printf(MSG_DEBUG, "DPP: I-Bootstrap Key Hash"); in dpp_build_attr_i_bootstrap_key_hash()
42 static void dpp_auth_success(struct dpp_authentication *auth) in dpp_auth_success() argument
45 "DPP: Authentication success - clear temporary keys"); in dpp_auth_success()
46 os_memset(auth->Mx, 0, sizeof(auth->Mx)); in dpp_auth_success()
47 auth->Mx_len = 0; in dpp_auth_success()
48 os_memset(auth->Nx, 0, sizeof(auth->Nx)); in dpp_auth_success()
[all …]
H A Ddpp_tcp.c3 * Copyright (c) 2019-2020, The Linux Foundation
4 * Copyright (c) 2021-2022, Qualcomm Innovation Center, Inc.
13 #include "utils/common.h"
16 #include "common/ieee802_11_common.h"
17 #include "common/wpa_ctrl.h"
29 struct dpp_authentication *auth; member
32 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth);
34 bool (*tcp_msg_sent)(void *ctx, struct dpp_authentication *auth);
86 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth);
87 bool (*tcp_msg_sent)(void *ctx, struct dpp_authentication *auth);
[all …]
/freebsd/contrib/telnet/libtelnet/
H A Dkerberos.c1 /*-
64 #include "auth.h"
78 #define KRB_CHALLENGE 3 /* Challenge for mutual auth. */
79 #define KRB_RESPONSE 4 /* Response for mutual auth. */
81 static KTEXT_ST auth; variable
99 if (c == -1) in Data()
110 *p++ = ap->type; in Data()
111 *p++ = ap->way; in Data()
113 while (c-- > 0) { in Data()
120 printsub('>', &str_data[2], p - (&str_data[2])); in Data()
[all …]
H A Dkrb4encpwd.c1 /*-
65 * 94065, (415)595-8782, or from DIGITAL"
79 #include "auth.h"
95 #define KRB4_ENCPWD_CHALLENGE 3 /* Challenge for mutual auth. */
100 static KTEXT_ST auth; variable
119 if (c == -1)
130 *p++ = ap->type;
131 *p++ = ap->way;
133 while (c-- > 0) {
140 printsub('>', &str_data[2], p - (&str_data[2]));
[all …]
H A Drsaencpwd.c1 /*-
65 * 94065, (415)595-8782, or from DIGITAL"
77 #include "auth.h"
97 static KTEXT_ST auth; variable
115 if (c == -1)
126 *p++ = ap->type;
127 *p++ = ap->way;
129 while (c-- > 0) {
136 printsub('>', &str_data[2], p - (&str_data[2]));
137 return(net_write(str_data, p - str_data));
[all …]
/freebsd/crypto/openssh/
H A DMakefile.in23 ASKPASS_PROGRAM=$(libexecdir)/ssh-askpass
24 SFTP_SERVER=$(libexecdir)/sftp-server
25 SSH_KEYSIGN=$(libexecdir)/ssh-keysign
26 SSHD_SESSION=$(libexecdir)/sshd-session
27 SSHD_AUTH=$(libexecdir)/sshd-auth
28 SSH_PKCS11_HELPER=$(libexecdir)/ssh-pkcs11-helper
29 SSH_SK_HELPER=$(libexecdir)/ssh-sk-helper
37 PATHS= -DSSHDIR=\"$(sysconfdir)\" \
38 -D_PATH_SSH_PROGRAM=\"$(SSH_PROGRAM)\" \
39 -D_PATH_SSH_ASKPASS_DEFAULT=\"$(ASKPASS_PROGRAM)\" \
[all …]
/freebsd/contrib/blocklist/diff/
H A Dssh.diff1 --- /dev/null 2015-01-22 23:10:33.000000000 -0500
2 +++ dist/pfilter.c 2015-01-22 23:46:03.000000000 -0500
3 @@ -0,0 +1,32 @@
36 --- /dev/null 2015-01-20 21:14:44.000000000 -0500
37 +++ dist/pfilter.h 2015-01-20 20:16:20.000000000 -0500
38 @@ -0,0 +1,3 @@
46 diff -u -u -r1.10 Makefile
47 --- bin/sshd/Makefile 19 Oct 2014 16:30:58 -0000 1.10
48 +++ bin/sshd/Makefile 22 Jan 2015 21:39:21 -0000
49 @@ -15,7 +15,7 @@
[all …]
/freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/nfs/
H A Dtst.call.c5 * Common Development and Distribution License (the "License").
56 AUTH *auth; in dotest() local
76 auth = authsys_create_default(); in dotest()
77 client->cl_auth = auth; in dotest()
/freebsd/contrib/pam-krb5/docs/
H A Ddocknot.yaml1 # Package metadata for pam-krb5.
10 # Copyright 2017, 2020-2021 Russ Allbery <eagle@eyrie.org>
12 # SPDX-License-Identifier: BSD-3-clause or GPL-1+
16 name: pam-krb5
22 name: BSD-3-clause-or-GPL-1+
24 - holder: Russ Allbery <eagle@eyrie.org>
25 years: 2005-2010, 2014-2015, 2017, 2020-2021
26 - holder: The Board of Trustees of the Leland Stanford Junior University
27 years: 2009-2011
28 - holder: Andres Salomon <dilinger@debian.org>
[all …]
/freebsd/contrib/wpa/src/drivers/
H A Ddriver_privsep.c2 * WPA Supplicant - privilege separated driver interface
3 * Copyright (c) 2007-2009, Jouni Malinen <j@w1.fi>
12 #include "common.h"
15 #include "common/privsep_commands.h"
34 res = sendto(drv->priv_socket, &cmd, sizeof(cmd), 0, in wpa_priv_reg_cmd()
35 (struct sockaddr *) &drv->priv_addr, in wpa_priv_reg_cmd()
36 sizeof(drv->priv_addr)); in wpa_priv_reg_cmd()
39 return res < 0 ? -1 : 0; in wpa_priv_reg_cmd()
58 msg.msg_name = &drv->priv_addr; in wpa_priv_cmd()
59 msg.msg_namelen = sizeof(drv->priv_addr); in wpa_priv_cmd()
[all …]

12345678910>>...16