Home
last modified time | relevance | path

Searched full:otp (Results 1 – 25 of 368) sorted by relevance

12345678910>>...15

/freebsd/crypto/krb5/src/tests/asn.1/
H A Dotp.asn120 PA-OTP-CHALLENGE ::= SEQUENCE {
22 otp-service [1] UTF8String OPTIONAL,
23 otp-tokenInfo [2] SEQUENCE (SIZE(1..MAX)) OF
24 OTP-TOKENINFO,
30 OTP-TOKENINFO ::= SEQUENCE {
32 otp-vendor [1] UTF8String OPTIONAL,
33 otp-challenge [2] OCTET STRING (SIZE(1..MAX))
35 otp-length [3] Int32 OPTIONAL,
36 otp-format [4] OTPFormat OPTIONAL,
37 otp-tokenID [5] OCTET STRING OPTIONAL,
[all …]
H A Dmake-vectors.c38 #include <OTP-TOKENINFO.h>
39 #include <PA-OTP-CHALLENGE.h>
40 #include <PA-OTP-REQUEST.h>
41 #include <PA-OTP-ENC-REQUEST.h>
69 /* Minimal OTP-TOKENINFO */
72 /* Maximal OTP-TOKENINFO */
92 /* Minimal PA-OTP-CHALLENGE */
97 /* Maximal PA-OTP-CHALLENGE */
106 /* Minimal PA-OTP-REQUEST */
112 /* Maximal PA-OTP-REQUEST */
[all …]
/freebsd/sys/contrib/dev/iwlwifi/
H A Diwl-eeprom-read.c
H A Diwl-agn-hw.h51 #define OTP_MAX_LL_ITEMS_1000 (3) /* OTP blocks for 1000 */
52 #define OTP_MAX_LL_ITEMS_6x00 (4) /* OTP blocks for 6x00 */
53 #define OTP_MAX_LL_ITEMS_6x50 (7) /* OTP blocks for 6x50 */
54 #define OTP_MAX_LL_ITEMS_2x00 (4) /* OTP blocks for 2x00 */
/freebsd/sys/contrib/device-tree/Bindings/nvmem/
H A Drockchip,otp.yaml4 $id: http://devicetree.org/schemas/nvmem/rockchip,otp.yaml#
7 title: Rockchip internal OTP (One Time Programmable) memory
15 - rockchip,px30-otp
16 - rockchip,rk3308-otp
17 - rockchip,rk3588-otp
29 - const: otp
59 - rockchip,px30-otp
60 - rockchip,rk3308-otp
76 - rockchip,rk3588-otp
85 - const: otp
[all...]
H A Dnintendo-otp.yaml4 $id: http://devicetree.org/schemas/nvmem/nintendo-otp.yaml#
7 title: Nintendo Wii and Wii U OTP
10 This binding represents the OTP memory as found on a Nintendo Wii or Wii U,
14 See https://wiiubrew.org/wiki/Hardware/OTP
25 - nintendo,hollywood-otp
26 - nintendo,latte-otp
39 otp@d8001ec {
40 compatible = "nintendo,latte-otp";
H A Drockchip-otp.txt1 Rockchip internal OTP (One Time Programmable) memory device tree bindings
5 - "rockchip,px30-otp" - for PX30 SoCs.
6 - "rockchip,rk3308-otp" - for RK3308 SoCs.
9 - clock-names: Should be "otp", "apb_pclk" and "phy".
17 otp: otp@ff290000 {
18 compatible = "rockchip,px30-otp";
24 clock-names = "otp", "apb_pclk", "phy";
H A Dlpc1850-otp.txt1 * NXP LPC18xx OTP memory
3 Internal OTP (One Time Programmable) memory for NXP LPC18xx/43xx devices.
6 - compatible: Should be "nxp,lpc1850-otp"
15 otp: otp@40045000 {
16 compatible = "nxp,lpc1850-otp";
H A Dst,stm32-romem.yaml11 flash, OTP, read-only HW regs... This contains various information such as:
25 - st,stm32f4-otp
40 st,non-secure-otp:
58 compatible = "st,stm32f4-otp";
69 st,non-secure-otp;
H A Dbrcm,ocotp.txt1 Broadcom OTP memory controller
8 - reg: Base address of the OTP controller.
13 otp: otp@301c800 {
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_otp.c2 * EAP peer method: EAP-OTP (RFC 3748)
35 int otp; in eap_otp_process() local
42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", in eap_otp_process()
47 otp = 1; in eap_otp_process()
50 otp = 0; in eap_otp_process()
54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); in eap_otp_process()
71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response", in eap_otp_process()
74 if (otp) { in eap_otp_process()
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); in eap_otp_process()
88 EAP_VENDOR_IETF, EAP_TYPE_OTP, "OTP"); in eap_peer_otp_register()
/freebsd/sys/contrib/dev/mediatek/mt76/mt7615/
H A Deeprom.c60 dev->mt76.otp.data = devm_kzalloc(dev->mt76.dev, len, GFP_KERNEL); in mt7615_efuse_init()
61 dev->mt76.otp.size = len; in mt7615_efuse_init()
62 if (!dev->mt76.otp.data) in mt7615_efuse_init()
65 buf = dev->mt76.otp.data; in mt7615_efuse_init()
286 u8 *otp = dev->mt76.otp.data; in mt7615_apply_cal_free_data() local
289 if (!otp) in mt7615_apply_cal_free_data()
293 if (!otp[ical[i]]) in mt7615_apply_cal_free_data()
297 eeprom[ical[i]] = otp[ical[i]]; in mt7615_apply_cal_free_data()
300 eeprom[ical_nocheck[i]] = otp[ical_nocheck[i]]; in mt7615_apply_cal_free_data()
309 u8 *otp = dev->mt76.otp.data; in mt7622_apply_cal_free_data() local
[all …]
/freebsd/crypto/krb5/doc/admin/
H A Dotp.rst3 OTP Preauthentication
6 OTP is a preauthentication mechanism for Kerberos 5 which uses One
7 Time Passwords (OTP) to authenticate the client to the KDC. The OTP
14 Additionally, our implementation of the OTP system allows for the
26 [otp]
59 [otp]
71 To enable OTP for a client principal, the administrator must define
72 the **otp** string attribute for that principal. (See
73 :ref:`set_string`.) The **otp** user string is a JSON string of the
100 #. FAST is required for OTP to work.
/freebsd/crypto/krb5/doc/html/_sources/admin/
H A Dotp.rst.txt3 OTP Preauthentication
6 OTP is a preauthentication mechanism for Kerberos 5 which uses One
7 Time Passwords (OTP) to authenticate the client to the KDC. The OTP
14 Additionally, our implementation of the OTP system allows for the
26 [otp]
59 [otp]
71 To enable OTP for a client principal, the administrator must define
72 the **otp** string attribute for that principal. (See
73 :ref:`set_string`.) The **otp** user string is a JSON string of the
100 #. FAST is required for OTP to work.
/freebsd/crypto/krb5/src/plugins/preauth/otp/
H A Dmain.c2 /* plugins/preauth/otp/main.c - OTP kdcpreauth module definition */
68 com_err("otp", retval, "Unable to decrypt encData in PA-OTP-REQUEST"); in decrypt_encdata()
90 /* Decode the PA-OTP-ENC-REQUEST structure. */ in nonce_verify()
234 /* Determine if otp is enabled for the user. */ in otp_edata()
235 retval = cb->get_string(context, rock, "otp", &config); in otp_edata()
301 com_err("otp", retval, "No armor key found when verifying padata"); in otp_verify()
309 com_err("otp", retval, "Unable to decode OTP request"); in otp_verify()
316 com_err("otp", retval, "Unable to decrypt nonce"); in otp_verify()
326 com_err("otp", retval, "Unable to verify nonce or timestamp"); in otp_verify()
342 /* Get the principal's OTP configuration string. */ in otp_verify()
[all …]
H A Dotp_state.c2 /* plugins/preauth/otp/otp_state.c - Verify OTP token values using RADIUS */
95 com_err("otp", retval, "Unable to resolve secret file '%s'", filename); in read_secret_file()
102 com_err("otp", retval, "Unable to open secret file '%s'", filename); in read_secret_file()
110 com_err("otp", retval, "Unable to read secret file '%s'", filename); in read_secret_file()
194 retval = profile_get_boolean(profile, "otp", name, "strip_realm", TRUE, in token_type_decode()
200 retval = profile_get_string(profile, "otp", name, "server", NULL, &pstr); in token_type_decode()
216 retval = profile_get_string(profile, "otp", name, "secret", NULL, &pstr); in token_type_decode()
226 com_err("otp", EINVAL, "Secret missing (token type '%s')", name); in token_type_decode()
240 retval = profile_get_integer(profile, "otp", name, "timeout", in token_type_decode()
247 retval = profile_get_integer(profile, "otp", name, "retries", in token_type_decode()
[all …]
/freebsd/sys/dev/nmdm/
H A Dnmdm.c107 struct tty *otp; in nmdm_close() local
111 otp = onp->np_tty; in nmdm_close()
114 if (tty_opened(otp)) in nmdm_close()
125 otp = onp->np_tty; in nmdm_close()
126 tty_rel_gone(otp); in nmdm_close()
252 struct tty *tp, *otp; in nmdm_task_tty() local
263 otp = np->np_other->np_tty; in nmdm_task_tty()
264 KASSERT(otp != NULL, ("NULL otp in nmdmstart")); in nmdm_task_tty()
265 KASSERT(otp != tp, ("NULL otp == tp nmdmstart")); in nmdm_task_tty()
269 ttydisc_modem(otp, 0); in nmdm_task_tty()
[all …]
/freebsd/sys/contrib/device-tree/Bindings/mtd/
H A Dmtd.yaml47 "^otp(-[0-9]+)?$":
57 An OTP memory region. Some flashes provide a one-time-programmable
64 - user-otp
65 - factory-otp
95 otp-1 {
96 compatible = "factory-otp";
105 otp-2 {
106 compatible = "user-otp";
/freebsd/crypto/krb5/src/tests/
H A Dt_otp.py25 # This script tests OTP, both UDP and Unix Sockets, with a variety of
28 # test how OTP handles the case of short daemon restarts.
39 skip_rest('OTP tests', 'Python pyrad module not found')
43 skip_rest('OTP tests', 'Python version 2.6 required')
166 # Compose a token configuration list suitable for the "otp" string
178 conf = {'plugins': {'kdcpreauth': {'enable_only': 'otp'}},
179 'otp': {'udp': {'server': '127.0.0.1:$port9',
198 realm.run([kadminl, 'setstr', realm.user_princ, 'otp',
208 realm.run([kadminl, 'setstr', realm.user_princ, 'otp', otpconfig('udp')])
221 realm.run([kadminl, 'setstr', realm.user_princ, 'otp', oconf])
[all …]
/freebsd/sys/contrib/device-tree/Bindings/fuse/
H A Drenesas,rcar-otp.yaml4 $id: http://devicetree.org/schemas/fuse/renesas,rcar-otp.yaml#
19 - renesas,r8a779g0-otp # R-CarV4H
20 - renesas,r8a779h0-otp # R-CarV4M
35 otp: otp@e61be000 {
36 compatible = "renesas,r8a779g0-otp";
/freebsd/sys/contrib/dev/mediatek/mt76/mt7603/
H A Deeprom.c51 dev->mt76.otp.data = devm_kzalloc(dev->mt76.dev, len, GFP_KERNEL); in mt7603_efuse_init()
52 dev->mt76.otp.size = len; in mt7603_efuse_init()
53 if (!dev->mt76.otp.data) in mt7603_efuse_init()
56 buf = dev->mt76.otp.data; in mt7603_efuse_init()
109 if (!np || !of_property_read_bool(np, "mediatek,eeprom-merge-otp")) in mt7603_apply_cal_free_data()
165 if (dev->mt76.otp.data) { in mt7603_eeprom_init()
167 mt7603_apply_cal_free_data(dev, dev->mt76.otp.data); in mt7603_eeprom_init()
169 memcpy(dev->mt76.eeprom.data, dev->mt76.otp.data, in mt7603_eeprom_init()
/freebsd/crypto/krb5/doc/html/_sources/appdev/refs/macros/
H A DKRB5_RESPONDER_QUESTION_OTP.rst.txt3 .. _KRB5-RESPONDER-QUESTION-OTP-data:
12 OTP responder question.
14 The OTP responder question is asked when the KDC indicates that an OTP value is required in order t…
46 ``KRB5_RESPONDER_QUESTION_OTP`` ``"otp"``
/freebsd/crypto/krb5/doc/html/admin/
H A Dotp.html9 <title>OTP Preauthentication &#8212; MIT Kerberos Documentation</title>
55 <section id="otp-preauthentication">
56 <span id="otp-preauth"></span><h1>OTP Preauthentication<a class="headerlink" href="#otp-preauthenti…
57 <p>OTP is a preauthentication mechanism for Kerberos 5 which uses One
58 Time Passwords (OTP) to authenticate the client to the KDC. The OTP
64 <p>Additionally, our implementation of the OTP system allows for the
72 …lass="highlight"><pre><span></span><span class="p">[</span><span class="n">otp</span><span class="…
101 …lass="highlight"><pre><span></span><span class="p">[</span><span class="n">otp</span><span class="…
112 <p>To enable OTP for a client principal, the administrator must define
113 the <strong>otp</strong> string attribute for that principal. (See
[all …]
H A Dauth_indicator.html59 …</span></a> or <a class="reference internal" href="otp.html#otp-preauth"><span class="std std-ref"…
65 <p>To use authentication indicators with PKINIT or OTP, first configure
68 …_conf.html#kdc-conf-5"><span class="std std-ref">kdc.conf</span></a>. For OTP, use the <strong>in…
69 token type definition, or specify the indicators in the <strong>otp</strong> user
70 …s described in <a class="reference internal" href="otp.html#otp-preauth"><span class="std std-ref"…
137 <li class="toctree-l2"><a class="reference internal" href="otp.html">OTP Preauthentication</a></li>
/freebsd/sys/dev/bhnd/cores/chipc/
H A Dchipcvar.h63 * ChipCommon-controlled SPROM/OTP is supported, along with the
122 /** Supports HND or IPX OTP registers (CHIPC_OTPST, CHIPC_OTPCTRL,
126 /** Supports HND OTP registers. */
130 /** Supports IPX OTP registers. */
134 /** OTP size is defined via CHIPC_OTPLAYOUT register in later
135 * ChipCommon revisions using the 'IPX' OTP controller. */

12345678910>>...15