/netbsd/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | auth_context.c | 58 ALLOC(p->authenticator, 1); in krb5_auth_con_init() 59 if (!p->authenticator) { in krb5_auth_con_init() 63 memset (p->authenticator, 0, sizeof(*p->authenticator)); in krb5_auth_con_init() 500 krb5_authenticator *authenticator) in krb5_auth_con_getauthenticator() argument 502 *authenticator = malloc(sizeof(**authenticator)); in krb5_auth_con_getauthenticator() 503 if (*authenticator == NULL) in krb5_auth_con_getauthenticator() 507 *authenticator); in krb5_auth_con_getauthenticator() 514 krb5_authenticator *authenticator) in krb5_free_authenticator() argument 516 free_Authenticator (*authenticator); in krb5_free_authenticator() 517 free (*authenticator); in krb5_free_authenticator() [all …]
|
H A D | build_ap_req.c | 43 krb5_data authenticator, in krb5_build_ap_req() argument 65 ap.authenticator.etype = enctype; in krb5_build_ap_req() 66 ap.authenticator.kvno = NULL; in krb5_build_ap_req() 67 ap.authenticator.cipher = authenticator; in krb5_build_ap_req()
|
H A D | rd_req.c | 75 Authenticator *authenticator, in decrypt_authenticator() argument 103 authenticator, &len); in decrypt_authenticator() 249 krb5_authenticator authenticator; in krb5_verify_authenticator_checksum() local 361 &ap_req->authenticator, in krb5_verify_ap_req2() 362 ac->authenticator, in krb5_verify_ap_req2() 373 ac->authenticator->cname, in krb5_verify_ap_req2() 374 ac->authenticator->crealm); in krb5_verify_ap_req2() 414 if (ac->authenticator->seq_number) in krb5_verify_ap_req2() 416 *ac->authenticator->seq_number); in krb5_verify_ap_req2() 420 if (ac->authenticator->subkey) { in krb5_verify_ap_req2() [all …]
|
H A D | mk_req_ext.c | 49 krb5_data authenticator; in _krb5_mk_req_internal() local 133 &authenticator, in _krb5_mk_req_internal() 141 in_creds, ap_req_options, authenticator, outbuf); in _krb5_mk_req_internal()
|
H A D | rd_rep.c | 91 if ((*repl)->ctime != auth_context->authenticator->ctime || in krb5_rd_rep() 92 (*repl)->cusec != auth_context->authenticator->cusec) in krb5_rd_rep()
|
H A D | mk_rep.c | 56 body.ctime = auth_context->authenticator->ctime; in krb5_mk_rep() 57 body.cusec = auth_context->authenticator->cusec; in krb5_mk_rep()
|
H A D | build_auth.c | 173 auth_context->authenticator->ctime = auth.ctime; in _krb5_build_authenticator() 174 auth_context->authenticator->cusec = auth.cusec; in _krb5_build_authenticator()
|
/netbsd/external/bsd/wpa/dist/src/radius/ |
H A D | radius.c | 415 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv() 457 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp() 595 os_memset(msg->hdr->authenticator, 0, in radius_msg_verify_das_req() 596 sizeof(msg->hdr->authenticator)); in radius_msg_verify_das_req() 829 sizeof(msg->hdr->authenticator)); in radius_msg_verify_msg_auth() 870 addr[1] = sent_msg->hdr->authenticator; in radius_msg_verify() 1127 sent_msg->hdr->authenticator, in radius_msg_get_ms_keys() 1142 sent_msg->hdr->authenticator, in radius_msg_get_ms_keys() 1176 sent_msg->hdr->authenticator, in radius_msg_get_cisco_keys() 1314 addr[1] = msg->hdr->authenticator; in radius_user_password_hide() [all …]
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | accept_sec_context.c | 524 krb5_authenticator authenticator; in gsskrb5_acceptor_start() local 528 &authenticator); in gsskrb5_acceptor_start() 535 if (authenticator->cksum != NULL in gsskrb5_acceptor_start() 536 && authenticator->cksum->cksumtype == CKSUMTYPE_GSSAPI) { in gsskrb5_acceptor_start() 539 authenticator->cksum, in gsskrb5_acceptor_start() 544 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start() 548 if (authenticator->cksum != NULL) { in gsskrb5_acceptor_start() 555 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start() 568 authenticator->cksum); in gsskrb5_acceptor_start() 572 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start() [all …]
|
/netbsd/crypto/external/bsd/heimdal/dist/doc/ |
H A D | whatis.texi | 96 Before sending a message to @var{B}, @var{A} creates an authenticator 103 contains the session key that the authenticator was encrypted with, 104 @var{B} can now also decrypt the authenticator. To verify that @var{A} 106 with that of the authenticator. If everything matches, @var{B} now 115 An impostor, @var{C} could steal the authenticator and the ticket as it 117 @var{A}. The address in the ticket and the authenticator was added to 121 authenticator, @var{C} does not have much time in which to mount the 143 authenticator. One typical procedure is to add one to the checksum,
|
/netbsd/external/mpl/dhcp/dist/dhcpctl/ |
H A D | cltest.c | 116 dhcpctl_handle authenticator; local 151 authenticator = dhcpctl_null_handle; 155 authenticator);
|
H A D | omshell.c | 110 dhcpctl_handle authenticator; in main() local 428 authenticator = dhcpctl_null_handle; in main() 431 status = dhcpctl_new_authenticator (&authenticator, in main() 446 server, port, authenticator); in main()
|
/netbsd/external/mpl/dhcp/dist/omapip/ |
H A D | message.c | 100 if (m -> authenticator) in omapi_message_set_value() 101 omapi_typed_data_dereference (&m -> authenticator, in omapi_message_set_value() 103 omapi_typed_data_reference (&m -> authenticator, value, MDL); in omapi_message_set_value() 185 if (m -> authenticator) in omapi_message_get_value() 187 m -> authenticator, MDL); in omapi_message_get_value() 217 if (m -> authenticator) { in omapi_message_destroy() 218 omapi_typed_data_dereference (&m -> authenticator, file, line); in omapi_message_destroy()
|
/netbsd/external/bsd/wpa/dist/src/wps/ |
H A D | wps_attr_process.c | 16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument 23 if (authenticator == NULL) { in wps_process_authenticator() 44 if (os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
|
H A D | wps_validate.c | 766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument 768 if (authenticator == NULL) { in wps_validate_authenticator() 1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2() 1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3() 1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4() 1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5() 1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6() 1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7() 1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
|
H A D | wps_attr_parse.h | 35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
|
/netbsd/external/mpl/dhcp/dist/doc/ |
H A D | api+protocol | 46 authid = a 32-bit authenticator handle. 49 message in response to another message, the authenticator for 51 message indicating that the authenticator used was unknown, 52 in which case the null authenticator is used. Messages that 54 authenticator used in the original notify registration. 55 The authenticator itself is generated by having one side of 56 the connection send an object of type "authenticator" to the 101 algorithm is a property of the authenticator handle. 138 permission denied - the authenticator ID specified does not 151 authenticator ID specified has permission to examine the object, [all …]
|
/netbsd/external/bsd/libfido2/dist/fuzz/ |
H A D | README | 4 AFL is more convenient when fuzzing the path from the authenticator to 6 authenticator to obtain an initial corpus, rebuild libfido2 with -DFUZZ=ON, and
|
/netbsd/external/bsd/libfido2/dist/examples/ |
H A D | README.adoc | 55 was signed by the authenticator. The device's attestation certificate 78 specified, a FIDO2 hmac-secret is requested from the authenticator, 95 If set, libfido2 will produce a log of its transactions with the authenticator.
|
/netbsd/external/bsd/wpa/dist/hostapd/ |
H A D | hostapd.sim_db | 1 # Example GSM authentication triplet file for EAP-SIM authenticator
|
H A D | hostapd.eap_user | 36 # Multiple methods can be configured to make the authenticator try them one by 42 # authenticator advertises the highest supported version and select the version
|
/netbsd/etc/pam.d/ |
H A D | telnetd | 6 # authenticator such as SRA. For non-authenticated telnet sessions,
|
/netbsd/external/bsd/pam-u2f/dist/man/ |
H A D | pam_u2f.8.txt | 112 the authenticator's default behaviour. 117 to the authenticator's default behaviour. 122 the authenticator's default behaviour. 189 authenticator.
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/asn1/ |
H A D | kx509.asn1 | 18 authenticator OCTET STRING,
|
/netbsd/crypto/external/bsd/openssl/dist/crypto/crmf/ |
H A D | crmf_local.h | 345 ASN1_UTF8STRING *authenticator; member
|