Home
last modified time | relevance | path

Searched refs:authenticator (Results 1 – 25 of 75) sorted by relevance

123

/netbsd/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dauth_context.c58 ALLOC(p->authenticator, 1); in krb5_auth_con_init()
59 if (!p->authenticator) { in krb5_auth_con_init()
63 memset (p->authenticator, 0, sizeof(*p->authenticator)); in krb5_auth_con_init()
500 krb5_authenticator *authenticator) in krb5_auth_con_getauthenticator() argument
502 *authenticator = malloc(sizeof(**authenticator)); in krb5_auth_con_getauthenticator()
503 if (*authenticator == NULL) in krb5_auth_con_getauthenticator()
507 *authenticator); in krb5_auth_con_getauthenticator()
514 krb5_authenticator *authenticator) in krb5_free_authenticator() argument
516 free_Authenticator (*authenticator); in krb5_free_authenticator()
517 free (*authenticator); in krb5_free_authenticator()
[all …]
H A Dbuild_ap_req.c43 krb5_data authenticator, in krb5_build_ap_req() argument
65 ap.authenticator.etype = enctype; in krb5_build_ap_req()
66 ap.authenticator.kvno = NULL; in krb5_build_ap_req()
67 ap.authenticator.cipher = authenticator; in krb5_build_ap_req()
H A Drd_req.c75 Authenticator *authenticator, in decrypt_authenticator() argument
103 authenticator, &len); in decrypt_authenticator()
249 krb5_authenticator authenticator; in krb5_verify_authenticator_checksum() local
361 &ap_req->authenticator, in krb5_verify_ap_req2()
362 ac->authenticator, in krb5_verify_ap_req2()
373 ac->authenticator->cname, in krb5_verify_ap_req2()
374 ac->authenticator->crealm); in krb5_verify_ap_req2()
414 if (ac->authenticator->seq_number) in krb5_verify_ap_req2()
416 *ac->authenticator->seq_number); in krb5_verify_ap_req2()
420 if (ac->authenticator->subkey) { in krb5_verify_ap_req2()
[all …]
H A Dmk_req_ext.c49 krb5_data authenticator; in _krb5_mk_req_internal() local
133 &authenticator, in _krb5_mk_req_internal()
141 in_creds, ap_req_options, authenticator, outbuf); in _krb5_mk_req_internal()
H A Drd_rep.c91 if ((*repl)->ctime != auth_context->authenticator->ctime || in krb5_rd_rep()
92 (*repl)->cusec != auth_context->authenticator->cusec) in krb5_rd_rep()
H A Dmk_rep.c56 body.ctime = auth_context->authenticator->ctime; in krb5_mk_rep()
57 body.cusec = auth_context->authenticator->cusec; in krb5_mk_rep()
H A Dbuild_auth.c173 auth_context->authenticator->ctime = auth.ctime; in _krb5_build_authenticator()
174 auth_context->authenticator->cusec = auth.cusec; in _krb5_build_authenticator()
/netbsd/external/bsd/wpa/dist/src/radius/
H A Dradius.c415 sizeof(msg->hdr->authenticator)); in radius_msg_finish_srv()
457 os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16); in radius_msg_finish_das_resp()
595 os_memset(msg->hdr->authenticator, 0, in radius_msg_verify_das_req()
596 sizeof(msg->hdr->authenticator)); in radius_msg_verify_das_req()
829 sizeof(msg->hdr->authenticator)); in radius_msg_verify_msg_auth()
870 addr[1] = sent_msg->hdr->authenticator; in radius_msg_verify()
1127 sent_msg->hdr->authenticator, in radius_msg_get_ms_keys()
1142 sent_msg->hdr->authenticator, in radius_msg_get_ms_keys()
1176 sent_msg->hdr->authenticator, in radius_msg_get_cisco_keys()
1314 addr[1] = msg->hdr->authenticator; in radius_user_password_hide()
[all …]
/netbsd/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
H A Daccept_sec_context.c524 krb5_authenticator authenticator; in gsskrb5_acceptor_start() local
528 &authenticator); in gsskrb5_acceptor_start()
535 if (authenticator->cksum != NULL in gsskrb5_acceptor_start()
536 && authenticator->cksum->cksumtype == CKSUMTYPE_GSSAPI) { in gsskrb5_acceptor_start()
539 authenticator->cksum, in gsskrb5_acceptor_start()
544 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start()
548 if (authenticator->cksum != NULL) { in gsskrb5_acceptor_start()
555 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start()
568 authenticator->cksum); in gsskrb5_acceptor_start()
572 krb5_free_authenticator(context, &authenticator); in gsskrb5_acceptor_start()
[all …]
/netbsd/crypto/external/bsd/heimdal/dist/doc/
H A Dwhatis.texi96 Before sending a message to @var{B}, @var{A} creates an authenticator
103 contains the session key that the authenticator was encrypted with,
104 @var{B} can now also decrypt the authenticator. To verify that @var{A}
106 with that of the authenticator. If everything matches, @var{B} now
115 An impostor, @var{C} could steal the authenticator and the ticket as it
117 @var{A}. The address in the ticket and the authenticator was added to
121 authenticator, @var{C} does not have much time in which to mount the
143 authenticator. One typical procedure is to add one to the checksum,
/netbsd/external/mpl/dhcp/dist/dhcpctl/
H A Dcltest.c116 dhcpctl_handle authenticator; local
151 authenticator = dhcpctl_null_handle;
155 authenticator);
H A Domshell.c110 dhcpctl_handle authenticator; in main() local
428 authenticator = dhcpctl_null_handle; in main()
431 status = dhcpctl_new_authenticator (&authenticator, in main()
446 server, port, authenticator); in main()
/netbsd/external/mpl/dhcp/dist/omapip/
H A Dmessage.c100 if (m -> authenticator) in omapi_message_set_value()
101 omapi_typed_data_dereference (&m -> authenticator, in omapi_message_set_value()
103 omapi_typed_data_reference (&m -> authenticator, value, MDL); in omapi_message_set_value()
185 if (m -> authenticator) in omapi_message_get_value()
187 m -> authenticator, MDL); in omapi_message_get_value()
217 if (m -> authenticator) { in omapi_message_destroy()
218 omapi_typed_data_dereference (&m -> authenticator, file, line); in omapi_message_destroy()
/netbsd/external/bsd/wpa/dist/src/wps/
H A Dwps_attr_process.c16 int wps_process_authenticator(struct wps_data *wps, const u8 *authenticator, in wps_process_authenticator() argument
23 if (authenticator == NULL) { in wps_process_authenticator()
44 if (os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
H A Dwps_validate.c766 static int wps_validate_authenticator(const u8 *authenticator, int mandatory) in wps_validate_authenticator() argument
768 if (authenticator == NULL) { in wps_validate_authenticator()
1382 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m2()
1470 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m3()
1508 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m4()
1575 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m5()
1642 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m6()
1710 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m7()
1784 wps_validate_authenticator(attr.authenticator, 1)) { in wps_validate_m8()
H A Dwps_attr_parse.h35 const u8 *authenticator; /* WPS_AUTHENTICATOR_LEN (8) octets */ member
/netbsd/external/mpl/dhcp/dist/doc/
H A Dapi+protocol46 authid = a 32-bit authenticator handle.
49 message in response to another message, the authenticator for
51 message indicating that the authenticator used was unknown,
52 in which case the null authenticator is used. Messages that
54 authenticator used in the original notify registration.
55 The authenticator itself is generated by having one side of
56 the connection send an object of type "authenticator" to the
101 algorithm is a property of the authenticator handle.
138 permission denied - the authenticator ID specified does not
151 authenticator ID specified has permission to examine the object,
[all …]
/netbsd/external/bsd/libfido2/dist/fuzz/
H A DREADME4 AFL is more convenient when fuzzing the path from the authenticator to
6 authenticator to obtain an initial corpus, rebuild libfido2 with -DFUZZ=ON, and
/netbsd/external/bsd/libfido2/dist/examples/
H A DREADME.adoc55 was signed by the authenticator. The device's attestation certificate
78 specified, a FIDO2 hmac-secret is requested from the authenticator,
95 If set, libfido2 will produce a log of its transactions with the authenticator.
/netbsd/external/bsd/wpa/dist/hostapd/
H A Dhostapd.sim_db1 # Example GSM authentication triplet file for EAP-SIM authenticator
H A Dhostapd.eap_user36 # Multiple methods can be configured to make the authenticator try them one by
42 # authenticator advertises the highest supported version and select the version
/netbsd/etc/pam.d/
H A Dtelnetd6 # authenticator such as SRA. For non-authenticated telnet sessions,
/netbsd/external/bsd/pam-u2f/dist/man/
H A Dpam_u2f.8.txt112 the authenticator's default behaviour.
117 to the authenticator's default behaviour.
122 the authenticator's default behaviour.
189 authenticator.
/netbsd/crypto/external/bsd/heimdal/dist/lib/asn1/
H A Dkx509.asn118 authenticator OCTET STRING,
/netbsd/crypto/external/bsd/openssl/dist/crypto/crmf/
H A Dcrmf_local.h345 ASN1_UTF8STRING *authenticator; member

123