| /freebsd/sys/contrib/device-tree/Bindings/mtd/ |
| H A D | mtd.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Miquel Raynal <miquel.raynal@bootlin.com> 11 - Richard Weinberger <richard@nod.at> 21 User-defined MTD device name. Can be used to assign user friendly 26 '#address-cells': 29 '#size-cells': 36 - compatible 39 "@[0-9a-f]+$": [all …]
|
| H A D | nand-macronix.txt | 2 ----------------------------------- 4 Macronix NANDs support randomizer operation for scrambling user data, 11 For more high-reliability concern, if subpage write is not available 17 - randomizer enable: should be "mxic,enable-randomizer-otp" 21 nand: nand-controller@unit-address { 25 mxic,enable-randomizer-otp;
|
| /freebsd/crypto/heimdal/appl/ftp/ftpd/ |
| H A D | ftpd.8 | 50 .Op Fl Fl gss-bindings 51 .Op Fl I | Fl Fl no-insecure-oob 53 .Op Fl B | Fl Fl builtin-ls 54 .Op Fl Fl good-chars= Ns Ar string 68 .Bl -tag -width Ds 76 .Bl -tag -width plain 78 Allow logging in with plaintext password. The password can be a(n) OTP 80 .It Ar otp 83 but only OTP is allowed. 89 .Bl -tag -width plain [all …]
|
| H A D | ftpd.c | 78 int pdata = -1; /* for passive mode */ 97 #define AUTH_OTP (1 << 1) /* passwords are one-time */ 128 if (cnt == (off_t)-1) \ 156 if (getcwd(path, sizeof(path)-1) == NULL) in curdir() 178 if(strcmp(p, "user") == 0) in parse_auth_level() 180 #ifdef OTP in parse_auth_level() 181 else if(strcmp(p, "otp") == 0) in parse_auth_level() 192 warnx("bad value for -a: `%s'", p); in parse_auth_level() 207 int use_builtin_ls = -1; 212 static const char *good_chars = "+-=_,."; [all …]
|
| /freebsd/crypto/heimdal/appl/login/ |
| H A D | login.1 | 8 .Nd authenticate a user and start new session 28 If you are already logged in, but want to change to another user, you 40 the user will be logged in without further questions. 45 passwords are supported. OTP will be used if the the user is 49 .Fl a Li otp . 50 When using OTP, a challenge is shown to the user. 53 .Bl -tag -width Ds 57 .Dq otp . 59 Indicates that the user is already authenticated. This happens, for 60 instance, when login is started by telnetd, and the user has proved [all …]
|
| H A D | login.c | 2 * Copyright (c) 1997 - 2006 Kungliga Tekniska Högskolan 88 if(pid == -1) in start_logout_process() 124 if (asprintf(&sh, "-%s", p) == -1) in exec_shell() 130 execle(_PATH_BSHELL, "-sh", NULL, env); in exec_shell() 138 #ifdef OTP 146 #endif /* OTP */ 161 ret = krb5_parse_name(context, pwd->pw_name, &princ); in krb5_verify() 187 (unsigned)pwd->pw_uid); in krb5_start_session() 220 pw_dir = pwd->pw_dir; in krb5_get_afs_tokens() 229 cell, NULL, pwd->pw_uid, pwd->pw_dir); in krb5_get_afs_tokens() [all …]
|
| /freebsd/contrib/wpa/wpa_supplicant/doc/docbook/ |
| H A D | wpa_cli.sgml | 1 <!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN"> 21 <arg>-p <replaceable>path to ctrl sockets</replaceable></arg> 22 <arg>-g <replaceable>path to global ctrl_interface socket</replaceable></arg> 23 <arg>-i <replaceable>ifname</replaceable></arg> 24 <arg>-hvB</arg> 25 <arg>-a <replaceable>action file</replaceable></arg> 26 <arg>-P <replaceable>pid file</replaceable></arg> 27 <arg>-G <replaceable>ping interval</replaceable></arg> 35 <para>wpa_cli is a text-based frontend program for interacting 37 configuration, trigger events, and request interactive user [all …]
|
| /freebsd/usr.sbin/wpa/wpa_cli/ |
| H A D | wpa_cli.8 | 1 .\"- 2 .\" SPDX-License-Identifier: BSD-2-Clause 48 is a text-based frontend program for interacting with 54 request interactive user input. 77 one-time passwords or generic token card 79 challenge-response that uses an external device for generating the 103 non-root user access by using the 111 with a normal user account. 124 .Dq Li CTRL-REQ- Ns Ao Ar type Ac Ns Li - Ns Ao Ar id Ac : Ns Aq Ar text 130 .Li OTP [all …]
|
| /freebsd/contrib/wpa/wpa_supplicant/ |
| H A D | README | 4 Copyright (c) 2003-2024, Jouni Malinen <j@w1.fi> and contributors 16 ------- 32 3. Neither the name(s) of the above-listed copyright holder(s) nor the 51 -------- 54 - WPA-PSK ("WPA-Personal") 55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 58 * EAP-TLS 59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1) 60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1) 61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1) [all …]
|
| H A D | eap_testing.txt | 5 - Linked some parts of IEEE 802.1X Authenticator implementation from 6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS 8 - Replaced wpa_supplicant.c and wpa.c with test code that trigger 11 - For EAP methods that generate keying material, the key derived by the 17 this take a bit more time.. ;-) As an extra bonus, this can also be 23 address) and I will need to get suitable user name/password pairs, 35 -) server did not support 38 Cisco ACS ----------------------------------------------------------. 39 hostapd --------------------------------------------------------. | 40 Cisco Aironet 1200 AP (local RADIUS server) ----------------. | | [all …]
|
| H A D | todo.txt | 2 - add support for WPA with ap_scan=0 (update selected cipher etc. based on 4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA 8 - if driver/hw is not WPA2 capable, must remove WPA_PROTO_RSN flag from 9 ssid->proto fields to avoid detecting downgrade attacks when the driver 11 - Cisco AP and non-zero keyidx for unicast -> map to broadcast 13 driver_*.c to do the mapping for drivers that cannot handle non-zero keyidx 15 - IEEE 802.1X and key update with driver_ndis?? wpa_supplicant did not seem 16 to see unencrypted EAPOL-Key frames at all.. 17 - EAP-PAX with PAX_SEC 18 - EAP (RFC 3748) [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/nvmem/ |
| H A D | microchip,lan9662-otpc.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/nvmem/microchip,lan9662-otpc.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Microchip LAN9662 OTP Controller (OTPC) 10 - Horatiu Vultur <horatiu.vultur@microchip.com> 13 OTP controller drives a NVMEM memory where system specific data 15 user specific data could be stored. 18 - $ref: nvmem.yaml# 23 - items: [all …]
|
| H A D | microchip,sama7g5-otpc.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/nvmem/microchip,sama7g5-otpc.yaml# 5 $schema: http://devicetree.org/meta-schema [all...] |
| /freebsd/crypto/krb5/src/plugins/preauth/otp/ |
| H A D | main.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 2 /* plugins/preauth/otp/main.c - OTP kdcpreauth module definition */ 31 #include "k5-int.h" 32 #include "k5-json.h" 61 retval = alloc_data(&plaintext, req->enc_data.ciphertext.length); in decrypt_encdata() 66 NULL, &req->enc_data, &plaintext); in decrypt_encdata() 68 com_err("otp", retval, "Unable to decrypt encData in PA-OTP-REQUEST"); in decrypt_encdata() 85 if (armor_key == NULL || nonce->data == NULL) { in nonce_verify() 90 /* Decode the PA-OTP-ENC-REQUEST structure. */ in nonce_verify() 96 if (er->length != armor_key->length + sizeof(krb5_timestamp)) in nonce_verify() [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/nvmem/layouts/ |
| H A D | kontron,sl28-vpd.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/nvmem/layouts/kontron,sl28-vpd.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: NVMEM layout of the Kontron SMARC-sAL28 vital product data 10 - Michael Walle <michael@walle.cc> 15 on-board ethernet devices are derived from this base MAC address by 22 const: kontron,sl28-vpd 24 serial-number: 30 base-mac-address: [all …]
|
| H A D | onie,tlv-layout.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/nvmem/layouts/onie,tlv-layout.yaml# 5 $schema: http://devicetree.org/meta-schema [all...] |
| /freebsd/contrib/wpa/src/eap_peer/ |
| H A D | eap_config.h | 3 * Copyright (c) 2003-2019, Jouni Malinen <j@w1.fi> 13 * struct eap_peer_cert_config - EAP peer certificate configuration/credential 17 * ca_cert - File path to CA certificate file (PEM/DER) 22 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the 30 * server certificate (SHA-256 hash of the DER encoded X.509 41 * Note that when running wpa_supplicant as an application, the user 42 * certificate store (My user account) is used, whereas computer store 48 * ca_path - Directory path for CA certificate files (PEM) 59 * client_cert - File path to client certificate file (PEM/DER) 62 * Usually, this is only configured for EAP-TLS, even though this could [all …]
|
| /freebsd/crypto/heimdal/lib/asn1/ |
| H A D | krb5.asn1 | 1 -- $Id$ 6 AD-AND-OR, 7 AD-IF-RELEVANT, 8 AD-KDCIssued, 9 AD-LoginAlias, 10 AP-REP, 11 AP-REQ, 12 AS-REP, 13 AS-REQ, 14 AUTHDATA-TYPE, [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | preauth_otp.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 2 /* lib/krb5/krb/preauth_otp.c - OTP clpreauth module */ 31 #include "k5-int.h" 32 #include "k5-json.h" 33 #include "int-proto.h" 34 #include "os-proto.h" 49 free(ti->alg_id); in free_tokeninfo() 50 free(ti->challenge); in free_tokeninfo() 51 free(ti->token_id); in free_tokeninfo() 52 free(ti->vendor); in free_tokeninfo() [all …]
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | krb5_err.et | 32 error_code CLIENT_NOTYET, "Client not yet valid - try again later" 33 error_code SERVICE_NOTYET, "Server not yet valid - try again later" 36 error_code PREAUTH_REQUIRED, "Additional pre-authentication required" 56 error_code ERR_ILL_CR_TKT, "Invalid cross-realm ticket" 68 # 53-59 are reserved 70 error_code GENERIC, "Generic error (see e-text)" 87 error_code USER_TO_USER_REQUIRED, "User to user required" 109 # 82-93 are reserved 112 error_code INVALID_HASH_ALG, "Invalid OTP digest algorithm" 113 error_code INVALID_ITERATION_COUNT, "Invalid OTP iteration count" [all …]
|
| /freebsd/usr.sbin/wpa/wpa_supplicant/ |
| H A D | wpa_supplicant.conf.5 | 65 .Bl -tag -width indent 77 This can be set to allow non-root users to access the 87 is implemented according to IEEE 802-1X-REV-d8 which defines 101 EAP fast re-authentication; either 1 (default) or 0. 102 Control fast re-authentication support in EAP methods that support it. 114 .Bd -literal -offset indent 126 .Bl -tag -width indent 158 .Li WPA-NONE 163 .Li WPA-NONE 168 set to WPA-NONE, [all …]
|
| /freebsd/contrib/nvi/ex/ |
| H A D | ex_tag.c | 1 /*- 49 * ex_tag_first -- 50 * The tag code can be entered from main, e.g., "vi -t tag". 80 * ex_tag_push -- ^] 95 switch (cmdp->argc) { in ex_tag_push() 97 free(exp->tag_last); in ex_tag_push() 99 if ((exp->tag_last = v_wstrdup(sp, cmdp->argv[0]->bp, in ex_tag_push() 100 cmdp->argv[0]->len)) == NULL) { in ex_tag_push() 107 O_VAL(sp, O_TAGLENGTH)) != 0 && STRLEN(exp->tag_last) > tl) in ex_tag_push() 108 exp->tag_last[tl] = '\0'; in ex_tag_push() [all …]
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | kdc.conf.man | 5 .nr rst2man-indent-level 0 8 \\$1 \\n[an-margin] 9 level \\n[rst2man-indent-level] 10 level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] 11 - 12 \\n[rst2man-indent0] 13 \\n[rst2man-indent1] 14 \\n[rst2man-indent2] 19 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] 20 . nr rst2man-indent-level +1 [all …]
|
| H A D | kadmin.man | 4 .nr rst2man-indent-level 0 7 \\$1 \\n[an-margin] 8 level \\n[rst2man-indent-level] 9 level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] 10 - 11 \\n[rst2man-indent0] 12 \\n[rst2man-indent1] 13 \\n[rst2man-indent2] 18 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] 19 . nr rst2man-indent-level +1 [all …]
|
| /freebsd/crypto/heimdal/appl/telnet/telnetd/ |
| H A D | telnetd.8 | 49 .Op Fl r Ns Ar lowpty-highpty 89 .Bl -tag -width "-a authmode" 100 .Bl -tag -width debug 103 .It user 104 Only allow connections when the remote user 106 to identify the remote user, 110 Only allow connections when the remote user 112 to identify the remote user. 115 command will provide any additional user verification 116 needed if the remote user is not allowed automatic [all …]
|