| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | ser_auth.c | 33 k5_size_authenticator(krb5_authenticator *authenticator, size_t *sizep) in k5_size_authenticator() argument 48 if (authenticator != NULL) { in k5_size_authenticator() 52 if (authenticator->client) in k5_size_authenticator() 53 kret = k5_size_principal(authenticator->client, &required); in k5_size_authenticator() 58 if (!kret && authenticator->checksum) in k5_size_authenticator() 59 kret = k5_size_checksum(authenticator->checksum, &required); in k5_size_authenticator() 62 if (!kret && authenticator->subkey) in k5_size_authenticator() 63 kret = k5_size_keyblock(authenticator->subkey, &required); in k5_size_authenticator() 66 if (!kret && authenticator->authorization_data) { in k5_size_authenticator() 69 for (i=0; !kret && authenticator->authorization_data[i]; i++) { in k5_size_authenticator() [all …]
|
| H A D | mk_req_ext.c | 101 request.authenticator.ciphertext.data = NULL; in krb5_mk_req_extended() 217 scratch, &request.authenticator))) in krb5_mk_req_extended() 243 if (request.authenticator.ciphertext.data) { in krb5_mk_req_extended() 244 (void) memset(request.authenticator.ciphertext.data, 0, in krb5_mk_req_extended() 245 request.authenticator.ciphertext.length); in krb5_mk_req_extended() 246 free(request.authenticator.ciphertext.data); in krb5_mk_req_extended()
|
| H A D | copy_athctr.c | 83 krb5_authenticator **authenticator) in krb5_auth_con_getauthenticator() argument 86 authenticator)); in krb5_auth_con_getauthenticator()
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | auth_context.c | 48 ALLOC(p->authenticator, 1); in krb5_auth_con_init() 49 if (!p->authenticator) { in krb5_auth_con_init() 54 memset (p->authenticator, 0, sizeof(*p->authenticator)); in krb5_auth_con_init() 72 krb5_free_authenticator(context, &auth_context->authenticator); in krb5_auth_con_free() 452 krb5_authenticator *authenticator) in krb5_auth_con_getauthenticator() argument 454 *authenticator = malloc(sizeof(**authenticator)); in krb5_auth_con_getauthenticator() 455 if (*authenticator == NULL) { in krb5_auth_con_getauthenticator() 460 copy_Authenticator(auth_context->authenticator, in krb5_auth_con_getauthenticator() 461 *authenticator); in krb5_auth_con_getauthenticator() 468 krb5_authenticator *authenticator) in krb5_free_authenticator() argument [all …]
|
| H A D | build_ap_req.c | 41 krb5_data authenticator, in krb5_build_ap_req() argument 63 ap.authenticator.etype = enctype; in krb5_build_ap_req() 64 ap.authenticator.kvno = NULL; in krb5_build_ap_req() 65 ap.authenticator.cipher = authenticator; in krb5_build_ap_req()
|
| H A D | rd_req.c | 73 Authenticator *authenticator, in decrypt_authenticator() argument 101 authenticator, &len); in decrypt_authenticator() 185 ad = auth_context->authenticator->authorization_data; in find_etypelist() 280 krb5_authenticator authenticator; in krb5_verify_authenticator_checksum() local 285 &authenticator); in krb5_verify_authenticator_checksum() 288 if(authenticator->cksum == NULL) { in krb5_verify_authenticator_checksum() 289 krb5_free_authenticator(context, &authenticator); in krb5_verify_authenticator_checksum() 294 krb5_free_authenticator(context, &authenticator); in krb5_verify_authenticator_checksum() 305 authenticator->cksum); in krb5_verify_authenticator_checksum() 308 krb5_free_authenticator(context, &authenticator); in krb5_verify_authenticator_checksum() [all …]
|
| H A D | mk_req_ext.c | 47 krb5_data authenticator; in _krb5_mk_req_internal() local 131 &authenticator, in _krb5_mk_req_internal() 139 in_creds, ap_req_options, authenticator, outbuf); in _krb5_mk_req_internal()
|
| H A D | rd_rep.c | 89 if ((*repl)->ctime != auth_context->authenticator->ctime || in krb5_rd_rep() 90 (*repl)->cusec != auth_context->authenticator->cusec) in krb5_rd_rep()
|
| H A D | mk_rep.c | 54 body.ctime = auth_context->authenticator->ctime; in krb5_mk_rep() 55 body.cusec = auth_context->authenticator->cusec; in krb5_mk_rep()
|
| H A D | build_auth.c | 170 auth_context->authenticator->ctime = auth.ctime; in _krb5_build_authenticator() 171 auth_context->authenticator->cusec = auth.cusec; in _krb5_build_authenticator()
|
| /freebsd/contrib/wpa/src/radius/ |
| H A D | radius.c | 497 os_memcpy(msg->hdr->authenticator, req_authenticator, in radius_msg_finish_srv() 498 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv() 512 md5_vector(4, addr, len, msg->hdr->authenticator); in radius_msg_finish_srv() 536 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp() 546 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0) in radius_msg_finish_das_resp() 565 os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN); in radius_msg_finish_acct() 570 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct() 586 os_memcpy(msg->hdr->authenticator, req_authenticator, MD5_MAC_LEN); in radius_msg_finish_acct_resp() 591 md5_vector(2, addr, len, msg->hdr->authenticator); in radius_msg_finish_acct_resp() 618 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() [all …]
|
| /freebsd/crypto/krb5/src/lib/rpc/ |
| H A D | svc_auth.c | 57 enum auth_stat (*authenticator)(struct svc_req *, struct rpc_msg *, member 98 svcauthsw[i].authenticator != NULL) { in gssrpc__authenticate() 99 return ((*(svcauthsw[i].authenticator))(rqst, in gssrpc__authenticate()
|
| /freebsd/crypto/heimdal/lib/gssapi/krb5/ |
| H A D | accept_sec_context.c | 428 free_Authenticator(ctx->auth_context->authenticator); in gsskrb5_acceptor_start() 503 krb5_authenticator authenticator; in gsskrb5_acceptor_start() local 507 &authenticator); in gsskrb5_acceptor_start() 514 if (authenticator->cksum == NULL) { in gsskrb5_acceptor_start() 515 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start() 520 if (authenticator->cksum->cksumtype == CKSUMTYPE_GSSAPI) { in gsskrb5_acceptor_start() 523 authenticator->cksum, in gsskrb5_acceptor_start() 527 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start() 538 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start() 552 authenticator->cksum); in gsskrb5_acceptor_start() [all …]
|
| /freebsd/crypto/heimdal/doc/ |
| H A D | whatis.texi | 92 Before sending a message to @var{B}, @var{A} creates an authenticator 99 contains the session key that the authenticator was encrypted with, 100 @var{B} can now also decrypt the authenticator. To verify that @var{A} 102 with that of the authenticator. If everything matches, @var{B} now 111 An impostor, @var{C} could steal the authenticator and the ticket as it 113 @var{A}. The address in the ticket and the authenticator was added to 117 authenticator, @var{C} does not have much time in which to mount the 139 authenticator. One typical procedure is to add one to the checksum,
|
| /freebsd/contrib/libfido2/examples/ |
| H A D | README.adoc | 54 was signed by the authenticator. The device's attestation certificate 76 authenticator. The -v option requests user verification and checks 77 whether the user verification bit was signed by the authenticator. 80 specified, a FIDO2 hmac-secret is requested from the authenticator, 97 If set, libfido2 will produce a log of its transactions with the authenticator.
|
| /freebsd/contrib/wpa/src/wps/ |
| H A D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument 23 if (authenticator == NULL) { in wps_process_authenticator() 45 os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
|
| H A D | wps_validate.c | 766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument 768 if (authenticator == NULL) { in wps_validate_authenticator() 1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2() 1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3() 1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4() 1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5() 1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6() 1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7() 1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
|
| H A D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
|
| /freebsd/contrib/libfido2/fuzz/ |
| H A D | README | 4 AFL is more convenient when fuzzing the path from the authenticator to 6 authenticator to obtain an initial corpus, rebuild libfido2 with -DFUZZ=ON, and
|
| /freebsd/crypto/openssl/include/internal/ |
| H A D | crmf.h | 22 ASN1_UTF8STRING *authenticator; member
|
| /freebsd/crypto/krb5/src/lib/krb5/rcache/ |
| H A D | rc_base.c | 129 const krb5_enc_data *authenticator) in k5_rc_store() argument 134 ret = k5_rc_tag_from_ciphertext(context, authenticator, &tag); in k5_rc_store()
|
| /freebsd/contrib/wpa/hostapd/ |
| H A D | hostapd.sim_db | 1 # Example GSM authentication triplet file for EAP-SIM authenticator
|
| /freebsd/crypto/heimdal/lib/asn1/ |
| H A D | kx509.asn1 | 18 authenticator OCTET STRING,
|
| /freebsd/crypto/krb5/src/util/et/ |
| H A D | test1.et | 13 "Can't decode authenticator"
|
| /freebsd/release/packages/ucl/ |
| H A D | hostapd-all.ucl | 22 The hostapd(8) daemon acts as an authenticator for stations connecting to an
|