| /freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
| H A D | lac_session.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 8 * @defgroup LacSym_Session Session 12 * Definition of symmetric session descriptor structure 17 * A session is required for each symmetric operation. The session descriptor 18 * holds information about the session from when the session is initialised to 19 * when the session is removed. The session descriptor is used in the 21 * receiving the response. The session descriptor and any other state 26 * The user allocates the memory for the session using the size returned from 27 * \ref cpaCySymSessionCtxGetSize(). Internally this memory is re-aligned on a [all …]
|
| H A D | lac_sym.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 19 * the appropriate sub-components: cipher, hash, algorithm chaining and 20 * authentication encryption. It is a common layer between the above 21 * mentioned components where common resources are allocated and parameter 23 * checks are done in the sub-component itself. 25 * The symmetric component demultiplexes the session register/deregister 29 * - \ref LacSymPartial "Partial Packet Code": This code manages the partial 30 * packet state for a session. 31 * - \ref LacBufferDesc "Common Buffer Code" : This code traverses a buffer [all …]
|
| H A D | lac_sym_cipher.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 19 * their basic operation and does some common parameter checking and deals 20 * with accesses to the session table. 23 * and Triple-DES cipher algorithms, in ECB, CBC and CTR modes. The ARC4 stream 26 * written back to the source buffer (in-place) or to a separate output buffer 27 * (out-of-place). Data must be encapsulated in ICP buffers. 29 * The cipher component is responsible for implementing the cipher-specific 30 * functionality for registering and de-registering a session, for the perform 38 * - \ref LacCommon [all …]
|
| H A D | lac_sym_qat_cipher.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 55 * This function returns a hard-coded block size for the specific cipher 58 * @param[in] cipherAlgorithm Cipher algorithm for the current session 72 * This function returns a hard-coded IV/state size for the specific cipher 75 * @param[in] cipherAlgorithm Cipher algorithm for the current session 91 * - the cipher fields of the req_params block in the request. No 93 * - the corresponding CIPH_IV_FLD flag in the serv_specif_flags field 94 * of the common header. 98 * - cd_ctrl.cipher_state_sz [all …]
|
| H A D | lac_sym_alg_chain.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 17 * This is the LAC Algorithm-Chaining feature component. This component 18 * implements session registration and cleanup functions, and a perform 23 * incorporates support for Authenticated-Encryption (CCM and GCM) which 34 * the algChainOrder field in the session context. This ordering choice is 35 * stored as part of the session descriptor, so that it is known when a 36 * perform request is issued. In the case of Authenticated-Encryption, the 39 * When building a content descriptor, as part of session registration, this 41 * parts of the session descriptor. The key aspect here is to provide the [all …]
|
| /freebsd/share/man/man4/ |
| H A D | ng_pppoe.4 | 1 .\" Copyright (c) 1996-1999 Whistle Communications, Inc. 19 .\" MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. 68 .Bl -tag -width ".Va [unspecified]" 81 Any other name is assumed to be a session hook that will be connected to 86 .Bl -tag -width 3n 90 .Bd -literal -offset 4n 97 This generic message returns a human-readable version of the node status. 100 Tell a nominated newly created hook that its session should enter 103 It is legal to specify a zero-length service name, this is common 106 and/or set a specific Host-Uniq tag, required by some Internet providers, [all …]
|
| /freebsd/contrib/pam-krb5/docs/ |
| H A D | docknot.yaml | 1 # Package metadata for pam-krb5. 10 # Copyright 2017, 2020-2021 Russ Allbery <eagle@eyrie.org> 12 # SPDX-License-Identifier: BSD-3-clause or GPL-1+ 16 name: pam-krb5 22 name: BSD-3-clause-or-GPL-1+ 24 - holder: Russ Allbery <eagle@eyrie.org> 25 years: 2005-2010, 2014-2015, 2017, 2020-2021 26 - holder: The Board of Trustees of the Leland Stanford Junior University 27 years: 2009-2011 28 - holder: Andres Salomon <dilinger@debian.org> [all …]
|
| /freebsd/contrib/bearssl/src/ssl/ |
| H A D | ssl_hs_server.t0 | 23 \ ---------------------------------------------------------------------- 25 \ The common T0 code (ssl_hs_common.t0) shall be read first. 40 * Decrypt the pre-master secret (RSA key exchange). 52 x = (*ctx->policy_vtable)->do_keyx(ctx->policy_vtable, epms, &len); 61 br_enc16be(epms, ctx->client_max_version); 65 * decryption failed. Note that we use a constant-time conditional 68 br_hmac_drbg_generate(&ctx->eng.rng, rpms, sizeof rpms); 74 br_ssl_engine_compute_master(&ctx->eng, prf_id, epms, 48); 77 * Clear the pre-master secret from RAM: it is normally a buffer 78 * in the context, hence potentially long-lived. [all …]
|
| /freebsd/contrib/pam-krb5/ |
| H A D | README.md | 1 # pam-krb5 4 status](https://github.com/rra/pam-krb5/workflows/build/badge.svg)](https://github.com/rra/pam-krb5… 6 package](https://img.shields.io/debian/v/libpam-krb5/unstable)](https://tracker.debian.org/pkg/libp… 8 Copyright 2005-2010, 2014-2015, 2017, 2020-2021 Russ Allbery 9 <eagle@eyrie.org>. Copyright 2009-2011 The Board of Trustees of the 11 <dilinger@debian.org>. Copyright 1999-2000 Frank Cusack 12 <fcusack@fcusack.com>. This software is distributed under a BSD-style 18 pam-krb5 is a Kerberos PAM module for either MIT Kerberos or Heimdal. It 20 handling, authentication of non-local accounts for network services, 30 pam-krb5 provides a Kerberos PAM module that supports authentication, user [all …]
|
| H A D | README | 1 pam-krb5 4.11 5 Copyright 2005-2010, 2014-2015, 2017, 2020-2021 Russ Allbery 6 <eagle@eyrie.org>. Copyright 2009-2011 The Board of Trustees of the 8 <dilinger@debian.org>. Copyright 1999-2000 Frank Cusack 9 <fcusack@fcusack.com>. This software is distributed under a BSD-style 14 pam-krb5 is a Kerberos PAM module for either MIT Kerberos or Heimdal. 16 authorization handling, authentication of non-local accounts for network 26 pam-krb5 provides a Kerberos PAM module that supports authentication, 31 and it tries to work around PAM implementation flaws in commonly-used 32 PAM-enabled applications such as OpenSSH and xdm. It supports both [all …]
|
| /freebsd/contrib/openpam/doc/man/ |
| H A D | pam.man | 3 of common authentication-related operations and provides a framework 18 a session. 22 session management and password management. 58 functions manage named chunks of free-form data, generally used by 71 time-of-day restrictions, and so forth. 72 .Ss Session Management 77 functions handle session setup and teardown. 91 session.
|
| H A D | pam.3 | 64 of common authentication-related operations and provides a framework 79 a session. 83 session management and password management. 119 functions manage named chunks of free-form data, generally used by 132 time-of-day restrictions, and so forth. 133 .Ss Session Management 138 functions handle session setup and teardown. 152 session. 161 .Bl -tag -width 18n 219 Session failure. [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SSL_CTX_set_tlsext_ticket_key_cb.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH SSL_CTX_SET_TLSEXT_TICKET_KEY_CB 3ossl 2025-09-30 3.5.4 OpenSSL 66 \&\- set a callback for session ticket processing 91 session tickets for the ssl context \fIsslctx\fR. Session tickets, defined in 92 RFC5077 provide an enhanced session resumption capability where the server 93 implementation is not required to maintain per session state. It only applies 97 session when session ticket extension is presented in the TLS hello 101 The OpenSSL library uses your callback function to help implement a common TLS 102 ticket construction state according to RFC5077 Section 4 such that per session 106 In order to reuse a session, a TLS client must send the session ticket [all …]
|
| /freebsd/contrib/wpa/src/eap_common/ |
| H A D | eap_fast_common.c | 2 * EAP-FAST common helper functions (RFC 4851) 11 #include "common.h" 51 /* Encapsulate EAP packet in EAP-Payload TLV */ in eap_fast_tlv_eap_payload() 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); in eap_fast_tlv_eap_payload() 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_tlv_eap_payload() 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret() 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret() 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", in eap_fast_derive_master_secret() 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", in eap_fast_derive_master_secret() 116 * RFC 4851, Section 5.4: EAP Master Session Key Generation in eap_fast_derive_eap_msk() [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 7 - set a callback for session ticket processing 30 session tickets for the ssl context I<sslctx>. Session tickets, defined in 31 RFC5077 provide an enhanced session resumption capability where the server 32 implementation is not required to maintain per session state. It only applies 36 session when session ticket extension is presented in the TLS hello 40 The OpenSSL library uses your callback function to help implement a common TLS 41 ticket construction state according to RFC5077 Section 4 such that per session 45 In order to reuse a session, a TLS client must send the session ticket 46 extension to the server. The client must send exactly one session ticket. 47 The server, through the callback function, either agrees to reuse the session [all …]
|
| /freebsd/sys/contrib/dev/iwlwifi/fw/api/ |
| H A D | location.h | 1 /* SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause */ 3 * Copyright (C) 2015-2017 Intel Deutschland GmbH 4 * Copyright (C) 2018-2022 Intel Corporation 5 * Copyright (C) 2024-2025 Intel Corporation 16 * enum iwl_location_subcmd_ids - location group command IDs 91 * struct iwl_tof_config_cmd - ToF configuration 93 * @one_sided_disabled: indicates if one-sided is disabled (or not) 105 * enum iwl_tof_bandwidth - values for iwl_tof_range_req_ap_entry.bandwidth 106 * @IWL_TOF_BW_20_LEGACY: 20 MHz non-HT 123 * enum iwl_tof_algo_type - Algorithym type for range measurement request [all …]
|
| /freebsd/contrib/wpa/src/fst/ |
| H A D | fst_ctrl_aux.h | 2 * FST module - miscellaneous definitions 12 #include "common/defs.h" 15 #define FST_INVALID_SESSION_ID ((u32) -1) 30 EVENT_FST_ESTABLISHED, /* FST Session has been established */ 31 EVENT_FST_SETUP, /* FST Session request received */ 32 EVENT_FST_SESSION_STATE_CHANGED,/* FST Session state has been changed */ 83 /* helpers - prints enum in string form */
|
| H A D | fst_ctrl_iface.c | 2 * FST module - Control Interface implementation 10 #include "utils/common.h" 11 #include "common/defs.h" 43 ss = &extra->session_state; in format_session_state_extra() 44 if (ss->new_state != FST_SESSION_STATE_INITIAL) in format_session_state_extra() 47 switch (ss->extra.to_initial.reason) { in format_session_state_extra() 49 if (ss->extra.to_initial.reject_code != WLAN_STATUS_SUCCESS) in format_session_state_extra() 51 ss->extra.to_initial.reject_code); in format_session_state_extra() 55 switch (ss->extra.to_initial.initiator) { in format_session_state_extra() 74 fst_reason_name(ss->extra.to_initial.reason), in format_session_state_extra() [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | PROTOCOL.mux | 2 ControlMaster connection-sharing. 22 The most common use of multiplexing however is to maintain multiple 25 "Passenger" clients start by requesting a new session with a 28 signaled or the mux server closes the session. This mode is so named as 63 2. Opening a passenger mode session 65 To open a new multiplexed session in passenger mode, a client sends the 94 uint32 session id 100 indicating that the session is up. The client now waits for the 101 session to end. When it does, the server will send an exit status 105 uint32 session id [all …]
|
| /freebsd/secure/libexec/sshd-session/ |
| H A D | Makefile | 4 PROG= sshd-session 5 SRCS= sshd-session.c auth-rhosts.c auth-passwd.c \ 6 audit.c audit-bsm.c audit-linux.c platform.c \ 8 auth.c auth2.c auth2-methods.c auth-options.c session.c \ 9 auth2-chall.c groupaccess.c \ 10 auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \ 11 auth2-none.c auth2-passwd.c auth2-pubkey.c auth2-pubkeyfile.c \ 12 monitor.c monitor_wrap.c auth-krb5.c \ 13 auth2-gss.c gss-serv.c gss-serv-krb5.c \ 14 loginrec.c auth-pam.c auth-shadow.c auth-sia.c \ [all …]
|
| /freebsd/sys/contrib/openzfs/module/os/freebsd/zfs/ |
| H A D | crypto_os.c | 1 // SPDX-License-Identifier: BSD-2-Clause 3 * Copyright (c) 2005-2010 Pawel Jakub Dawidek <pjd@FreeBSD.org> 63 size_t cl_bytes = CRYPTO_BITS2BYTES(c_key->ck_length); in crypto_mac_init() 69 if (c_key->ck_length == 0) in crypto_mac_init() 72 memcpy(key, c_key->ck_data, cl_bytes); in crypto_mac_init() 79 SHA512_Update(&lctx, c_key->ck_data, cl_bytes); in crypto_mac_init() 91 SHA512_Init(&ctx->innerctx); in crypto_mac_init() 92 SHA512_Update(&ctx->innerctx, k_ipad, sizeof (k_ipad)); in crypto_mac_init() 95 SHA512_Init(&ctx->outerctx); in crypto_mac_init() 96 SHA512_Update(&ctx->outerctx, k_opad, sizeof (k_opad)); in crypto_mac_init() [all …]
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pam/ |
| H A D | utilities.kshlib.in | 1 #!/bin/ksh -p 2 # SPDX-License-Identifier: CDDL-1.0 7 # Common Development and Distribution License (the "License"). 11 # or https://opensource.org/licenses/CDDL-1.0. 40 session session "$pammodule" "$1" > "${pamconfig}" 44 log_must rm -f "${pamconfig}" 48 log_must [ "$(<"${runstatedir}/$(id -u ${username})")" = "$1" ]
|
| /freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/mib/ |
| H A D | tst.tcp.ksh | 5 # Common Development and Distribution License (the "License"). 34 echo expected one argument: '<'dtrace-path'>' 43 if [ -f $dtraceout ]; then 44 rm -f $dtraceout 49 $dtrace -o $dtraceout -s /dev/stdin <<EOF 65 profile:::tick-10msec 71 profile:::tick-1s 96 next unless my \$raddr = accept(SESSION, S); 98 while (<SESSION>) { 101 close SESSION; [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | ossl-guide-tls-introduction.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "OSSL-GUIDE-TLS-INTRODUCTION 7ossl" 58 .TH OSSL-GUIDE-TLS-INTRODUCTION 7ossl 2025-09-30 3.5.4 OpenSSL 64 ossl\-guide\-tls\-introduction 65 \&\- OpenSSL Guide: An introduction to SSL/TLS in OpenSSL 82 Layer). OpenSSL dates from a time when the SSL name was still in common use and 101 and server share in common is used. 121 SSLv3 is available as a compile time option \- but it is not built by default. 123 in a standard build of OpenSSL. However special run-time configuration is 167 Note that it is common for certificates to be built up into a chain. For example [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | ossl-guide-tls-introduction.pod | 5 ossl-guide-tls-introduction 6 - OpenSSL Guide: An introduction to SSL/TLS in OpenSSL 25 Layer). OpenSSL dates from a time when the SSL name was still in common use and 44 and server share in common is used. 65 SSLv3 is available as a compile time option - but it is not built by default. 67 in a standard build of OpenSSL. However special run-time configuration is 112 Note that it is common for certificates to be built up into a chain. For example 146 openssl version -d 171 a single file containing all of the certificates. See L<openssl-env(7)> for 184 the session. This will print a lot of information on the screen about the [all …]
|