| /freebsd/sys/contrib/edk2/Include/Protocol/ |
| H A D | Security.h | 39 flash upon failure to authenticate, attestation logging for all signed drivers, 65 @retval EFI_SUCCESS The file specified by File did authenticate, and the 68 @retval EFI_SECURITY_VIOLATION The file specified by File did not authenticate, and 73 @retval EFI_ACCESS_DENIED The file specified by File did not authenticate, and 88 /// from the DXE core. This includes locking flash upon failure to authenticate,
|
| H A D | Security2.h | 59 FileBuffer did authenticate, and the platform policy dictates 62 and non-NULL FileBuffer did authenticate, and the platform 68 … authenticate, and the platform policy dictates that the file should be 72 authenticate, and the platform policy dictates that the DXE
|
| /freebsd/contrib/llvm-project/clang/lib/Headers/ |
| H A D | ptrauth.h | 61 authenticate. Nonetheless, this scheme provides a strong degree 77 check for null before attempting to authenticate it with one 129 This operation does not authenticate the original value and is 141 /* Authenticate a pointer using one scheme and resign it using another. 157 will not successfully authenticate. 165 /* Authenticate a pointer using one scheme and resign it as a C 186 /* Authenticate a data pointer.
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | port-aix.c | 120 * Since authenticate() doesn't check AUTH1, and sshd can't sanely support 121 * AUTH1 itself, in such a case authenticate() will allow access without 169 * Do authentication via AIX's authenticate routine. We loop until the 170 * reenter parameter is 0, but normally authenticate is called only once. 172 * Note: this function returns 1 on success, whereas AIX's authenticate() 183 result = authenticate((char *)name, (char *)password, &reenter, in sys_auth_passwd() 186 debug3("AIX/authenticate result %d, authmsg %.100s", result, in sys_auth_passwd()
|
| /freebsd/contrib/pam-krb5/module/ |
| H A D | alt-auth.c | 117 * Authenticate using an alternate principal mapping. 120 * provided password to try to authenticate as that user. If we succeed, fill 144 /* Log the principal we're attempting to authenticate as. */ in pamk5_alt_auth() 158 * Now, attempt to authenticate as that user. On success, save the in pamk5_alt_auth()
|
| H A D | auth.c | 323 * Authenticate via password. 326 * attempting to authenticate with and then attempt password authentication. 390 * Authenticate by trying each principal in the .k5login file. 393 * provided password to try to authenticate as that user. If at any point we 477 /* Now, attempt to authenticate as that user. */ in k5login_password_auth() 760 * Prompt the user for a password and authenticate the password with the KDC. 786 * Fill in the default principal to authenticate as. alt_auth_map or in pamk5_password_auth() 965 * Authenticate a user via Kerberos. 1024 * Note this means that, if the user can authenticate with multiple realms in pamk5_authenticate() 1035 * entered to authenticate to the password changing service, but don't in pamk5_authenticate() [all …]
|
| /freebsd/release/packages/ucl/ |
| H A D | pam-all.ucl | 23 wish to authenticate users, such as login(1) or sshd(8), with authentication 25 or Kerberos. PAM allows any application to authenticate using any supported
|
| /freebsd/contrib/openpam/doc/man/ |
| H A D | pam_get_item.3 | 37 authenticate. 55 name to authenticate as.
|
| H A D | pam.man | 7 In PAM parlance, the application that uses PAM to authenticate a user 15 The sequence of operations the server goes through to authenticate a
|
| H A D | pam.3 | 68 In PAM parlance, the application that uses PAM to authenticate a user 76 The sequence of operations the server goes through to authenticate a
|
| /freebsd/lib/libpam/modules/pam_krb5/ |
| H A D | pam_krb5.8 | 76 used to authenticate the user. 114 keytab to authenticate the Kerberos KDC's ticket. 182 used to authenticate the user.
|
| H A D | pam-krb5.8 | 180 user who did not authenticate with Kerberos (a return code of 289 available in a keytab to authenticate the Kerberos KDC's ticket. 410 Kerberos to authenticate password logins to the root account (which 445 file, attempting to use the supplied password to authenticate as each 716 successfully authenticate. 761 change their password during the authenticate step. 1007 module to authenticate the user without prompting the user again. 1065 This allows the user to authenticate with a different principal than the 1081 authenticate the user without prompting them again. 1105 authenticate the user without prompting the user again.
|
| /freebsd/lib/libutil/ |
| H A D | login_auth.3 | 24 .\" .Nm authenticate 41 .\". Fn authenticate "const char *name" "const char *classname" "const char *style" "const char *se…
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | kadmin.man | 65 The remote kadmin client uses Kerberos to authenticate to kadmind 70 ticket is used to authenticate to kadmind. Otherwise, the \fB\-p\fP and 72 used to authenticate. Once kadmin has determined the principal name, 74 ticket to authenticate to kadmind. 87 Use \fIprincipal\fP to authenticate. Otherwise, kadmin will append 491 to its password policy) so that it can successfully authenticate. 706 authenticate to the principal as a service. Multiple indicators 806 resets to 0 after a successful attempt to authenticate. A
|
| H A D | kerberos.man | 78 When you authenticate yourself with Kerberos you get an initial 89 re\-authenticate yourself to Kerberos to get new tickets using the 94 you to re\-authenticate.
|
| /freebsd/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ |
| H A D | kdb_ldap_conn.c | 43 /* Ensure that we have the parameters we need to authenticate to the LDAP 134 authenticate(krb5_ldap_context *ctx, krb5_ldap_server_handle *server) in authenticate() function 188 ret = authenticate(ldap_context, server); in initialize_server() 307 authenticate(ldap_context, handle) != 0) { in krb5_ldap_rebind()
|
| /freebsd/contrib/openpam/lib/libpam/ |
| H A D | pam_get_item.c | 101 * authenticate. 117 * name to authenticate as.
|
| /freebsd/usr.sbin/bluetooth/hccontrol/ |
| H A D | bluetooth.device.conf | 27 # authenticate the remote device at connection setup. At connection setup, 29 # try to authenticate the other device.
|
| /freebsd/contrib/openbsm/bin/auditdistd/ |
| H A D | auditdistd.conf.5 | 105 # Password used to authenticate in front of the receiver. 154 # Password used by the sender to authenticate. 321 Password used to authenticate the sender in front of the receiver.
|
| /freebsd/crypto/krb5/src/lib/rpc/ |
| H A D | svc_auth.c | 43 * Server side authenticators are called from authenticate by 70 * the raw form of credentials and verifiers. authenticate returns AUTH_OK
|
| /freebsd/share/man/man5/ |
| H A D | bluetooth.device.conf.5 | 76 parameter controls if the device requires to authenticate the remote device 80 the device will try to authenticate the other device at connection setup.
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/ |
| H A D | AArch64PointerAuth.h | 29 /// <authenticate LR> 36 /// <authenticate LR>
|
| /freebsd/lib/libpam/modules/pam_unix/ |
| H A D | pam_unix.8 | 85 authenticate the user. 96 This option will require the user to authenticate themselves as
|
| /freebsd/contrib/pam-krb5/docs/ |
| H A D | pam_krb5.pod | 144 user who did not authenticate with Kerberos (a return code of C<ignore> in 222 key available in a keytab to authenticate the Kerberos KDC's ticket. 310 to authenticate password logins to the root account (which isn't 334 attempting to use the supplied password to authenticate as each principal 538 expired accounts may be able to successfully authenticate. Many 573 change their password during the authenticate step. Under normal 763 module to authenticate the user without prompting the user again. If no 804 to use for authentication. This allows the user to authenticate with a 820 authenticate the user without prompting them again. If that 842 authenticate the user without prompting the user again. If no previous
|
| /freebsd/contrib/ntp/ntpq/ |
| H A D | ntpq.1ntpqmdoc | 153 .It Ic authenticate Op Cm yes Ns | Ns Cm no 156 does not authenticate requests unless 159 .Ic authenticate Cm yes 167 .Ic authenticate 228 used to authenticate configuration requests. 260 be echoed) which will be used to authenticate configuration
|