/freebsd/crypto/krb5/src/tests/asn.1/ |
H A D | otp.asn1 | 9 FROM KerberosV5Spec2 {iso(1) identified-organization(3) 11 kerberosV5(2) modules(4) krb5spec2(2)} 12 -- as defined in RFC 4120. 14 FROM PKIX1Explicit88 { iso (1) identified-organization (3) 17 id-mod (0) id-pkix1-explicit (18) }; 18 -- As defined in RFC 5280. 20 PA-OTP-CHALLENGE ::= SEQUENCE { 22 otp-service [1] UTF8String OPTIONAL, 23 otp-tokenInfo [2] SEQUENCE (SIZE(1..MAX)) OF 24 OTP-TOKENINFO, [all …]
|
H A D | make-vectors.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 2 /* tests/asn.1/make-vectors.c - Generate ASN.1 test vectors using asn1c */ 30 * It is intended to be used via "make test-vectors". Currently, test vectors 38 #include <OTP-TOKENINFO.h> 39 #include <PA-OTP-CHALLENGE.h> 40 #include <PA-OTP-REQUEST.h> 41 #include <PA-OTP-ENC-REQUEST.h> 42 #include <AD-CAMMAC.h> 44 #include <PA-SPAKE.h> 53 static PrincipalName_t princ = { 1, { comps, 2, 2 } }; [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/nvmem/ |
H A D | rockchip,otp.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/nvmem/rockchip,otp [all...] |
H A D | nintendo-otp.yaml | 1 # SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause 3 --- 4 $id: http://devicetree.org/schemas/nvmem/nintendo-otp.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Nintendo Wii and Wii U OTP 10 This binding represents the OTP memory as found on a Nintendo Wii or Wii U, 11 which contains common and per-console keys, signatures and related data 14 See https://wiiubrew.org/wiki/Hardware/OTP 17 - Emmanuel Gil Peyrot <linkmauve@linkmauve.fr> 20 - $ref: nvmem.yaml# [all …]
|
H A D | st,stm32-romem.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/nvmem/st,stm32-romem.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: STMicroelectronics STM32 Factory-programmed data 10 This represents STM32 Factory-programmed read only non-volatile area: locked 11 flash, OTP, read-only HW regs... This contains various information such as: 16 - Fabrice Gasnier <fabrice.gasnier@foss.st.com> 19 - $ref: nvmem.yaml# 20 - $ref: nvmem-deprecated-cells.yaml# [all …]
|
H A D | microchip,lan9662-otpc.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/nvmem/microchip,lan9662-otpc.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Microchip LAN9662 OTP Controller (OTPC) 10 - Horatiu Vultur <horatiu.vultur@microchip.com> 13 OTP controller drives a NVMEM memory where system specific data 18 - $ref: nvmem.yaml# 23 - items: 24 - const: microchip,lan9668-otpc [all …]
|
H A D | sunplus,sp7021-ocotp.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 4 --- [all...] |
/freebsd/sys/contrib/dev/iwlwifi/ |
H A D | iwl-eeprom-read.c |
|
H A D | iwl-agn-hw.h | 1 /* SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause */ 3 * Copyright (C) 2005-2014 Intel Corporation 6 * Please use this file (iwl-agn-hw.h) only for hardware-related definitions. 18 #define IWLAGN_RTC_INST_SIZE (IWLAGN_RTC_INST_UPPER_BOUND - \ 20 #define IWLAGN_RTC_DATA_SIZE (IWLAGN_RTC_DATA_UPPER_BOUND - \ 28 (IWL60_RTC_INST_UPPER_BOUND - IWL60_RTC_INST_LOWER_BOUND) 30 (IWL60_RTC_DATA_UPPER_BOUND - IWL60_RTC_DATA_LOWER_BOUND) 51 #define OTP_MAX_LL_ITEMS_1000 (3) /* OTP blocks for 1000 */ 52 #define OTP_MAX_LL_ITEMS_6x00 (4) /* OTP blocks for 6x00 */ 53 #define OTP_MAX_LL_ITEMS_6x50 (7) /* OTP blocks for 6x50 */ [all …]
|
/freebsd/sys/contrib/dev/mediatek/mt76/mt7615/ |
H A D | eeprom.c | 1 // SPDX-License-Identifier: ISC 28 return -ETIMEDOUT; in mt7615_efuse_read() 30 udelay(2); in mt7615_efuse_read() 53 if (is_mt7663(&dev->mt76)) in mt7615_efuse_init() 60 dev->mt76.otp.data = devm_kzalloc(dev->mt76.dev, len, GFP_KERNEL); in mt7615_efuse_init() 61 dev->mt76.otp.size = len; in mt7615_efuse_init() 62 if (!dev->mt76.otp.data) in mt7615_efuse_init() 63 return -ENOMEM; in mt7615_efuse_init() 65 buf = dev->mt76.otp.data; in mt7615_efuse_init() 87 ret = mt76_eeprom_init(&dev->mt76, MT7615_EEPROM_FULL_SIZE); in mt7615_eeprom_load() [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/mtd/ |
H A D | mtd.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Miquel Raynal <miquel.raynal@bootlin.com> 11 - Richard Weinberger <richard@nod.at> 21 User-defined MTD device name. Can be used to assign user friendly 26 '#address-cells': 29 '#size-cells': 36 - compatible 39 "@[0-9a-f]+$": [all …]
|
/freebsd/crypto/krb5/src/tests/ |
H A D | t_otp.py | 25 # This script tests OTP, both UDP and Unix Sockets, with a variety of 28 # test how OTP handles the case of short daemon restarts. 39 skip_rest('OTP tests', 'Python pyrad module not found') 43 skip_rest('OTP tests', 'Python version 2.6 required') 48 ATTRIBUTE User-Name 1 string 49 ATTRIBUTE User-Password 2 octets 50 ATTRIBUTE Service-Type 6 integer 51 ATTRIBUTE NAS-Identifier 32 string 67 pswd = self._args[2] 86 if key == 'User-Password': [all …]
|
/freebsd/crypto/krb5/src/plugins/preauth/otp/ |
H A D | main.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 2 /* plugins/preauth/otp/main.c - OTP kdcpreauth module definition */ 13 * 2. Redistributions in binary form must reproduce the above copyright 31 #include "k5-int.h" 32 #include "k5-json.h" 61 retval = alloc_data(&plaintext, req->enc_data.ciphertext.length); in decrypt_encdata() 66 NULL, &req->enc_data, &plaintext); in decrypt_encdata() 68 com_err("otp", retval, "Unable to decrypt encData in PA-OTP-REQUEST"); in decrypt_encdata() 85 if (armor_key == NULL || nonce->data == NULL) { in nonce_verify() 90 /* Decode the PA-OTP-ENC-REQUEST structure. */ in nonce_verify() [all …]
|
H A D | otp_state.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 2 /* plugins/preauth/otp/otp_state.c - Verify OTP token values using RADIUS */ 12 * 2. Redistributions in binary form must reproduce the above copyright 33 #include <k5-json.h> 95 com_err("otp", retval, "Unable to resolve secret file '%s'", filename); in read_secret_file() 102 com_err("otp", retval, "Unable to open secret file '%s'", filename); in read_secret_file() 110 com_err("otp", retval, "Unable to read secret file '%s'", filename); in read_secret_file() 119 for (j = strlen(buf); j > i; j--) { in read_secret_file() 120 if (!isspace(buf[j - 1])) in read_secret_file() 124 *secret = k5memdup0(&buf[i], j - i, &retval); in read_secret_file() [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/fuse/ |
H A D | renesas,rcar-otp.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/fuse/renesas,rcar-otp.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: R-Car E-FUSE connected to OTP_MEM 10 - Geert Uytterhoeven <geert+renesas@glider.be> 13 The E-FUSE is a type of non-volatile memory, which is accessible through the 14 One-Time Programmable Memory (OTP_MEM) module on some R-Car Gen4 SoCs. 19 - renesas,r8a779g0-otp # R-CarV4H 20 - renesas,r8a779h0-otp # R-CarV4M [all …]
|
/freebsd/sys/dev/nmdm/ |
H A D | nmdm.c | 1 /*- 2 * SPDX-License-Identifier: BSD-3-Clause 12 * 2. Redistributions in binary form must reproduce the above copyright 35 * Pseudo-nulmodem driver 107 struct tty *otp; in nmdm_close() local 110 onp = np->np_other; in nmdm_close() 111 otp = onp->np_tty; in nmdm_close() 114 if (tty_opened(otp)) in nmdm_close() 122 onp = np->np_other; in nmdm_close() 125 otp = onp->np_tty; in nmdm_close() [all …]
|
/freebsd/sys/dev/bhnd/cores/chipc/ |
H A D | chipcreg.h | 1 /*- 2 * SPDX-License-Identifier: ISC 4 * Copyright (c) 2015-2016 Landon Fuller <landon@landonf.org> 5 * Copyright (c) 2010-2015 Broadcom Corporation 10 * distributed with the Asus RT-N16 firmware source code release. 55 #define CHIPC_OTPST 0x10 /**< otp status */ 56 #define CHIPC_OTPCTRL 0x14 /**< otp control */ 58 #define CHIPC_OTPLAYOUT 0x1C /**< otp layout (IPX OTP) */ 77 /* siba backplane configuration broadcast (siba-only) */ 81 #define CHIPC_GPIOPU 0x58 /**< pull-up mask (rev >= 20) */ [all …]
|
H A D | chipcvar.h | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 4 * Copyright (c) 2015-2016 Landon Fuller <landon@landonf.org> 17 * 2. Redistributions in binary form must reproduce at minimum a disclaimer 63 * ChipCommon-controlled SPROM/OTP is supported, along with the 72 CHIPC_QUIRK_4706_NFLASH = (1<<2), 93 * attached via GPIO 2, 5, and sprom_dout pins. 112 * SPROM pins are muxed with the FEM control lines on this 4360-family 122 /** Supports HND or IPX OTP registers (CHIPC_OTPST, CHIPC_OTPCTRL, 126 /** Supports HND OTP registers. */ [all …]
|
/freebsd/sys/contrib/dev/mediatek/mt76/mt7603/ |
H A D | eeprom.c | 1 // SPDX-License-Identifier: ISC 21 return -ETIMEDOUT; in mt7603_efuse_read() 23 udelay(2); in mt7603_efuse_read() 51 dev->mt76.otp.data = devm_kzalloc(dev->mt76.dev, len, GFP_KERNEL); in mt7603_efuse_init() 52 dev->mt76.otp.size = len; in mt7603_efuse_init() 53 if (!dev->mt76.otp.data) in mt7603_efuse_init() 54 return -ENOMEM; in mt7603_efuse_init() 56 buf = dev->mt76.otp.data; in mt7603_efuse_init() 104 struct device_node *np = dev->mt76.dev->of_node; in mt7603_apply_cal_free_data() 105 u8 *eeprom = dev->mt76.eeprom.data; in mt7603_apply_cal_free_data() [all …]
|
/freebsd/crypto/heimdal/appl/ftp/ftpd/ |
H A D | ftpd.8 | 11 .\" 2. Redistributions in binary form must reproduce the above copyright 50 .Op Fl Fl gss-bindings 51 .Op Fl I | Fl Fl no-insecure-oob 53 .Op Fl B | Fl Fl builtin-ls 54 .Op Fl Fl good-chars= Ns Ar string 68 .Bl -tag -width Ds 76 .Bl -tag -width plain 78 Allow logging in with plaintext password. The password can be a(n) OTP 80 .It Ar otp 83 but only OTP is allowed. [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/regulator/ |
H A D | palmas-pmic.txt | 3 The tps659038 for the AM57x class have OTP spins that 5 is not a need to add the OTP spins to the palmas driver. The 11 - compatible : Should be from the list 12 ti,twl6035-pmic 13 ti,twl6036-pmic 14 ti,twl6037-pmic 15 ti,tps65913-pmic 16 ti,tps65914-pmic 17 ti,tps65917-pmic 18 ti,tps659038-pmic [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/doc/docbook/ |
H A D | wpa_cli.sgml | 1 <!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN"> 21 <arg>-p <replaceable>path to ctrl sockets</replaceable></arg> 22 <arg>-g <replaceable>path to global ctrl_interface socket</replaceable></arg> 23 <arg>-i <replaceable>ifname</replaceable></arg> 24 <arg>-hvB</arg> 25 <arg>-a <replaceable>action file</replaceable></arg> 26 <arg>-P <replaceable>pid file</replaceable></arg> 27 <arg>-G <replaceable>ping interval</replaceable></arg> 35 <para>wpa_cli is a text-based frontend program for interacting 47 implement, e.g., one-time-passwords or generic token card [all …]
|
/freebsd/krb5/plugins/preauth/otp/ |
H A D | Makefile | 2 # SPDX-License-Idendifier: BSD-2-Clause 16 LIB= otp 18 LDFLAGS=-Wl,--no-undefined 21 .PATH: ${KRB5_DIR}/plugins/preauth/otp 26 CFLAGS+=-I${KRB5_DIR}/plugins/preauth/otp \ 27 -I${KRB5_DIR}/include \ 28 -I${KRB5_SRCTOP}/include
|
/freebsd/usr.sbin/wpa/wpa_cli/ |
H A D | wpa_cli.8 | 1 .\"- 2 .\" SPDX-License-Identifier: BSD-2-Clause 12 .\" 2. Redistributions in binary form must reproduce the above copyright 48 is a text-based frontend program for interacting with 77 one-time passwords or generic token card 79 challenge-response that uses an external device for generating the 103 non-root user access by using the 124 .Dq Li CTRL-REQ- Ns Ao Ar type Ac Ns Li - Ns Ao Ar id Ac : Ns Aq Ar text 130 .Li OTP 131 (One-Time Password), [all …]
|
/freebsd/contrib/libfido2/udev/ |
H A D | fidodevs | 2 # Use of this source code is governed by a BSD-style 4 # SPDX-License-Identifier: BSD-2-Clause 6 # After modifying this file, regenerate 70-u2f.rules: 7 # ./genrules.awk fidodevs > 70-u2f.rules 59 product YUBICO 0x0114 YubiKey NEO OTP+FIDO 61 product YUBICO 0x0116 YubiKey NEO OTP [all...] |