Home
last modified time | relevance | path

Searched +full:common +full:- +full:session (Results 1 – 25 of 458) sorted by relevance

12345678910>>...19

/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/
H A Dlac_session.h1 /* SPDX-License-Identifier: BSD-3-Clause */
2 /* Copyright(c) 2007-2025 Intel Corporation */
8 * @defgroup LacSym_Session Session
12 * Definition of symmetric session descriptor structure
17 * A session is required for each symmetric operation. The session descriptor
18 * holds information about the session from when the session is initialised to
19 * when the session is removed. The session descriptor is used in the
21 * receiving the response. The session descriptor and any other state
26 * The user allocates the memory for the session using the size returned from
27 * \ref cpaCySymSessionCtxGetSize(). Internally this memory is re-aligned on a
[all …]
H A Dlac_sym.h1 /* SPDX-License-Identifier: BSD-3-Clause */
2 /* Copyright(c) 2007-2025 Intel Corporation */
19 * the appropriate sub-components: cipher, hash, algorithm chaining and
20 * authentication encryption. It is a common layer between the above
21 * mentioned components where common resources are allocated and parameter
23 * checks are done in the sub-component itself.
25 * The symmetric component demultiplexes the session register/deregister
29 * - \ref LacSymPartial "Partial Packet Code": This code manages the partial
30 * packet state for a session.
31 * - \ref LacBufferDesc "Common Buffer Code" : This code traverses a buffer
[all …]
H A Dlac_sym_cipher.h1 /* SPDX-License-Identifier: BSD-3-Clause */
2 /* Copyright(c) 2007-2025 Intel Corporation */
19 * their basic operation and does some common parameter checking and deals
20 * with accesses to the session table.
23 * and Triple-DES cipher algorithms, in ECB, CBC and CTR modes. The ARC4 stream
26 * written back to the source buffer (in-place) or to a separate output buffer
27 * (out-of-place). Data must be encapsulated in ICP buffers.
29 * The cipher component is responsible for implementing the cipher-specific
30 * functionality for registering and de-registering a session, for the perform
38 * - \ref LacCommon
[all …]
H A Dlac_sym_qat_cipher.h1 /* SPDX-License-Identifier: BSD-3-Clause */
2 /* Copyright(c) 2007-2025 Intel Corporation */
55 * This function returns a hard-coded block size for the specific cipher
58 * @param[in] cipherAlgorithm Cipher algorithm for the current session
72 * This function returns a hard-coded IV/state size for the specific cipher
75 * @param[in] cipherAlgorithm Cipher algorithm for the current session
91 * - the cipher fields of the req_params block in the request. No
93 * - the corresponding CIPH_IV_FLD flag in the serv_specif_flags field
94 * of the common header.
98 * - cd_ctrl.cipher_state_sz
[all …]
H A Dlac_sym_alg_chain.h1 /* SPDX-License-Identifier: BSD-3-Clause */
2 /* Copyright(c) 2007-2025 Intel Corporation */
17 * This is the LAC Algorithm-Chaining feature component. This component
18 * implements session registration and cleanup functions, and a perform
23 * incorporates support for Authenticated-Encryption (CCM and GCM) which
34 * the algChainOrder field in the session context. This ordering choice is
35 * stored as part of the session descriptor, so that it is known when a
36 * perform request is issued. In the case of Authenticated-Encryption, the
39 * When building a content descriptor, as part of session registration, this
41 * parts of the session descriptor. The key aspect here is to provide the
[all …]
/freebsd/share/man/man4/
H A Dng_pppoe.41 .\" Copyright (c) 1996-1999 Whistle Communications, Inc.
19 .\" MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
68 .Bl -tag -width ".Va [unspecified]"
81 Any other name is assumed to be a session hook that will be connected to
86 .Bl -tag -width 3n
90 .Bd -literal -offset 4n
97 This generic message returns a human-readable version of the node status.
100 Tell a nominated newly created hook that its session should enter
103 It is legal to specify a zero-length service name, this is common
106 and/or set a specific Host-Uniq tag, required by some Internet providers,
[all …]
/freebsd/contrib/pam-krb5/docs/
H A Ddocknot.yaml1 # Package metadata for pam-krb5.
10 # Copyright 2017, 2020-2021 Russ Allbery <eagle@eyrie.org>
12 # SPDX-License-Identifier: BSD-3-clause or GPL-1+
16 name: pam-krb5
22 name: BSD-3-clause-or-GPL-1+
24 - holder: Russ Allbery <eagle@eyrie.org>
25 years: 2005-2010, 2014-2015, 2017, 2020-2021
26 - holder: The Board of Trustees of the Leland Stanford Junior University
27 years: 2009-2011
28 - holder: Andres Salomon <dilinger@debian.org>
[all …]
/freebsd/contrib/bearssl/src/ssl/
H A Dssl_hs_server.t023 \ ----------------------------------------------------------------------
25 \ The common T0 code (ssl_hs_common.t0) shall be read first.
40 * Decrypt the pre-master secret (RSA key exchange).
52 x = (*ctx->policy_vtable)->do_keyx(ctx->policy_vtable, epms, &len);
61 br_enc16be(epms, ctx->client_max_version);
65 * decryption failed. Note that we use a constant-time conditional
68 br_hmac_drbg_generate(&ctx->eng.rng, rpms, sizeof rpms);
74 br_ssl_engine_compute_master(&ctx->eng, prf_id, epms, 48);
77 * Clear the pre-master secret from RAM: it is normally a buffer
78 * in the context, hence potentially long-lived.
[all …]
/freebsd/contrib/pam-krb5/
H A DREADME.md1 # pam-krb5
4 status](https://github.com/rra/pam-krb5/workflows/build/badge.svg)](https://github.com/rra/pam-krb5…
6 package](https://img.shields.io/debian/v/libpam-krb5/unstable)](https://tracker.debian.org/pkg/libp…
8 Copyright 2005-2010, 2014-2015, 2017, 2020-2021 Russ Allbery
9 <eagle@eyrie.org>. Copyright 2009-2011 The Board of Trustees of the
11 <dilinger@debian.org>. Copyright 1999-2000 Frank Cusack
12 <fcusack@fcusack.com>. This software is distributed under a BSD-style
18 pam-krb5 is a Kerberos PAM module for either MIT Kerberos or Heimdal. It
20 handling, authentication of non-local accounts for network services,
30 pam-krb5 provides a Kerberos PAM module that supports authentication, user
[all …]
H A DREADME1 pam-krb5 4.11
5 Copyright 2005-2010, 2014-2015, 2017, 2020-2021 Russ Allbery
6 <eagle@eyrie.org>. Copyright 2009-2011 The Board of Trustees of the
8 <dilinger@debian.org>. Copyright 1999-2000 Frank Cusack
9 <fcusack@fcusack.com>. This software is distributed under a BSD-style
14 pam-krb5 is a Kerberos PAM module for either MIT Kerberos or Heimdal.
16 authorization handling, authentication of non-local accounts for network
26 pam-krb5 provides a Kerberos PAM module that supports authentication,
31 and it tries to work around PAM implementation flaws in commonly-used
32 PAM-enabled applications such as OpenSSH and xdm. It supports both
[all …]
/freebsd/contrib/openpam/doc/man/
H A Dpam.man3 of common authentication-related operations and provides a framework
18 a session.
22 session management and password management.
58 functions manage named chunks of free-form data, generally used by
71 time-of-day restrictions, and so forth.
72 .Ss Session Management
77 functions handle session setup and teardown.
91 session.
H A Dpam.364 of common authentication-related operations and provides a framework
79 a session.
83 session management and password management.
119 functions manage named chunks of free-form data, generally used by
132 time-of-day restrictions, and so forth.
133 .Ss Session Management
138 functions handle session setup and teardown.
152 session.
161 .Bl -tag -width 18n
219 Session failure.
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_set_tlsext_ticket_key_cb.31 .\" -*- mode: troff; coding: utf-8 -*-
58 .TH SSL_CTX_SET_TLSEXT_TICKET_KEY_CB 3ossl 2025-09-30 3.5.4 OpenSSL
66 \&\- set a callback for session ticket processing
91 session tickets for the ssl context \fIsslctx\fR. Session tickets, defined in
92 RFC5077 provide an enhanced session resumption capability where the server
93 implementation is not required to maintain per session state. It only applies
97 session when session ticket extension is presented in the TLS hello
101 The OpenSSL library uses your callback function to help implement a common TLS
102 ticket construction state according to RFC5077 Section 4 such that per session
106 In order to reuse a session, a TLS client must send the session ticket
[all …]
/freebsd/contrib/wpa/src/eap_common/
H A Deap_fast_common.c2 * EAP-FAST common helper functions (RFC 4851)
11 #include "common.h"
51 /* Encapsulate EAP packet in EAP-Payload TLV */ in eap_fast_tlv_eap_payload()
52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); in eap_fast_tlv_eap_payload()
55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_tlv_eap_payload()
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret()
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret()
82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", in eap_fast_derive_master_secret()
91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", in eap_fast_derive_master_secret()
116 * RFC 4851, Section 5.4: EAP Master Session Key Generation in eap_fast_derive_eap_msk()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_tlsext_ticket_key_cb.pod7 - set a callback for session ticket processing
30 session tickets for the ssl context I<sslctx>. Session tickets, defined in
31 RFC5077 provide an enhanced session resumption capability where the server
32 implementation is not required to maintain per session state. It only applies
36 session when session ticket extension is presented in the TLS hello
40 The OpenSSL library uses your callback function to help implement a common TLS
41 ticket construction state according to RFC5077 Section 4 such that per session
45 In order to reuse a session, a TLS client must send the session ticket
46 extension to the server. The client must send exactly one session ticket.
47 The server, through the callback function, either agrees to reuse the session
[all …]
/freebsd/sys/contrib/dev/iwlwifi/fw/api/
H A Dlocation.h1 /* SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause */
3 * Copyright (C) 2015-2017 Intel Deutschland GmbH
4 * Copyright (C) 2018-2022 Intel Corporation
5 * Copyright (C) 2024-2025 Intel Corporation
16 * enum iwl_location_subcmd_ids - location group command IDs
91 * struct iwl_tof_config_cmd - ToF configuration
93 * @one_sided_disabled: indicates if one-sided is disabled (or not)
105 * enum iwl_tof_bandwidth - values for iwl_tof_range_req_ap_entry.bandwidth
106 * @IWL_TOF_BW_20_LEGACY: 20 MHz non-HT
123 * enum iwl_tof_algo_type - Algorithym type for range measurement request
[all …]
/freebsd/contrib/wpa/src/fst/
H A Dfst_ctrl_aux.h2 * FST module - miscellaneous definitions
12 #include "common/defs.h"
15 #define FST_INVALID_SESSION_ID ((u32) -1)
30 EVENT_FST_ESTABLISHED, /* FST Session has been established */
31 EVENT_FST_SETUP, /* FST Session request received */
32 EVENT_FST_SESSION_STATE_CHANGED,/* FST Session state has been changed */
83 /* helpers - prints enum in string form */
H A Dfst_ctrl_iface.c2 * FST module - Control Interface implementation
10 #include "utils/common.h"
11 #include "common/defs.h"
43 ss = &extra->session_state; in format_session_state_extra()
44 if (ss->new_state != FST_SESSION_STATE_INITIAL) in format_session_state_extra()
47 switch (ss->extra.to_initial.reason) { in format_session_state_extra()
49 if (ss->extra.to_initial.reject_code != WLAN_STATUS_SUCCESS) in format_session_state_extra()
51 ss->extra.to_initial.reject_code); in format_session_state_extra()
55 switch (ss->extra.to_initial.initiator) { in format_session_state_extra()
74 fst_reason_name(ss->extra.to_initial.reason), in format_session_state_extra()
[all …]
/freebsd/crypto/openssh/
H A DPROTOCOL.mux2 ControlMaster connection-sharing.
22 The most common use of multiplexing however is to maintain multiple
25 "Passenger" clients start by requesting a new session with a
28 signaled or the mux server closes the session. This mode is so named as
63 2. Opening a passenger mode session
65 To open a new multiplexed session in passenger mode, a client sends the
94 uint32 session id
100 indicating that the session is up. The client now waits for the
101 session to end. When it does, the server will send an exit status
105 uint32 session id
[all …]
/freebsd/secure/libexec/sshd-session/
H A DMakefile4 PROG= sshd-session
5 SRCS= sshd-session.c auth-rhosts.c auth-passwd.c \
6 audit.c audit-bsm.c audit-linux.c platform.c \
8 auth.c auth2.c auth2-methods.c auth-options.c session.c \
9 auth2-chall.c groupaccess.c \
10 auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
11 auth2-none.c auth2-passwd.c auth2-pubkey.c auth2-pubkeyfile.c \
12 monitor.c monitor_wrap.c auth-krb5.c \
13 auth2-gss.c gss-serv.c gss-serv-krb5.c \
14 loginrec.c auth-pam.c auth-shadow.c auth-sia.c \
[all …]
/freebsd/sys/contrib/openzfs/module/os/freebsd/zfs/
H A Dcrypto_os.c1 // SPDX-License-Identifier: BSD-2-Clause
3 * Copyright (c) 2005-2010 Pawel Jakub Dawidek <pjd@FreeBSD.org>
63 size_t cl_bytes = CRYPTO_BITS2BYTES(c_key->ck_length); in crypto_mac_init()
69 if (c_key->ck_length == 0) in crypto_mac_init()
72 memcpy(key, c_key->ck_data, cl_bytes); in crypto_mac_init()
79 SHA512_Update(&lctx, c_key->ck_data, cl_bytes); in crypto_mac_init()
91 SHA512_Init(&ctx->innerctx); in crypto_mac_init()
92 SHA512_Update(&ctx->innerctx, k_ipad, sizeof (k_ipad)); in crypto_mac_init()
95 SHA512_Init(&ctx->outerctx); in crypto_mac_init()
96 SHA512_Update(&ctx->outerctx, k_opad, sizeof (k_opad)); in crypto_mac_init()
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pam/
H A Dutilities.kshlib.in1 #!/bin/ksh -p
2 # SPDX-License-Identifier: CDDL-1.0
7 # Common Development and Distribution License (the "License").
11 # or https://opensource.org/licenses/CDDL-1.0.
40 session session "$pammodule" "$1" > "${pamconfig}"
44 log_must rm -f "${pamconfig}"
48 log_must [ "$(<"${runstatedir}/$(id -u ${username})")" = "$1" ]
/freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/mib/
H A Dtst.tcp.ksh5 # Common Development and Distribution License (the "License").
34 echo expected one argument: '<'dtrace-path'>'
43 if [ -f $dtraceout ]; then
44 rm -f $dtraceout
49 $dtrace -o $dtraceout -s /dev/stdin <<EOF
65 profile:::tick-10msec
71 profile:::tick-1s
96 next unless my \$raddr = accept(SESSION, S);
98 while (<SESSION>) {
101 close SESSION;
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A Dossl-guide-tls-introduction.71 .\" -*- mode: troff; coding: utf-8 -*-
57 .IX Title "OSSL-GUIDE-TLS-INTRODUCTION 7ossl"
58 .TH OSSL-GUIDE-TLS-INTRODUCTION 7ossl 2025-09-30 3.5.4 OpenSSL
64 ossl\-guide\-tls\-introduction
65 \&\- OpenSSL Guide: An introduction to SSL/TLS in OpenSSL
82 Layer). OpenSSL dates from a time when the SSL name was still in common use and
101 and server share in common is used.
121 SSLv3 is available as a compile time option \- but it is not built by default.
123 in a standard build of OpenSSL. However special run-time configuration is
167 Note that it is common for certificates to be built up into a chain. For example
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dossl-guide-tls-introduction.pod5 ossl-guide-tls-introduction
6 - OpenSSL Guide: An introduction to SSL/TLS in OpenSSL
25 Layer). OpenSSL dates from a time when the SSL name was still in common use and
44 and server share in common is used.
65 SSLv3 is available as a compile time option - but it is not built by default.
67 in a standard build of OpenSSL. However special run-time configuration is
112 Note that it is common for certificates to be built up into a chain. For example
146 openssl version -d
171 a single file containing all of the certificates. See L<openssl-env(7)> for
184 the session. This will print a lot of information on the screen about the
[all …]

12345678910>>...19