/freebsd/contrib/wpa/hostapd/ |
H A D | README | 2 Authenticator and RADIUS authentication server 56 included in the kernel driver: using external RADIUS authentication 62 EAP server (i.e., allow full authentication without requiring 63 an external RADIUS authentication server), and RADIUS authentication 64 server for EAP authentication. 81 Any wired Ethernet driver for wired IEEE 802.1X authentication 104 minimal authentication mechanism for stations, whereas IEEE 802.1X 109 Access Entity, and Authentication Server. Supplicant is a component in 110 a station and it performs the authentication with the Authentication 112 between a Supplicant and an Authentication Server. In addition, it has a [all …]
|
H A D | hlr_auc_gw.txt | 4 database/authentication gateway interface to HLR/AuC. It could be 6 authentication center (HLR/AuC). hostapd will send SIM/AKA 7 authentication queries over a UNIX domain socket to and external 10 hlr_auc_gw can be configured with GSM and UMTS authentication data with 13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the 34 -g<triplet file> = path for GSM authentication triplets 79 authentication server for EAP-SIM/AKA/AKA':
|
/freebsd/contrib/openpam/doc/man/ |
H A D | pam.3 | 23 .Nd Pluggable Authentication Modules Library 63 The Pluggable Authentication Modules (PAM) library abstracts a number 64 of common authentication-related operations and provides a framework 72 The user requesting authentication is called the applicant, while the 82 grouped into four facilities: authentication, account management, 121 .Ss Authentication 122 There are two authentication primitives: 167 Authentication information is unavailable. 169 Authentication token aging disabled. 171 Authentication token failure. [all …]
|
H A D | pam_get_authtok.3 | 7 .Nd retrieve authentication token 17 authentication token or retrieves a cached authentication token, 19 Either way, a pointer to the authentication token is stored in the 30 Returns the current authentication token, or the new token 31 when changing authentication tokens. 33 Returns the previous authentication token when changing 34 authentication tokens. 93 This should only be used for non-reusable authentication
|
H A D | pam_chauthtok.3 | 16 function attempts to change the authentication token 29 Change only those authentication tokens that have expired. 46 Authentication token aging disabled. 48 Authentication token failure. 50 Authentication token lock busy. 52 Failed to recover old authentication token. 73 .%T "X/Open Single Sign-On Service (XSSO) - Pluggable Authentication Modules"
|
/freebsd/lib/libc/rpc/ |
H A D | rpc_clnt_auth.3 | 12 .Nd library routines for client side remote procedure call authentication 29 with desired authentication. 41 The client's authentication information 50 style of authentication is discussed here. 54 A function macro that destroys the authentication 65 authentication handle that passes nonusable 66 authentication information with each remote procedure call. 67 This is the default authentication used by RPC. 69 Create and return an RPC authentication handle that contains 71 authentication information.
|
H A D | rpc_secure.3 | 43 Authentication. 53 secure authentication system, known as 55 authentication. 64 authentication system to work. 69 used on the client side, returns an authentication handle that 70 will enable the use of the secure authentication system. 95 then the authentication system will assume 112 then the authentication system will 123 authentication routines, 169 secure authentication system [all …]
|
/freebsd/crypto/heimdal/appl/telnet/telnetd/ |
H A D | telnetd.8 | 92 be used for authentication. 96 .Dv AUTHENTICATION 102 Turns on authentication debugging code. 105 can provide valid authentication information 111 can provide valid authentication information 119 Only allow connections that supply some authentication information. 121 by any of the existing authentication mechanisms, 134 Authentication information is not required. 135 If no or insufficient authentication information 141 This disables the authentication code. [all …]
|
/freebsd/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.8 | 40 .Nd authentication and session management with SSH private keys 50 authentication service module for PAM, 53 authentication 62 .Ss SSH Authentication Module 65 authentication component 71 The following options may be passed to the authentication module: 74 If the authentication module 81 the authentication module returns failure 84 if the authentication module 95 Normally, keys with no passphrase are ignored for authentication [all …]
|
/freebsd/lib/libpam/modules/pam_unix/ |
H A D | pam_unix.8 | 50 authentication service module for PAM, 53 authentication, account management, and password management. 63 .Ss Ux Ss Authentication Module 66 authentication component provides functions to verify the identity of 75 The following options may be passed to the authentication module: 83 If the authentication module is not the first in the stack, and a 86 If this fails, the authentication module returns failure without 88 This option has no effect if the authentication module is the first in 105 silently allow authentication to succeed. 121 silently allow authentication to succeed. [all …]
|
/freebsd/contrib/ntp/sntp/tests/ |
H A D | packetProcessing.c | 189 /* Activate authentication option */ in test_TooShortExtensionFieldLength() 191 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION)); 195 /* We demand authentication, but no MAC header is present. */ in test_UnauthenticatedPacketReject() 205 /* Activate authentication option */ in test_UnauthenticatedPacketReject() 207 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION)); 224 /* Activate authentication option */ 226 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION)); in test_AuthenticatedPacketInvalid() 257 /* Activate authentication option */ in test_AuthenticatedPacketUnknownKey() 259 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION)); in test_AuthenticatedPacketUnknownKey() 284 TEST_ASSERT_FALSE(ENABLED_OPT(AUTHENTICATION)); in test_ServerVersionTooOld() [all...] |
/freebsd/usr.sbin/ctld/ |
H A D | ctl.conf.5 | 125 Sets the authentication type. 133 it is usually used to disable authentication for a given 136 A set of CHAP authentication credentials. 145 A set of mutual CHAP authentication credentials. 170 Assign a previously defined authentication group to the portal group, 178 .Qq Ar no-authentication , 180 to permit discovery without authentication. 208 and authentication credentials. 209 The target is returned if it does not require CHAP authentication, 214 targets that require CHAP authentication will only be returned if [all …]
|
/freebsd/crypto/openssh/ |
H A D | sshd.8 | 71 key exchange, encryption, authentication, command execution, 214 authentication, and termination of each connection is logged. 254 from making DNS requests unless the authentication 256 Authentication mechanisms that may require DNS include 269 .Sh AUTHENTICATION 283 through a cryptographic message authentication code (MAC). 285 Finally, the server and the client enter an authentication dialog. 287 host-based authentication, 288 public key authentication, 289 challenge-response authentication, [all …]
|
H A D | sshd_config.5 | 187 Specifies the authentication methods that must be successfully completed 190 authentication method names, or by the single string 192 to indicate the default behaviour of accepting any single authentication 194 If the default is overridden, then successful authentication requires 199 would require the user to complete public key authentication, followed by 200 either password or keyboard interactive authentication. 203 keyboard-interactive authentication before public key. 205 For keyboard interactive authentication it is also possible to 206 restrict authentication to a specific device by appending a 214 would restrict keyboard interactive authentication to the [all …]
|
H A D | ssh.1 | 120 Enables forwarding of connections from an authentication agent such as 137 Disables forwarding of the authentication agent connection. 294 authentication. 298 public key authentication is read. 344 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI 436 A comma-separated list of MAC (message authentication code) algorithms, 780 debugging connection, authentication, and configuration problems. 878 .Sh AUTHENTICATION 881 The methods available for authentication are: 882 GSSAPI-based authentication, [all …]
|
H A D | OVERVIEW | 76 implement X11 forwarding, TCP/IP forwarding, and authentication 80 Authentication agent 82 - Code to communicate with the authentication agent is in authfd.c. 84 Authentication methods 86 - Code for various authentication methods resides in auth-*.c 93 - In the client end, authentication code is in sshconnect.c. It 96 authentication agent using authfd.c. 103 proxy), and performs authentication (ssh_login in sshconnect.c). 139 negotiate encryption, then perform authentication, preparatory 149 - authentication
|
H A D | sshd_config | 32 # Authentication: 59 # Change to yes to enable built-in password authentication. 64 # Change to no to disable PAM authentication 77 # Set this to 'no' to disable PAM authentication, account processing, 78 # and session processing. If this is enabled, PAM authentication will 81 # PAM authentication via KbdInteractiveAuthentication may bypass 84 # PAM authentication, then enable this but set PasswordAuthentication
|
/freebsd/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.8 | 15 authentication, 26 .Ss Kerberos 5 Authentication Module 27 The Kerberos 5 authentication component 48 When prompting for the current password, the authentication 61 The following options may be passed to the authentication module: 72 authentication attempt was declined. 74 If the authentication module is not the first in the stack, 77 If this fails, the authentication 79 This option has no effect if the authentication module is 92 useful option if the authentication module is used for services such [all …]
|
/freebsd/lib/libpam/modules/pam_ksu/ |
H A D | pam_ksu.8 | 48 The Kerberos 5 SU authentication service module for PAM, 50 for only one PAM category: authentication. 60 .Ss Kerberos 5 SU Authentication Module 61 The Kerberos 5 SU authentication component provides functions to verify 69 for authentication and authorization will be the 87 The following options may be passed to the authentication module: 95 If the authentication module 102 the authentication module returns failure 105 if the authentication module
|
/freebsd/contrib/wpa/src/rsn_supp/ |
H A D | preauth.c | 2 * RSN pre-authentication (supplicant) 120 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " in rsn_preauth_eapol_cb() 134 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " in rsn_preauth_timeout() 168 * rsn_preauth_init - Start new RSN pre-authentication 172 * Returns: 0 on success, -1 on another pre-authentication is in progress, 176 * This function request an RSN pre-authentication with a given destination 179 * pre-authentication. 192 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init() 199 "processing for pre-authentication"); in rsn_preauth_init() 211 "pre-authentication"); in rsn_preauth_init() [all …]
|
/freebsd/share/doc/psd/26.rpcrfc/ |
H A D | rpc.rfc.ms | 164 control mechanisms can be built on top of the message authentication. 165 Several different authentication protocols can be supported. A field 167 information on specific authentication protocols can be found in the 168 \fIAuthentication Protocols\fP\, 193 Reasons why remote authentication failed. 243 Provisions for authentication of caller to service and vice-versa are 245 authentication fields, the credentials and verifier. The reply 246 message has one authentication field, the response verifier. The RPC 274 authentication fields is specified by individual, independent 275 authentication protocol specifications. (See [all …]
|
/freebsd/usr.sbin/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf.5 | 38 and EAP authentication with Authentication Server using 101 EAP fast re-authentication; either 1 (default) or 0. 102 Control fast re-authentication support in EAP methods that support it. 193 (WPA using EAP authentication), 195 (IEEE 802.1x using EAP authentication and, 202 List of allowed IEEE 802.11 authentication algorithms; one or more of: 204 (Open System authentication, required for WPA/WPA2), 206 (Shared Key authentication), 268 (EAP-PEAP, with tunneled EAP authentication), 270 (EAP-TTLS, with tunneled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 authentication). [all …]
|
/freebsd/share/man/man9/ |
H A D | crypto_session.9 | 110 authentication algorithm requested by 114 does not specify an authentication algorithm, 161 The authentication algorithm is specified in 173 compute an authentication digest over the request additional authentication 180 and the authentication algorithm is specified in 213 If either the cipher or authentication algorithms require an explicit 230 Authentication algorithm. 232 Length of authentication key in bytes. 233 If the authentication algorithm does not use a key, 236 Pointer to the authentication key.
|
/freebsd/lib/libpam/modules/pam_self/ |
H A D | pam_self.8 | 48 The Self authentication service module for PAM, 51 authentication. 57 .Ss Self Authentication Module 58 The Self authentication component 62 If the current real user ID is zero, authentication will fail, 67 The following options may be passed to the authentication module: 76 These messages include reasons why the user's authentication attempt
|
/freebsd/lib/libpam/modules/pam_rootok/ |
H A D | pam_rootok.8 | 38 The RootOK authentication service module for PAM, 41 authentication. 48 .Ss RootOK Authentication Module 49 The RootOK authentication component 57 The following options may be passed to the authentication module: 68 authentication attempt was declined.
|