Home
last modified time | relevance | path

Searched full:authentication (Results 1 – 25 of 1596) sorted by relevance

12345678910>>...64

/freebsd/contrib/wpa/hostapd/
H A DREADME2 Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
81 Any wired Ethernet driver for wired IEEE 802.1X authentication
104 minimal authentication mechanism for stations, whereas IEEE 802.1X
109 Access Entity, and Authentication Server. Supplicant is a component in
110 a station and it performs the authentication with the Authentication
112 between a Supplicant and an Authentication Server. In addition, it has a
[all …]
H A Dhlr_auc_gw.txt4 database/authentication gateway interface to HLR/AuC. It could be
6 authentication center (HLR/AuC). hostapd will send SIM/AKA
7 authentication queries over a UNIX domain socket to and external
10 hlr_auc_gw can be configured with GSM and UMTS authentication data with
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
34 -g<triplet file> = path for GSM authentication triplets
79 authentication server for EAP-SIM/AKA/AKA':
/freebsd/contrib/openpam/doc/man/
H A Dpam.323 .Nd Pluggable Authentication Modules Library
63 The Pluggable Authentication Modules (PAM) library abstracts a number
64 of common authentication-related operations and provides a framework
72 The user requesting authentication is called the applicant, while the
82 grouped into four facilities: authentication, account management,
121 .Ss Authentication
122 There are two authentication primitives:
167 Authentication information is unavailable.
169 Authentication token aging disabled.
171 Authentication token failure.
[all …]
H A Dpam_get_authtok.37 .Nd retrieve authentication token
17 authentication token or retrieves a cached authentication token,
19 Either way, a pointer to the authentication token is stored in the
30 Returns the current authentication token, or the new token
31 when changing authentication tokens.
33 Returns the previous authentication token when changing
34 authentication tokens.
93 This should only be used for non-reusable authentication
H A Dpam_chauthtok.316 function attempts to change the authentication token
29 Change only those authentication tokens that have expired.
46 Authentication token aging disabled.
48 Authentication token failure.
50 Authentication token lock busy.
52 Failed to recover old authentication token.
73 .%T "X/Open Single Sign-On Service (XSSO) - Pluggable Authentication Modules"
/freebsd/lib/libc/rpc/
H A Drpc_clnt_auth.312 .Nd library routines for client side remote procedure call authentication
29 with desired authentication.
41 The client's authentication information
50 style of authentication is discussed here.
54 A function macro that destroys the authentication
65 authentication handle that passes nonusable
66 authentication information with each remote procedure call.
67 This is the default authentication used by RPC.
69 Create and return an RPC authentication handle that contains
71 authentication information.
H A Drpc_secure.343 Authentication.
53 secure authentication system, known as
55 authentication.
64 authentication system to work.
69 used on the client side, returns an authentication handle that
70 will enable the use of the secure authentication system.
95 then the authentication system will assume
112 then the authentication system will
123 authentication routines,
169 secure authentication system
[all …]
/freebsd/crypto/heimdal/appl/telnet/telnetd/
H A Dtelnetd.892 be used for authentication.
96 .Dv AUTHENTICATION
102 Turns on authentication debugging code.
105 can provide valid authentication information
111 can provide valid authentication information
119 Only allow connections that supply some authentication information.
121 by any of the existing authentication mechanisms,
134 Authentication information is not required.
135 If no or insufficient authentication information
141 This disables the authentication code.
[all …]
/freebsd/lib/libpam/modules/pam_ssh/
H A Dpam_ssh.840 .Nd authentication and session management with SSH private keys
50 authentication service module for PAM,
53 authentication
62 .Ss SSH Authentication Module
65 authentication component
71 The following options may be passed to the authentication module:
74 If the authentication module
81 the authentication module returns failure
84 if the authentication module
95 Normally, keys with no passphrase are ignored for authentication
[all …]
/freebsd/lib/libpam/modules/pam_unix/
H A Dpam_unix.850 authentication service module for PAM,
53 authentication, account management, and password management.
63 .Ss Ux Ss Authentication Module
66 authentication component provides functions to verify the identity of
75 The following options may be passed to the authentication module:
83 If the authentication module is not the first in the stack, and a
86 If this fails, the authentication module returns failure without
88 This option has no effect if the authentication module is the first in
105 silently allow authentication to succeed.
121 silently allow authentication to succeed.
[all …]
/freebsd/contrib/ntp/sntp/tests/
H A DpacketProcessing.c189 /* Activate authentication option */ in test_TooShortExtensionFieldLength()
191 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION));
195 /* We demand authentication, but no MAC header is present. */ in test_UnauthenticatedPacketReject()
205 /* Activate authentication option */ in test_UnauthenticatedPacketReject()
207 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION));
224 /* Activate authentication option */
226 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION)); in test_AuthenticatedPacketInvalid()
257 /* Activate authentication option */ in test_AuthenticatedPacketUnknownKey()
259 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION)); in test_AuthenticatedPacketUnknownKey()
284 TEST_ASSERT_FALSE(ENABLED_OPT(AUTHENTICATION)); in test_ServerVersionTooOld()
[all...]
/freebsd/usr.sbin/ctld/
H A Dctl.conf.5125 Sets the authentication type.
133 it is usually used to disable authentication for a given
136 A set of CHAP authentication credentials.
145 A set of mutual CHAP authentication credentials.
170 Assign a previously defined authentication group to the portal group,
178 .Qq Ar no-authentication ,
180 to permit discovery without authentication.
208 and authentication credentials.
209 The target is returned if it does not require CHAP authentication,
214 targets that require CHAP authentication will only be returned if
[all …]
/freebsd/crypto/openssh/
H A Dsshd.871 key exchange, encryption, authentication, command execution,
214 authentication, and termination of each connection is logged.
254 from making DNS requests unless the authentication
256 Authentication mechanisms that may require DNS include
269 .Sh AUTHENTICATION
283 through a cryptographic message authentication code (MAC).
285 Finally, the server and the client enter an authentication dialog.
287 host-based authentication,
288 public key authentication,
289 challenge-response authentication,
[all …]
H A Dsshd_config.5187 Specifies the authentication methods that must be successfully completed
190 authentication method names, or by the single string
192 to indicate the default behaviour of accepting any single authentication
194 If the default is overridden, then successful authentication requires
199 would require the user to complete public key authentication, followed by
200 either password or keyboard interactive authentication.
203 keyboard-interactive authentication before public key.
205 For keyboard interactive authentication it is also possible to
206 restrict authentication to a specific device by appending a
214 would restrict keyboard interactive authentication to the
[all …]
H A Dssh.1120 Enables forwarding of connections from an authentication agent such as
137 Disables forwarding of the authentication agent connection.
294 authentication.
298 public key authentication is read.
344 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI
436 A comma-separated list of MAC (message authentication code) algorithms,
780 debugging connection, authentication, and configuration problems.
878 .Sh AUTHENTICATION
881 The methods available for authentication are:
882 GSSAPI-based authentication,
[all …]
H A DOVERVIEW76 implement X11 forwarding, TCP/IP forwarding, and authentication
80 Authentication agent
82 - Code to communicate with the authentication agent is in authfd.c.
84 Authentication methods
86 - Code for various authentication methods resides in auth-*.c
93 - In the client end, authentication code is in sshconnect.c. It
96 authentication agent using authfd.c.
103 proxy), and performs authentication (ssh_login in sshconnect.c).
139 negotiate encryption, then perform authentication, preparatory
149 - authentication
H A Dsshd_config32 # Authentication:
59 # Change to yes to enable built-in password authentication.
64 # Change to no to disable PAM authentication
77 # Set this to 'no' to disable PAM authentication, account processing,
78 # and session processing. If this is enabled, PAM authentication will
81 # PAM authentication via KbdInteractiveAuthentication may bypass
84 # PAM authentication, then enable this but set PasswordAuthentication
/freebsd/lib/libpam/modules/pam_krb5/
H A Dpam_krb5.815 authentication,
26 .Ss Kerberos 5 Authentication Module
27 The Kerberos 5 authentication component
48 When prompting for the current password, the authentication
61 The following options may be passed to the authentication module:
72 authentication attempt was declined.
74 If the authentication module is not the first in the stack,
77 If this fails, the authentication
79 This option has no effect if the authentication module is
92 useful option if the authentication module is used for services such
[all …]
/freebsd/lib/libpam/modules/pam_ksu/
H A Dpam_ksu.848 The Kerberos 5 SU authentication service module for PAM,
50 for only one PAM category: authentication.
60 .Ss Kerberos 5 SU Authentication Module
61 The Kerberos 5 SU authentication component provides functions to verify
69 for authentication and authorization will be the
87 The following options may be passed to the authentication module:
95 If the authentication module
102 the authentication module returns failure
105 if the authentication module
/freebsd/contrib/wpa/src/rsn_supp/
H A Dpreauth.c2 * RSN pre-authentication (supplicant)
120 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " in rsn_preauth_eapol_cb()
134 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " in rsn_preauth_timeout()
168 * rsn_preauth_init - Start new RSN pre-authentication
172 * Returns: 0 on success, -1 on another pre-authentication is in progress,
176 * This function request an RSN pre-authentication with a given destination
179 * pre-authentication.
192 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init()
199 "processing for pre-authentication"); in rsn_preauth_init()
211 "pre-authentication"); in rsn_preauth_init()
[all …]
/freebsd/share/doc/psd/26.rpcrfc/
H A Drpc.rfc.ms164 control mechanisms can be built on top of the message authentication.
165 Several different authentication protocols can be supported. A field
167 information on specific authentication protocols can be found in the
168 \fIAuthentication Protocols\fP\,
193 Reasons why remote authentication failed.
243 Provisions for authentication of caller to service and vice-versa are
245 authentication fields, the credentials and verifier. The reply
246 message has one authentication field, the response verifier. The RPC
274 authentication fields is specified by individual, independent
275 authentication protocol specifications. (See
[all …]
/freebsd/usr.sbin/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf.538 and EAP authentication with Authentication Server using
101 EAP fast re-authentication; either 1 (default) or 0.
102 Control fast re-authentication support in EAP methods that support it.
193 (WPA using EAP authentication),
195 (IEEE 802.1x using EAP authentication and,
202 List of allowed IEEE 802.11 authentication algorithms; one or more of:
204 (Open System authentication, required for WPA/WPA2),
206 (Shared Key authentication),
268 (EAP-PEAP, with tunneled EAP authentication),
270 (EAP-TTLS, with tunneled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 authentication).
[all …]
/freebsd/share/man/man9/
H A Dcrypto_session.9110 authentication algorithm requested by
114 does not specify an authentication algorithm,
161 The authentication algorithm is specified in
173 compute an authentication digest over the request additional authentication
180 and the authentication algorithm is specified in
213 If either the cipher or authentication algorithms require an explicit
230 Authentication algorithm.
232 Length of authentication key in bytes.
233 If the authentication algorithm does not use a key,
236 Pointer to the authentication key.
/freebsd/lib/libpam/modules/pam_self/
H A Dpam_self.848 The Self authentication service module for PAM,
51 authentication.
57 .Ss Self Authentication Module
58 The Self authentication component
62 If the current real user ID is zero, authentication will fail,
67 The following options may be passed to the authentication module:
76 These messages include reasons why the user's authentication attempt
/freebsd/lib/libpam/modules/pam_rootok/
H A Dpam_rootok.838 The RootOK authentication service module for PAM,
41 authentication.
48 .Ss RootOK Authentication Module
49 The RootOK authentication component
57 The following options may be passed to the authentication module:
68 authentication attempt was declined.

12345678910>>...64