| /freebsd/usr.sbin/ctld/ |
| H A D | ctl.conf.5 | 47 .Bd -literal -offset indent 50 .No auth-group Ar name No { 55 .No portal-group Ar name No { 57 .\".Dl listen-iser Ar address 58 .Dl discovery-auth-group Ar name 62 .No transport-group Ar name No { 68 .Dl auth-group Ar name 69 .Dl portal-group Ar name 77 .Dl auth-group Ar name 78 .Dl transport-group Ar name [all …]
|
| /freebsd/secure/libexec/sshd-auth/ |
| H A D | Makefile | 4 PROG= sshd-auth 5 SRCS= sshd-auth.c \ 6 auth2-methods.c \ 7 auth-rhosts.c auth-passwd.c sshpty.c sshlogin.c servconf.c \ 8 serverloop.c auth.c auth2.c auth-options.c session.c auth2-chall.c \ 9 groupaccess.c auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \ 10 auth2-none.c auth2-passwd.c auth2-pubkey.c auth2-pubkeyfile.c \ 11 auth2-gss.c gss-serv.c gss-serv-krb5.c \ 12 monitor_wrap.c auth-krb5.c \ 13 audit.c audit-bsm.c audit-linux.c platform.c \ [all …]
|
| /freebsd/sys/dev/qat_c2xxx/ |
| H A D | qat_hw15reg.h | 1 /* SPDX-License-Identifier: BSD-2-Clause AND BSD-3-Clause */ 31 * Copyright(c) 2007-2013 Intel Corporation. All rights reserved. 72 /* -------------------------------------------------------------------------- */ 91 /* QAT-AE Service Request Type IDs - 01 to 20 */ 92 ARCH_IF_REQ_QAT_FW_INIT, /* QAT-FW Initialization Request */ 93 ARCH_IF_REQ_QAT_FW_ADMIN, /* QAT-FW Administration Request */ 94 ARCH_IF_REQ_QAT_FW_PKE, /* QAT-FW PKE Request */ 95 ARCH_IF_REQ_QAT_FW_LA, /* QAT-FW Lookaside Request */ 96 ARCH_IF_REQ_QAT_FW_IPSEC, /* QAT-FW IPSec Request */ 97 ARCH_IF_REQ_QAT_FW_SSL, /* QAT-FW SSL Request */ [all …]
|
| /freebsd/secure/libexec/sshd-session/ |
| H A D | Makefile | 4 PROG= sshd-session 5 SRCS= sshd-session.c auth-rhosts.c auth-passwd.c \ 6 audit.c audit-bsm.c audit-linux.c platform.c \ 8 auth.c auth2.c auth2-methods.c auth-options.c session.c \ 9 auth2-chall.c groupaccess.c \ 10 auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \ 11 auth2-none.c auth2-passwd.c auth2-pubkey.c auth2-pubkeyfile.c \ 12 monitor.c monitor_wrap.c auth-krb5.c \ 13 auth2-gss.c gss-serv.c gss-serv-krb5.c \ 14 loginrec.c auth-pam.c auth-shadow.c auth-sia.c \ [all …]
|
| /freebsd/contrib/wpa/wpa_supplicant/ |
| H A D | ibss_rsn.c | 2 * wpa_supplicant - IBSS RSN 3 * Copyright (c) 2009-2013, Jouni Malinen <j@w1.fi> 11 #include "common.h" 12 #include "common/wpa_ctrl.h" 20 #include "common/ieee802_11_defs.h" 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 33 if (ether_addr_equal(addr, peer->addr)) in ibss_rsn_get_peer() 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 43 wpa_sm_deinit(peer->supp); in ibss_rsn_free() 51 peer->supp_state = state; in supp_set_state() [all …]
|
| H A D | wpa_priv.c | 3 * Copyright (c) 2007-2009, Jouni Malinen <j@w1.fi> 16 #include "common.h" 18 #include "common/version.h" 21 #include "common/privsep_commands.h" 22 #include "common/ieee802_11_defs.h" 61 if (iface->drv_priv) { in wpa_priv_cmd_register() 63 if (iface->driver->deinit) in wpa_priv_cmd_register() 64 iface->driver->deinit(iface->drv_priv); in wpa_priv_cmd_register() 65 iface->drv_priv = NULL; in wpa_priv_cmd_register() 66 if (iface->drv_global_priv) { in wpa_priv_cmd_register() [all …]
|
| H A D | pasn_supplicant.c | 2 * wpa_supplicant - PASN processing 12 #include "common/ieee802_11_defs.h" 13 #include "common/ieee802_11_common.h" 14 #include "common/dragonfly.h" 15 #include "common/ptksa_cache.h" 53 wpabuf_free(awork->comeback); in wpas_pasn_free_auth_work() 54 awork->comeback = NULL; in wpas_pasn_free_auth_work() 63 wpa_printf(MSG_DEBUG, "PASN: Auth work timeout - stopping auth"); in wpas_pasn_auth_work_timeout() 73 wpa_printf(MSG_DEBUG, "PASN: Cancel pasn-start-auth work"); in wpas_pasn_cancel_auth_work() 76 radio_remove_works(wpa_s, "pasn-start-auth", 0); in wpas_pasn_cancel_auth_work() [all …]
|
| /freebsd/sys/dev/qat/qat_api/firmware/include/ |
| H A D | icp_qat_fw_la.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 43 /*!< Auth Request */ 46 /*!< Cipher-Hash Request */ 49 /*!< Hash-Cipher Request */ 70 /*!< Auth Pre-Compute Request */ 73 /*!< Auth Pre-Compute Request */ 103 /**< LWs 16-19 */ 122 /**< LW 22 - 23 */ 124 /**< LW 24 - 25 */ [all …]
|
| /freebsd/contrib/wpa/src/ap/ |
| H A D | preauth_auth.c | 2 * hostapd - Authenticator for IEEE 802.11i RSN pre-authentication 3 * Copyright (c) 2004-2007, Jouni Malinen <j@w1.fi> 13 #include "utils/common.h" 16 #include "common/wpa_common.h" 27 #define ETH_P_PREAUTH 0x88C7 /* IEEE 802.11i pre-authentication */ 45 struct hostapd_data *hapd = piface->hapd; in rsn_preauth_receive() 50 wpa_printf(MSG_DEBUG, "RSN: receive pre-auth packet " in rsn_preauth_receive() 51 "from interface '%s'", piface->ifname); in rsn_preauth_receive() 53 wpa_printf(MSG_DEBUG, "RSN: too short pre-auth packet " in rsn_preauth_receive() 61 if (!ether_addr_equal(ethhdr->h_dest, hapd->own_addr)) { in rsn_preauth_receive() [all …]
|
| H A D | ieee802_11_eht.c | 3 * Copyright (c) 2021-2022, Qualcomm Innovation Center, Inc. 10 #include "utils/common.h" 71 if (he_oper_chwidth != -1) in ieee80211_eht_mcs_set_size() 116 mode = hapd->iface->current_mode; in hostapd_eid_eht_capab_len() 120 eht_cap = &mode->eht_capab[opmode]; in hostapd_eid_eht_capab_len() 121 if (!eht_cap->eht_supported) in hostapd_eid_eht_capab_len() 124 len += ieee80211_eht_mcs_set_size(mode->mode, hapd->iconf->op_class, in hostapd_eid_eht_capab_len() 125 hapd->iconf->he_oper_chwidth, in hostapd_eid_eht_capab_len() 126 mode->he_capab[opmode].phy_cap, in hostapd_eid_eht_capab_len() 127 eht_cap->phy_cap); in hostapd_eid_eht_capab_len() [all …]
|
| /freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
| H A D | Makefile.am | 3 include $(top_srcdir)/Makefile.am.common 5 AM_CPPFLAGS += -I$(srcdir)/.. $(INCLUDE_hcrypto) 10 auth-proto.h \ 11 auth.c \ 12 auth.h \ 13 enc-proto.h \ 19 misc-proto.h \
|
| H A D | rsaencpwd.c | 1 /*- 68 * 94065, (415)595-8782, or from DIGITAL" 86 #include "auth.h" 106 static KTEXT_ST auth; variable 124 if (c == -1) 135 *p++ = ap->type; 136 *p++ = ap->way; 138 while (c-- > 0) { 145 printsub('>', &str_data[2], p - (&str_data[2])); 146 return(telnet_net_write(str_data, p - str_data)); [all …]
|
| /freebsd/contrib/wpa/src/pasn/ |
| H A D | pasn_initiator.c | 13 #include "utils/common.h" 14 #include "common/wpa_common.h" 15 #include "common/sae.h" 16 #include "common/ieee802_11_common.h" 17 #include "common/ieee802_11_defs.h" 18 #include "common/dragonfly.h" 33 pasn->pmksa = pmksa; in pasn_set_initiator_pmksa() 44 ret = sae_set_group(&pasn->sae, pasn->group); in wpas_pasn_wd_sae_commit() 50 ret = sae_prepare_commit_pt(&pasn->sae, pasn->pt, in wpas_pasn_wd_sae_commit() 51 pasn->own_addr, pasn->peer_addr, in wpas_pasn_wd_sae_commit() [all …]
|
| /freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
| H A D | lac_session.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 27 * \ref cpaCySymSessionCtxGetSize(). Internally this memory is re-aligned on a 33 * <b>LAC Session Init</b>\n The session descriptor is re-aligned and 59 * - The perform function increments the reference count for the session. 60 * - The callback function decrements the reference count for the session. 61 * - The Remove function checks the reference count to ensure that it is 0. 64 * - \ref LacMem "Memory" - Inline memory functions 65 * - QatUtils: logging, locking & virt to phys translations. 83 * Common alignment attributes to ensure [all …]
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | aes-ccm.c | 2 * Counter with CBC-MAC (CCM) with AES 4 * Copyright (c) 2010-2012, Jouni Malinen <j@w1.fi> 12 #include "common.h" 38 b[0] |= (((M - 2) / 2) /* M' */ << 3); in aes_ccm_auth_start() 39 b[0] |= (L - 1) /* L' */; in aes_ccm_auth_start() 40 os_memcpy(&b[1], nonce, 15 - L); in aes_ccm_auth_start() 41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 51 os_memset(aad_buf + 2 + aad_len, 0, sizeof(aad_buf) - 2 - aad_len); in aes_ccm_auth_start() 56 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 76 /* XOR zero-padded last block */ in aes_ccm_auth() [all …]
|
| /freebsd/contrib/wpa/src/common/ |
| H A D | dpp_auth.c | 4 * Copyright (c) 2018-2020, The Linux Foundation 12 #include "utils/common.h" 13 #include "common/ieee802_11_common.h" 14 #include "common/wpa_ctrl.h" 34 wpa_printf(MSG_DEBUG, "DPP: I-Bootstrap Key Hash"); in dpp_build_attr_i_bootstrap_key_hash() 42 static void dpp_auth_success(struct dpp_authentication *auth) in dpp_auth_success() argument 45 "DPP: Authentication success - clear temporary keys"); in dpp_auth_success() 46 os_memset(auth->Mx, 0, sizeof(auth->Mx)); in dpp_auth_success() 47 auth->Mx_len = 0; in dpp_auth_success() 48 os_memset(auth->Nx, 0, sizeof(auth->Nx)); in dpp_auth_success() [all …]
|
| H A D | dpp_tcp.c | 3 * Copyright (c) 2019-2020, The Linux Foundation 4 * Copyright (c) 2021-2022, Qualcomm Innovation Center, Inc. 13 #include "utils/common.h" 16 #include "common/ieee802_11_common.h" 17 #include "common/wpa_ctrl.h" 29 struct dpp_authentication *auth; member 32 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth); 34 bool (*tcp_msg_sent)(void *ctx, struct dpp_authentication *auth); 86 int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth); 87 bool (*tcp_msg_sent)(void *ctx, struct dpp_authentication *auth); [all …]
|
| /freebsd/contrib/telnet/libtelnet/ |
| H A D | kerberos.c | 1 /*- 64 #include "auth.h" 78 #define KRB_CHALLENGE 3 /* Challenge for mutual auth. */ 79 #define KRB_RESPONSE 4 /* Response for mutual auth. */ 81 static KTEXT_ST auth; variable 99 if (c == -1) in Data() 110 *p++ = ap->type; in Data() 111 *p++ = ap->way; in Data() 113 while (c-- > 0) { in Data() 120 printsub('>', &str_data[2], p - (&str_data[2])); in Data() [all …]
|
| H A D | krb4encpwd.c | 1 /*- 65 * 94065, (415)595-8782, or from DIGITAL" 79 #include "auth.h" 95 #define KRB4_ENCPWD_CHALLENGE 3 /* Challenge for mutual auth. */ 100 static KTEXT_ST auth; variable 119 if (c == -1) 130 *p++ = ap->type; 131 *p++ = ap->way; 133 while (c-- > 0) { 140 printsub('>', &str_data[2], p - (&str_data[2])); [all …]
|
| H A D | rsaencpwd.c | 1 /*- 65 * 94065, (415)595-8782, or from DIGITAL" 77 #include "auth.h" 97 static KTEXT_ST auth; variable 115 if (c == -1) 126 *p++ = ap->type; 127 *p++ = ap->way; 129 while (c-- > 0) { 136 printsub('>', &str_data[2], p - (&str_data[2])); 137 return(net_write(str_data, p - str_data)); [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | Makefile.in | 23 ASKPASS_PROGRAM=$(libexecdir)/ssh-askpass 24 SFTP_SERVER=$(libexecdir)/sftp-server 25 SSH_KEYSIGN=$(libexecdir)/ssh-keysign 26 SSHD_SESSION=$(libexecdir)/sshd-session 27 SSHD_AUTH=$(libexecdir)/sshd-auth 28 SSH_PKCS11_HELPER=$(libexecdir)/ssh-pkcs11-helper 29 SSH_SK_HELPER=$(libexecdir)/ssh-sk-helper 37 PATHS= -DSSHDIR=\"$(sysconfdir)\" \ 38 -D_PATH_SSH_PROGRAM=\"$(SSH_PROGRAM)\" \ 39 -D_PATH_SSH_ASKPASS_DEFAULT=\"$(ASKPASS_PROGRAM)\" \ [all …]
|
| /freebsd/contrib/blocklist/diff/ |
| H A D | ssh.diff | 1 --- /dev/null 2015-01-22 23:10:33.000000000 -0500 2 +++ dist/pfilter.c 2015-01-22 23:46:03.000000000 -0500 3 @@ -0,0 +1,32 @@ 36 --- /dev/null 2015-01-20 21:14:44.000000000 -0500 37 +++ dist/pfilter.h 2015-01-20 20:16:20.000000000 -0500 38 @@ -0,0 +1,3 @@ 46 diff -u -u -r1.10 Makefile 47 --- bin/sshd/Makefile 19 Oct 2014 16:30:58 -0000 1.10 48 +++ bin/sshd/Makefile 22 Jan 2015 21:39:21 -0000 49 @@ -15,7 +15,7 @@ [all …]
|
| /freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/nfs/ |
| H A D | tst.call.c | 5 * Common Development and Distribution License (the "License"). 56 AUTH *auth; in dotest() local 76 auth = authsys_create_default(); in dotest() 77 client->cl_auth = auth; in dotest()
|
| /freebsd/contrib/pam-krb5/docs/ |
| H A D | docknot.yaml | 1 # Package metadata for pam-krb5. 10 # Copyright 2017, 2020-2021 Russ Allbery <eagle@eyrie.org> 12 # SPDX-License-Identifier: BSD-3-clause or GPL-1+ 16 name: pam-krb5 22 name: BSD-3-clause-or-GPL-1+ 24 - holder: Russ Allbery <eagle@eyrie.org> 25 years: 2005-2010, 2014-2015, 2017, 2020-2021 26 - holder: The Board of Trustees of the Leland Stanford Junior University 27 years: 2009-2011 28 - holder: Andres Salomon <dilinger@debian.org> [all …]
|
| /freebsd/contrib/wpa/src/drivers/ |
| H A D | driver_privsep.c | 2 * WPA Supplicant - privilege separated driver interface 3 * Copyright (c) 2007-2009, Jouni Malinen <j@w1.fi> 12 #include "common.h" 15 #include "common/privsep_commands.h" 34 res = sendto(drv->priv_socket, &cmd, sizeof(cmd), 0, in wpa_priv_reg_cmd() 35 (struct sockaddr *) &drv->priv_addr, in wpa_priv_reg_cmd() 36 sizeof(drv->priv_addr)); in wpa_priv_reg_cmd() 39 return res < 0 ? -1 : 0; in wpa_priv_reg_cmd() 58 msg.msg_name = &drv->priv_addr; in wpa_priv_cmd() 59 msg.msg_namelen = sizeof(drv->priv_addr); in wpa_priv_cmd() [all …]
|