Home
last modified time | relevance | path

Searched +full:user +full:- +full:otp (Results 1 – 25 of 69) sorted by relevance

123

/freebsd/sys/contrib/device-tree/Bindings/mtd/
H A Dmtd.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Miquel Raynal <miquel.raynal@bootlin.com>
11 - Richard Weinberger <richard@nod.at>
21 User-defined MTD device name. Can be used to assign user friendly
26 '#address-cells':
29 '#size-cells':
36 - compatible
39 "@[0-9a-f]+$":
[all …]
H A Dnand-macronix.txt2 -----------------------------------
4 Macronix NANDs support randomizer operation for scrambling user data,
11 For more high-reliability concern, if subpage write is not available
17 - randomizer enable: should be "mxic,enable-randomizer-otp"
21 nand: nand-controller@unit-address {
25 mxic,enable-randomizer-otp;
/freebsd/crypto/heimdal/appl/ftp/ftpd/
H A Dftpd.850 .Op Fl Fl gss-bindings
51 .Op Fl I | Fl Fl no-insecure-oob
53 .Op Fl B | Fl Fl builtin-ls
54 .Op Fl Fl good-chars= Ns Ar string
68 .Bl -tag -width Ds
76 .Bl -tag -width plain
78 Allow logging in with plaintext password. The password can be a(n) OTP
80 .It Ar otp
83 but only OTP is allowed.
89 .Bl -tag -width plain
[all …]
H A Dftpd.c78 int pdata = -1; /* for passive mode */
97 #define AUTH_OTP (1 << 1) /* passwords are one-time */
128 if (cnt == (off_t)-1) \
156 if (getcwd(path, sizeof(path)-1) == NULL) in curdir()
178 if(strcmp(p, "user") == 0) in parse_auth_level()
180 #ifdef OTP in parse_auth_level()
181 else if(strcmp(p, "otp") == 0) in parse_auth_level()
192 warnx("bad value for -a: `%s'", p); in parse_auth_level()
207 int use_builtin_ls = -1;
212 static const char *good_chars = "+-=_,.";
[all …]
/freebsd/crypto/heimdal/appl/login/
H A Dlogin.18 .Nd authenticate a user and start new session
28 If you are already logged in, but want to change to another user, you
40 the user will be logged in without further questions.
45 passwords are supported. OTP will be used if the the user is
49 .Fl a Li otp .
50 When using OTP, a challenge is shown to the user.
53 .Bl -tag -width Ds
57 .Dq otp .
59 Indicates that the user is already authenticated. This happens, for
60 instance, when login is started by telnetd, and the user has proved
[all …]
H A Dlogin.c2 * Copyright (c) 1997 - 2006 Kungliga Tekniska Högskolan
88 if(pid == -1) in start_logout_process()
124 if (asprintf(&sh, "-%s", p) == -1) in exec_shell()
130 execle(_PATH_BSHELL, "-sh", NULL, env); in exec_shell()
138 #ifdef OTP
146 #endif /* OTP */
161 ret = krb5_parse_name(context, pwd->pw_name, &princ); in krb5_verify()
187 (unsigned)pwd->pw_uid); in krb5_start_session()
220 pw_dir = pwd->pw_dir; in krb5_get_afs_tokens()
229 cell, NULL, pwd->pw_uid, pwd->pw_dir); in krb5_get_afs_tokens()
[all …]
/freebsd/contrib/wpa/wpa_supplicant/doc/docbook/
H A Dwpa_cli.sgml1 <!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN">
21 <arg>-p <replaceable>path to ctrl sockets</replaceable></arg>
22 <arg>-g <replaceable>path to global ctrl_interface socket</replaceable></arg>
23 <arg>-i <replaceable>ifname</replaceable></arg>
24 <arg>-hvB</arg>
25 <arg>-a <replaceable>action file</replaceable></arg>
26 <arg>-P <replaceable>pid file</replaceable></arg>
27 <arg>-G <replaceable>ping interval</replaceable></arg>
35 <para>wpa_cli is a text-based frontend program for interacting
37 configuration, trigger events, and request interactive user
[all …]
/freebsd/usr.sbin/wpa/wpa_cli/
H A Dwpa_cli.81 .\"-
2 .\" SPDX-License-Identifier: BSD-2-Clause
48 is a text-based frontend program for interacting with
54 request interactive user input.
77 one-time passwords or generic token card
79 challenge-response that uses an external device for generating the
103 non-root user access by using the
111 with a normal user account.
124 .Dq Li CTRL-REQ- Ns Ao Ar type Ac Ns Li - Ns Ao Ar id Ac : Ns Aq Ar text
130 .Li OTP
[all …]
/freebsd/contrib/wpa/wpa_supplicant/
H A DREADME4 Copyright (c) 2003-2024, Jouni Malinen <j@w1.fi> and contributors
16 -------
32 3. Neither the name(s) of the above-listed copyright holder(s) nor the
51 --------
54 - WPA-PSK ("WPA-Personal")
55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
58 * EAP-TLS
59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)
60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1)
61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1)
[all …]
H A Deap_testing.txt5 - Linked some parts of IEEE 802.1X Authenticator implementation from
6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
8 - Replaced wpa_supplicant.c and wpa.c with test code that trigger
11 - For EAP methods that generate keying material, the key derived by the
17 this take a bit more time.. ;-) As an extra bonus, this can also be
23 address) and I will need to get suitable user name/password pairs,
35 -) server did not support
38 Cisco ACS ----------------------------------------------------------.
39 hostapd --------------------------------------------------------. |
40 Cisco Aironet 1200 AP (local RADIUS server) ----------------. | |
[all …]
H A Dtodo.txt2 - add support for WPA with ap_scan=0 (update selected cipher etc. based on
4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
8 - if driver/hw is not WPA2 capable, must remove WPA_PROTO_RSN flag from
9 ssid->proto fields to avoid detecting downgrade attacks when the driver
11 - Cisco AP and non-zero keyidx for unicast -> map to broadcast
13 driver_*.c to do the mapping for drivers that cannot handle non-zero keyidx
15 - IEEE 802.1X and key update with driver_ndis?? wpa_supplicant did not seem
16 to see unencrypted EAPOL-Key frames at all..
17 - EAP-PAX with PAX_SEC
18 - EAP (RFC 3748)
[all …]
/freebsd/sys/contrib/device-tree/Bindings/nvmem/
H A Dmicrochip,lan9662-otpc.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/nvmem/microchip,lan9662-otpc.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Microchip LAN9662 OTP Controller (OTPC)
10 - Horatiu Vultur <horatiu.vultur@microchip.com>
13 OTP controller drives a NVMEM memory where system specific data
15 user specific data could be stored.
18 - $ref: nvmem.yaml#
23 - items:
[all …]
H A Dmicrochip,sama7g5-otpc.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/nvmem/microchip,sama7g5-otpc.yaml#
5 $schema: http://devicetree.org/meta-schema
[all...]
/freebsd/crypto/krb5/src/plugins/preauth/otp/
H A Dmain.c1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
2 /* plugins/preauth/otp/main.c - OTP kdcpreauth module definition */
31 #include "k5-int.h"
32 #include "k5-json.h"
61 retval = alloc_data(&plaintext, req->enc_data.ciphertext.length); in decrypt_encdata()
66 NULL, &req->enc_data, &plaintext); in decrypt_encdata()
68 com_err("otp", retval, "Unable to decrypt encData in PA-OTP-REQUEST"); in decrypt_encdata()
85 if (armor_key == NULL || nonce->data == NULL) { in nonce_verify()
90 /* Decode the PA-OTP-ENC-REQUEST structure. */ in nonce_verify()
96 if (er->length != armor_key->length + sizeof(krb5_timestamp)) in nonce_verify()
[all …]
/freebsd/sys/contrib/device-tree/Bindings/nvmem/layouts/
H A Dkontron,sl28-vpd.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/nvmem/layouts/kontron,sl28-vpd.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: NVMEM layout of the Kontron SMARC-sAL28 vital product data
10 - Michael Walle <michael@walle.cc>
15 on-board ethernet devices are derived from this base MAC address by
22 const: kontron,sl28-vpd
24 serial-number:
30 base-mac-address:
[all …]
H A Donie,tlv-layout.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/nvmem/layouts/onie,tlv-layout.yaml#
5 $schema: http://devicetree.org/meta-schema
[all...]
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_config.h3 * Copyright (c) 2003-2019, Jouni Malinen <j@w1.fi>
13 * struct eap_peer_cert_config - EAP peer certificate configuration/credential
17 * ca_cert - File path to CA certificate file (PEM/DER)
22 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the
30 * server certificate (SHA-256 hash of the DER encoded X.509
41 * Note that when running wpa_supplicant as an application, the user
42 * certificate store (My user account) is used, whereas computer store
48 * ca_path - Directory path for CA certificate files (PEM)
59 * client_cert - File path to client certificate file (PEM/DER)
62 * Usually, this is only configured for EAP-TLS, even though this could
[all …]
/freebsd/crypto/heimdal/lib/asn1/
H A Dkrb5.asn11 -- $Id$
6 AD-AND-OR,
7 AD-IF-RELEVANT,
8 AD-KDCIssued,
9 AD-LoginAlias,
10 AP-REP,
11 AP-REQ,
12 AS-REP,
13 AS-REQ,
14 AUTHDATA-TYPE,
[all …]
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dpreauth_otp.c1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
2 /* lib/krb5/krb/preauth_otp.c - OTP clpreauth module */
31 #include "k5-int.h"
32 #include "k5-json.h"
33 #include "int-proto.h"
34 #include "os-proto.h"
49 free(ti->alg_id); in free_tokeninfo()
50 free(ti->challenge); in free_tokeninfo()
51 free(ti->token_id); in free_tokeninfo()
52 free(ti->vendor); in free_tokeninfo()
[all …]
/freebsd/crypto/heimdal/lib/krb5/
H A Dkrb5_err.et32 error_code CLIENT_NOTYET, "Client not yet valid - try again later"
33 error_code SERVICE_NOTYET, "Server not yet valid - try again later"
36 error_code PREAUTH_REQUIRED, "Additional pre-authentication required"
56 error_code ERR_ILL_CR_TKT, "Invalid cross-realm ticket"
68 # 53-59 are reserved
70 error_code GENERIC, "Generic error (see e-text)"
87 error_code USER_TO_USER_REQUIRED, "User to user required"
109 # 82-93 are reserved
112 error_code INVALID_HASH_ALG, "Invalid OTP digest algorithm"
113 error_code INVALID_ITERATION_COUNT, "Invalid OTP iteration count"
[all …]
/freebsd/usr.sbin/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf.565 .Bl -tag -width indent
77 This can be set to allow non-root users to access the
87 is implemented according to IEEE 802-1X-REV-d8 which defines
101 EAP fast re-authentication; either 1 (default) or 0.
102 Control fast re-authentication support in EAP methods that support it.
114 .Bd -literal -offset indent
126 .Bl -tag -width indent
158 .Li WPA-NONE
163 .Li WPA-NONE
168 set to WPA-NONE,
[all …]
/freebsd/contrib/nvi/ex/
H A Dex_tag.c1 /*-
49 * ex_tag_first --
50 * The tag code can be entered from main, e.g., "vi -t tag".
80 * ex_tag_push -- ^]
95 switch (cmdp->argc) { in ex_tag_push()
97 free(exp->tag_last); in ex_tag_push()
99 if ((exp->tag_last = v_wstrdup(sp, cmdp->argv[0]->bp, in ex_tag_push()
100 cmdp->argv[0]->len)) == NULL) { in ex_tag_push()
107 O_VAL(sp, O_TAGLENGTH)) != 0 && STRLEN(exp->tag_last) > tl) in ex_tag_push()
108 exp->tag_last[tl] = '\0'; in ex_tag_push()
[all …]
/freebsd/crypto/krb5/src/man/
H A Dkdc.conf.man5 .nr rst2man-indent-level 0
8 \\$1 \\n[an-margin]
9 level \\n[rst2man-indent-level]
10 level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
11 -
12 \\n[rst2man-indent0]
13 \\n[rst2man-indent1]
14 \\n[rst2man-indent2]
19 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]
20 . nr rst2man-indent-level +1
[all …]
H A Dkadmin.man4 .nr rst2man-indent-level 0
7 \\$1 \\n[an-margin]
8 level \\n[rst2man-indent-level]
9 level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
10 -
11 \\n[rst2man-indent0]
12 \\n[rst2man-indent1]
13 \\n[rst2man-indent2]
18 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]
19 . nr rst2man-indent-level +1
[all …]
/freebsd/crypto/heimdal/appl/telnet/telnetd/
H A Dtelnetd.849 .Op Fl r Ns Ar lowpty-highpty
89 .Bl -tag -width "-a authmode"
100 .Bl -tag -width debug
103 .It user
104 Only allow connections when the remote user
106 to identify the remote user,
110 Only allow connections when the remote user
112 to identify the remote user.
115 command will provide any additional user verification
116 needed if the remote user is not allowed automatic
[all …]

123