/freebsd/crypto/krb5/src/tests/asn.1/ |
H A D | otp.asn1 | 20 PA-OTP-CHALLENGE ::= SEQUENCE { 22 otp-service [1] UTF8String OPTIONAL, 23 otp-tokenInfo [2] SEQUENCE (SIZE(1..MAX)) OF 24 OTP-TOKENINFO, 30 OTP-TOKENINFO ::= SEQUENCE { 32 otp-vendor [1] UTF8String OPTIONAL, 33 otp-challenge [2] OCTET STRING (SIZE(1..MAX)) 35 otp-length [3] Int32 OPTIONAL, 36 otp-format [4] OTPFormat OPTIONAL, 37 otp-tokenID [5] OCTET STRING OPTIONAL, [all …]
|
H A D | make-vectors.c | 38 #include <OTP-TOKENINFO.h> 39 #include <PA-OTP-CHALLENGE.h> 40 #include <PA-OTP-REQUEST.h> 41 #include <PA-OTP-ENC-REQUEST.h> 69 /* Minimal OTP-TOKENINFO */ 72 /* Maximal OTP-TOKENINFO */ 92 /* Minimal PA-OTP-CHALLENGE */ 97 /* Maximal PA-OTP-CHALLENGE */ 106 /* Minimal PA-OTP-REQUEST */ 112 /* Maximal PA-OTP-REQUEST */ [all …]
|
/freebsd/sys/contrib/dev/iwlwifi/ |
H A D | iwl-eeprom-read.c |
|
H A D | iwl-agn-hw.h | 51 #define OTP_MAX_LL_ITEMS_1000 (3) /* OTP blocks for 1000 */ 52 #define OTP_MAX_LL_ITEMS_6x00 (4) /* OTP blocks for 6x00 */ 53 #define OTP_MAX_LL_ITEMS_6x50 (7) /* OTP blocks for 6x50 */ 54 #define OTP_MAX_LL_ITEMS_2x00 (4) /* OTP blocks for 2x00 */
|
/freebsd/sys/contrib/device-tree/Bindings/nvmem/ |
H A D | rockchip,otp.yaml | 4 $id: http://devicetree.org/schemas/nvmem/rockchip,otp.yaml# 7 title: Rockchip internal OTP (One Time Programmable) memory 15 - rockchip,px30-otp 16 - rockchip,rk3308-otp 17 - rockchip,rk3588-otp 29 - const: otp 59 - rockchip,px30-otp 60 - rockchip,rk3308-otp 76 - rockchip,rk3588-otp 85 - const: otp [all...] |
H A D | nintendo-otp.yaml | 4 $id: http://devicetree.org/schemas/nvmem/nintendo-otp.yaml# 7 title: Nintendo Wii and Wii U OTP 10 This binding represents the OTP memory as found on a Nintendo Wii or Wii U, 14 See https://wiiubrew.org/wiki/Hardware/OTP 25 - nintendo,hollywood-otp 26 - nintendo,latte-otp 39 otp@d8001ec { 40 compatible = "nintendo,latte-otp";
|
H A D | rockchip-otp.txt | 1 Rockchip internal OTP (One Time Programmable) memory device tree bindings 5 - "rockchip,px30-otp" - for PX30 SoCs. 6 - "rockchip,rk3308-otp" - for RK3308 SoCs. 9 - clock-names: Should be "otp", "apb_pclk" and "phy". 17 otp: otp@ff290000 { 18 compatible = "rockchip,px30-otp"; 24 clock-names = "otp", "apb_pclk", "phy";
|
H A D | lpc1850-otp.txt | 1 * NXP LPC18xx OTP memory 3 Internal OTP (One Time Programmable) memory for NXP LPC18xx/43xx devices. 6 - compatible: Should be "nxp,lpc1850-otp" 15 otp: otp@40045000 { 16 compatible = "nxp,lpc1850-otp";
|
H A D | st,stm32-romem.yaml | 11 flash, OTP, read-only HW regs... This contains various information such as: 25 - st,stm32f4-otp 40 st,non-secure-otp: 58 compatible = "st,stm32f4-otp"; 69 st,non-secure-otp;
|
H A D | brcm,ocotp.txt | 1 Broadcom OTP memory controller 8 - reg: Base address of the OTP controller. 13 otp: otp@301c800 {
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_otp.c | 2 * EAP peer method: EAP-OTP (RFC 3748) 35 int otp; in eap_otp_process() local 42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", in eap_otp_process() 47 otp = 1; in eap_otp_process() 50 otp = 0; in eap_otp_process() 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); in eap_otp_process() 71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response", in eap_otp_process() 74 if (otp) { in eap_otp_process() 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); in eap_otp_process() 88 EAP_VENDOR_IETF, EAP_TYPE_OTP, "OTP"); in eap_peer_otp_register()
|
/freebsd/sys/contrib/dev/mediatek/mt76/mt7615/ |
H A D | eeprom.c | 60 dev->mt76.otp.data = devm_kzalloc(dev->mt76.dev, len, GFP_KERNEL); in mt7615_efuse_init() 61 dev->mt76.otp.size = len; in mt7615_efuse_init() 62 if (!dev->mt76.otp.data) in mt7615_efuse_init() 65 buf = dev->mt76.otp.data; in mt7615_efuse_init() 286 u8 *otp = dev->mt76.otp.data; in mt7615_apply_cal_free_data() local 289 if (!otp) in mt7615_apply_cal_free_data() 293 if (!otp[ical[i]]) in mt7615_apply_cal_free_data() 297 eeprom[ical[i]] = otp[ical[i]]; in mt7615_apply_cal_free_data() 300 eeprom[ical_nocheck[i]] = otp[ical_nocheck[i]]; in mt7615_apply_cal_free_data() 309 u8 *otp = dev->mt76.otp.data; in mt7622_apply_cal_free_data() local [all …]
|
/freebsd/crypto/krb5/doc/admin/ |
H A D | otp.rst | 3 OTP Preauthentication 6 OTP is a preauthentication mechanism for Kerberos 5 which uses One 7 Time Passwords (OTP) to authenticate the client to the KDC. The OTP 14 Additionally, our implementation of the OTP system allows for the 26 [otp] 59 [otp] 71 To enable OTP for a client principal, the administrator must define 72 the **otp** string attribute for that principal. (See 73 :ref:`set_string`.) The **otp** user string is a JSON string of the 100 #. FAST is required for OTP to work.
|
/freebsd/crypto/krb5/doc/html/_sources/admin/ |
H A D | otp.rst.txt | 3 OTP Preauthentication 6 OTP is a preauthentication mechanism for Kerberos 5 which uses One 7 Time Passwords (OTP) to authenticate the client to the KDC. The OTP 14 Additionally, our implementation of the OTP system allows for the 26 [otp] 59 [otp] 71 To enable OTP for a client principal, the administrator must define 72 the **otp** string attribute for that principal. (See 73 :ref:`set_string`.) The **otp** user string is a JSON string of the 100 #. FAST is required for OTP to work.
|
/freebsd/crypto/krb5/src/plugins/preauth/otp/ |
H A D | main.c | 2 /* plugins/preauth/otp/main.c - OTP kdcpreauth module definition */ 68 com_err("otp", retval, "Unable to decrypt encData in PA-OTP-REQUEST"); in decrypt_encdata() 90 /* Decode the PA-OTP-ENC-REQUEST structure. */ in nonce_verify() 234 /* Determine if otp is enabled for the user. */ in otp_edata() 235 retval = cb->get_string(context, rock, "otp", &config); in otp_edata() 301 com_err("otp", retval, "No armor key found when verifying padata"); in otp_verify() 309 com_err("otp", retval, "Unable to decode OTP request"); in otp_verify() 316 com_err("otp", retval, "Unable to decrypt nonce"); in otp_verify() 326 com_err("otp", retval, "Unable to verify nonce or timestamp"); in otp_verify() 342 /* Get the principal's OTP configuration string. */ in otp_verify() [all …]
|
H A D | otp_state.c | 2 /* plugins/preauth/otp/otp_state.c - Verify OTP token values using RADIUS */ 95 com_err("otp", retval, "Unable to resolve secret file '%s'", filename); in read_secret_file() 102 com_err("otp", retval, "Unable to open secret file '%s'", filename); in read_secret_file() 110 com_err("otp", retval, "Unable to read secret file '%s'", filename); in read_secret_file() 194 retval = profile_get_boolean(profile, "otp", name, "strip_realm", TRUE, in token_type_decode() 200 retval = profile_get_string(profile, "otp", name, "server", NULL, &pstr); in token_type_decode() 216 retval = profile_get_string(profile, "otp", name, "secret", NULL, &pstr); in token_type_decode() 226 com_err("otp", EINVAL, "Secret missing (token type '%s')", name); in token_type_decode() 240 retval = profile_get_integer(profile, "otp", name, "timeout", in token_type_decode() 247 retval = profile_get_integer(profile, "otp", name, "retries", in token_type_decode() [all …]
|
/freebsd/sys/dev/nmdm/ |
H A D | nmdm.c | 107 struct tty *otp; in nmdm_close() local 111 otp = onp->np_tty; in nmdm_close() 114 if (tty_opened(otp)) in nmdm_close() 125 otp = onp->np_tty; in nmdm_close() 126 tty_rel_gone(otp); in nmdm_close() 252 struct tty *tp, *otp; in nmdm_task_tty() local 263 otp = np->np_other->np_tty; in nmdm_task_tty() 264 KASSERT(otp != NULL, ("NULL otp in nmdmstart")); in nmdm_task_tty() 265 KASSERT(otp != tp, ("NULL otp == tp nmdmstart")); in nmdm_task_tty() 269 ttydisc_modem(otp, 0); in nmdm_task_tty() [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/mtd/ |
H A D | mtd.yaml | 47 "^otp(-[0-9]+)?$": 57 An OTP memory region. Some flashes provide a one-time-programmable 64 - user-otp 65 - factory-otp 95 otp-1 { 96 compatible = "factory-otp"; 105 otp-2 { 106 compatible = "user-otp";
|
/freebsd/crypto/krb5/src/tests/ |
H A D | t_otp.py | 25 # This script tests OTP, both UDP and Unix Sockets, with a variety of 28 # test how OTP handles the case of short daemon restarts. 39 skip_rest('OTP tests', 'Python pyrad module not found') 43 skip_rest('OTP tests', 'Python version 2.6 required') 166 # Compose a token configuration list suitable for the "otp" string 178 conf = {'plugins': {'kdcpreauth': {'enable_only': 'otp'}}, 179 'otp': {'udp': {'server': '127.0.0.1:$port9', 198 realm.run([kadminl, 'setstr', realm.user_princ, 'otp', 208 realm.run([kadminl, 'setstr', realm.user_princ, 'otp', otpconfig('udp')]) 221 realm.run([kadminl, 'setstr', realm.user_princ, 'otp', oconf]) [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/fuse/ |
H A D | renesas,rcar-otp.yaml | 4 $id: http://devicetree.org/schemas/fuse/renesas,rcar-otp.yaml# 19 - renesas,r8a779g0-otp # R-CarV4H 20 - renesas,r8a779h0-otp # R-CarV4M 35 otp: otp@e61be000 { 36 compatible = "renesas,r8a779g0-otp";
|
/freebsd/sys/contrib/dev/mediatek/mt76/mt7603/ |
H A D | eeprom.c | 51 dev->mt76.otp.data = devm_kzalloc(dev->mt76.dev, len, GFP_KERNEL); in mt7603_efuse_init() 52 dev->mt76.otp.size = len; in mt7603_efuse_init() 53 if (!dev->mt76.otp.data) in mt7603_efuse_init() 56 buf = dev->mt76.otp.data; in mt7603_efuse_init() 109 if (!np || !of_property_read_bool(np, "mediatek,eeprom-merge-otp")) in mt7603_apply_cal_free_data() 165 if (dev->mt76.otp.data) { in mt7603_eeprom_init() 167 mt7603_apply_cal_free_data(dev, dev->mt76.otp.data); in mt7603_eeprom_init() 169 memcpy(dev->mt76.eeprom.data, dev->mt76.otp.data, in mt7603_eeprom_init()
|
/freebsd/crypto/krb5/doc/html/_sources/appdev/refs/macros/ |
H A D | KRB5_RESPONDER_QUESTION_OTP.rst.txt | 3 .. _KRB5-RESPONDER-QUESTION-OTP-data: 12 OTP responder question. 14 The OTP responder question is asked when the KDC indicates that an OTP value is required in order t… 46 ``KRB5_RESPONDER_QUESTION_OTP`` ``"otp"``
|
/freebsd/crypto/krb5/doc/html/admin/ |
H A D | otp.html | 9 <title>OTP Preauthentication — MIT Kerberos Documentation</title> 55 <section id="otp-preauthentication"> 56 <span id="otp-preauth"></span><h1>OTP Preauthentication<a class="headerlink" href="#otp-preauthenti… 57 <p>OTP is a preauthentication mechanism for Kerberos 5 which uses One 58 Time Passwords (OTP) to authenticate the client to the KDC. The OTP 64 <p>Additionally, our implementation of the OTP system allows for the 72 …lass="highlight"><pre><span></span><span class="p">[</span><span class="n">otp</span><span class="… 101 …lass="highlight"><pre><span></span><span class="p">[</span><span class="n">otp</span><span class="… 112 <p>To enable OTP for a client principal, the administrator must define 113 the <strong>otp</strong> string attribute for that principal. (See [all …]
|
H A D | auth_indicator.html | 59 …</span></a> or <a class="reference internal" href="otp.html#otp-preauth"><span class="std std-ref"… 65 <p>To use authentication indicators with PKINIT or OTP, first configure 68 …_conf.html#kdc-conf-5"><span class="std std-ref">kdc.conf</span></a>. For OTP, use the <strong>in… 69 token type definition, or specify the indicators in the <strong>otp</strong> user 70 …s described in <a class="reference internal" href="otp.html#otp-preauth"><span class="std std-ref"… 137 <li class="toctree-l2"><a class="reference internal" href="otp.html">OTP Preauthentication</a></li>
|
/freebsd/sys/dev/bhnd/cores/chipc/ |
H A D | chipcvar.h | 63 * ChipCommon-controlled SPROM/OTP is supported, along with the 122 /** Supports HND or IPX OTP registers (CHIPC_OTPST, CHIPC_OTPCTRL, 126 /** Supports HND OTP registers. */ 130 /** Supports IPX OTP registers. */ 134 /** OTP size is defined via CHIPC_OTPLAYOUT register in later 135 * ChipCommon revisions using the 'IPX' OTP controller. */
|