/freebsd/crypto/heimdal/lib/krb5/ |
H A D | auth_context.c | 48 ALLOC(p->authenticator, 1); in krb5_auth_con_init() 49 if (!p->authenticator) { in krb5_auth_con_init() 54 memset (p->authenticator, 0, sizeof(*p->authenticator)); in krb5_auth_con_init() 72 krb5_free_authenticator(context, &auth_context->authenticator); in krb5_auth_con_free() 452 krb5_authenticator *authenticator) in krb5_auth_con_getauthenticator() argument 454 *authenticator = malloc(sizeof(**authenticator)); in krb5_auth_con_getauthenticator() 455 if (*authenticator == NULL) { in krb5_auth_con_getauthenticator() 460 copy_Authenticator(auth_context->authenticator, in krb5_auth_con_getauthenticator() 461 *authenticator); in krb5_auth_con_getauthenticator() 468 krb5_authenticator *authenticator) in krb5_free_authenticator() argument [all …]
|
H A D | build_ap_req.c | 41 krb5_data authenticator, in krb5_build_ap_req() argument 63 ap.authenticator.etype = enctype; in krb5_build_ap_req() 64 ap.authenticator.kvno = NULL; in krb5_build_ap_req() 65 ap.authenticator.cipher = authenticator; in krb5_build_ap_req()
|
H A D | rd_req.c | 73 Authenticator *authenticator, in decrypt_authenticator() argument 101 authenticator, &len); in decrypt_authenticator() 185 ad = auth_context->authenticator->authorization_data; in find_etypelist() 280 krb5_authenticator authenticator; in krb5_verify_authenticator_checksum() local 285 &authenticator); in krb5_verify_authenticator_checksum() 288 if(authenticator->cksum == NULL) { in krb5_verify_authenticator_checksum() 289 krb5_free_authenticator(context, &authenticator); in krb5_verify_authenticator_checksum() 294 krb5_free_authenticator(context, &authenticator); in krb5_verify_authenticator_checksum() 305 authenticator->cksum); in krb5_verify_authenticator_checksum() 308 krb5_free_authenticator(context, &authenticator); in krb5_verify_authenticator_checksum() [all …]
|
H A D | mk_req_ext.c | 47 krb5_data authenticator; in _krb5_mk_req_internal() local 131 &authenticator, in _krb5_mk_req_internal() 139 in_creds, ap_req_options, authenticator, outbuf); in _krb5_mk_req_internal()
|
H A D | rd_rep.c | 89 if ((*repl)->ctime != auth_context->authenticator->ctime || in krb5_rd_rep() 90 (*repl)->cusec != auth_context->authenticator->cusec) in krb5_rd_rep()
|
H A D | mk_rep.c | 54 body.ctime = auth_context->authenticator->ctime; in krb5_mk_rep() 55 body.cusec = auth_context->authenticator->cusec; in krb5_mk_rep()
|
H A D | build_auth.c | 170 auth_context->authenticator->ctime = auth.ctime; in _krb5_build_authenticator() 171 auth_context->authenticator->cusec = auth.cusec; in _krb5_build_authenticator()
|
H A D | krb_err.et | 29 ec RD_AP_UNDEC, "Kerberos 4: Can't decode authenticator"
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius.c | 497 os_memcpy(msg->hdr->authenticator, req_authenticator, in radius_msg_finish_srv() 498 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv() 512 md5_vector(4, addr, len, msg->hdr->authenticator); in radius_msg_finish_srv() 536 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp() 546 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) in radius_msg_finish_das_resp() 565 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); in radius_msg_finish_acct() 570 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct() 586 os_memcpy(msg->hdr->authenticator, req_authenticator, MD5_MAC_LEN); in radius_msg_finish_acct_resp() 591 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct_resp() 618 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() [all …]
|
H A D | radius_server.c | 977 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator, in radius_server_encapsulate_eap() 1149 hdr->authenticator) < 0) { in radius_server_encapsulate_eap() 1238 hdr->authenticator) < 0) { in radius_server_macacl() 1288 hdr->authenticator) < in radius_server_reject() 1407 radius_msg_get_hdr(msg)->authenticator, 16) == 0) { in radius_server_request() 1538 os_memcpy(sess->last_authenticator, hdr->authenticator, 16); in radius_server_request() 1909 hdr->authenticator); in radius_server_receive_acct()
|
/freebsd/crypto/heimdal/lib/gssapi/krb5/ |
H A D | accept_sec_context.c | 428 free_Authenticator(ctx->auth_context->authenticator); in gsskrb5_acceptor_start() 503 krb5_authenticator authenticator; in gsskrb5_acceptor_start() local 507 &authenticator); in gsskrb5_acceptor_start() 514 if (authenticator->cksum == NULL) { in gsskrb5_acceptor_start() 515 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start() 520 if (authenticator->cksum->cksumtype == CKSUMTYPE_GSSAPI) { in gsskrb5_acceptor_start() 523 authenticator->cksum, in gsskrb5_acceptor_start() 527 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start() 538 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start() 552 authenticator->cksum); in gsskrb5_acceptor_start() [all …]
|
H A D | init_sec_context.c | 528 krb5_data authenticator; in init_auth_restart() local 648 &authenticator, in init_auth_restart() 663 authenticator, in init_auth_restart()
|
/freebsd/crypto/heimdal/doc/ |
H A D | whatis.texi | 92 Before sending a message to @var{B}, @var{A} creates an authenticator 99 contains the session key that the authenticator was encrypted with, 100 @var{B} can now also decrypt the authenticator. To verify that @var{A} 102 with that of the authenticator. If everything matches, @var{B} now 111 An impostor, @var{C} could steal the authenticator and the ticket as it 113 @var{A}. The address in the ticket and the authenticator was added to 117 authenticator, @var{C} does not have much time in which to mount the 139 authenticator. One typical procedure is to add one to the checksum,
|
/freebsd/contrib/libfido2/examples/ |
H A D | README.adoc | 54 was signed by the authenticator. The device's attestation certificate 76 authenticator. The -v option requests user verification and checks 77 whether the user verification bit was signed by the authenticator. 80 specified, a FIDO2 hmac-secret is requested from the authenticator, 97 If set, libfido2 will produce a log of its transactions with the authenticator.
|
/freebsd/contrib/wpa/src/wps/ |
H A D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument 23 if (authenticator == NULL) { in wps_process_authenticator() 45 os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
|
H A D | wps_validate.c | 766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument 768 if (authenticator == NULL) { in wps_validate_authenticator() 1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2() 1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3() 1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4() 1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5() 1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6() 1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7() 1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
|
H A D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
|
H A D | wps_enrollee.c | 997 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m2() 1112 wps_process_authenticator(wps, attr->authenticator, msg) || in wps_process_m4() 1167 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m6() 1224 wps_process_authenticator(wps, attr->authenticator, msg)) { in wps_process_m8()
|
H A D | wps_i.h | 187 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator,
|
/freebsd/contrib/libfido2/fuzz/ |
H A D | README | 4 AFL is more convenient when fuzzing the path from the authenticator to 6 authenticator to obtain an initial corpus, rebuild libfido2 with -DFUZZ=ON, and
|
/freebsd/contrib/wpa/hostapd/ |
H A D | hostapd.sim_db | 1 # Example GSM authentication triplet file for EAP-SIM authenticator
|
H A D | hostapd.eap_user | 36 # Multiple methods can be configured to make the authenticator try them one by 42 # authenticator advertises the highest supported version and select the version
|
/freebsd/crypto/heimdal/lib/asn1/ |
H A D | kx509.asn1 | 18 authenticator OCTET STRING,
|
/freebsd/crypto/openssl/crypto/crmf/ |
H A D | crmf_local.h | 345 ASN1_UTF8STRING *authenticator; member
|
/freebsd/sys/contrib/dev/athk/ |
H A D | key.c | 341 bool authenticator) in ath_setkey_tkip() argument 355 if (authenticator) { in ath_setkey_tkip()
|