Home
last modified time | relevance | path

Searched full:authenticate (Results 1 – 25 of 458) sorted by relevance

12345678910>>...19

/freebsd/sys/contrib/edk2/Include/Protocol/
H A DSecurity.h39 flash upon failure to authenticate, attestation logging for all signed drivers,
65 @retval EFI_SUCCESS The file specified by File did authenticate, and the
68 @retval EFI_SECURITY_VIOLATION The file specified by File did not authenticate, and
73 @retval EFI_ACCESS_DENIED The file specified by File did not authenticate, and
88 /// from the DXE core. This includes locking flash upon failure to authenticate,
H A DSecurity2.h59 FileBuffer did authenticate, and the platform policy dictates
62 and non-NULL FileBuffer did authenticate, and the platform
68authenticate, and the platform policy dictates that the file should be
72 authenticate, and the platform policy dictates that the DXE
/freebsd/contrib/llvm-project/clang/lib/Headers/
H A Dptrauth.h61 authenticate. Nonetheless, this scheme provides a strong degree
77 check for null before attempting to authenticate it with one
129 This operation does not authenticate the original value and is
141 /* Authenticate a pointer using one scheme and resign it using another.
157 will not successfully authenticate.
165 /* Authenticate a pointer using one scheme and resign it as a C
186 /* Authenticate a data pointer.
/freebsd/crypto/openssh/openbsd-compat/
H A Dport-aix.c120 * Since authenticate() doesn't check AUTH1, and sshd can't sanely support
121 * AUTH1 itself, in such a case authenticate() will allow access without
169 * Do authentication via AIX's authenticate routine. We loop until the
170 * reenter parameter is 0, but normally authenticate is called only once.
172 * Note: this function returns 1 on success, whereas AIX's authenticate()
183 result = authenticate((char *)name, (char *)password, &reenter, in sys_auth_passwd()
186 debug3("AIX/authenticate result %d, authmsg %.100s", result, in sys_auth_passwd()
/freebsd/contrib/pam-krb5/module/
H A Dalt-auth.c117 * Authenticate using an alternate principal mapping.
120 * provided password to try to authenticate as that user. If we succeed, fill
144 /* Log the principal we're attempting to authenticate as. */ in pamk5_alt_auth()
158 * Now, attempt to authenticate as that user. On success, save the in pamk5_alt_auth()
H A Dauth.c323 * Authenticate via password.
326 * attempting to authenticate with and then attempt password authentication.
390 * Authenticate by trying each principal in the .k5login file.
393 * provided password to try to authenticate as that user. If at any point we
477 /* Now, attempt to authenticate as that user. */ in k5login_password_auth()
760 * Prompt the user for a password and authenticate the password with the KDC.
786 * Fill in the default principal to authenticate as. alt_auth_map or in pamk5_password_auth()
965 * Authenticate a user via Kerberos.
1024 * Note this means that, if the user can authenticate with multiple realms in pamk5_authenticate()
1035 * entered to authenticate to the password changing service, but don't in pamk5_authenticate()
[all …]
/freebsd/release/packages/ucl/
H A Dpam-all.ucl23 wish to authenticate users, such as login(1) or sshd(8), with authentication
25 or Kerberos. PAM allows any application to authenticate using any supported
/freebsd/contrib/openpam/doc/man/
H A Dpam_get_item.337 authenticate.
55 name to authenticate as.
H A Dpam.man7 In PAM parlance, the application that uses PAM to authenticate a user
15 The sequence of operations the server goes through to authenticate a
H A Dpam.368 In PAM parlance, the application that uses PAM to authenticate a user
76 The sequence of operations the server goes through to authenticate a
/freebsd/lib/libpam/modules/pam_krb5/
H A Dpam_krb5.876 used to authenticate the user.
114 keytab to authenticate the Kerberos KDC's ticket.
182 used to authenticate the user.
H A Dpam-krb5.8180 user who did not authenticate with Kerberos (a return code of
289 available in a keytab to authenticate the Kerberos KDC's ticket.
410 Kerberos to authenticate password logins to the root account (which
445 file, attempting to use the supplied password to authenticate as each
716 successfully authenticate.
761 change their password during the authenticate step.
1007 module to authenticate the user without prompting the user again.
1065 This allows the user to authenticate with a different principal than the
1081 authenticate the user without prompting them again.
1105 authenticate the user without prompting the user again.
/freebsd/lib/libutil/
H A Dlogin_auth.324 .\" .Nm authenticate
41 .\". Fn authenticate "const char *name" "const char *classname" "const char *style" "const char *se…
/freebsd/crypto/krb5/src/man/
H A Dkadmin.man65 The remote kadmin client uses Kerberos to authenticate to kadmind
70 ticket is used to authenticate to kadmind. Otherwise, the \fB\-p\fP and
72 used to authenticate. Once kadmin has determined the principal name,
74 ticket to authenticate to kadmind.
87 Use \fIprincipal\fP to authenticate. Otherwise, kadmin will append
491 to its password policy) so that it can successfully authenticate.
706 authenticate to the principal as a service. Multiple indicators
806 resets to 0 after a successful attempt to authenticate. A
H A Dkerberos.man78 When you authenticate yourself with Kerberos you get an initial
89 re\-authenticate yourself to Kerberos to get new tickets using the
94 you to re\-authenticate.
/freebsd/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/
H A Dkdb_ldap_conn.c43 /* Ensure that we have the parameters we need to authenticate to the LDAP
134 authenticate(krb5_ldap_context *ctx, krb5_ldap_server_handle *server) in authenticate() function
188 ret = authenticate(ldap_context, server); in initialize_server()
307 authenticate(ldap_context, handle) != 0) { in krb5_ldap_rebind()
/freebsd/contrib/openpam/lib/libpam/
H A Dpam_get_item.c101 * authenticate.
117 * name to authenticate as.
/freebsd/usr.sbin/bluetooth/hccontrol/
H A Dbluetooth.device.conf27 # authenticate the remote device at connection setup. At connection setup,
29 # try to authenticate the other device.
/freebsd/contrib/openbsm/bin/auditdistd/
H A Dauditdistd.conf.5105 # Password used to authenticate in front of the receiver.
154 # Password used by the sender to authenticate.
321 Password used to authenticate the sender in front of the receiver.
/freebsd/crypto/krb5/src/lib/rpc/
H A Dsvc_auth.c43 * Server side authenticators are called from authenticate by
70 * the raw form of credentials and verifiers. authenticate returns AUTH_OK
/freebsd/share/man/man5/
H A Dbluetooth.device.conf.576 parameter controls if the device requires to authenticate the remote device
80 the device will try to authenticate the other device at connection setup.
/freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/
H A DAArch64PointerAuth.h29 /// <authenticate LR>
36 /// <authenticate LR>
/freebsd/lib/libpam/modules/pam_unix/
H A Dpam_unix.885 authenticate the user.
96 This option will require the user to authenticate themselves as
/freebsd/contrib/pam-krb5/docs/
H A Dpam_krb5.pod144 user who did not authenticate with Kerberos (a return code of C<ignore> in
222 key available in a keytab to authenticate the Kerberos KDC's ticket.
310 to authenticate password logins to the root account (which isn't
334 attempting to use the supplied password to authenticate as each principal
538 expired accounts may be able to successfully authenticate. Many
573 change their password during the authenticate step. Under normal
763 module to authenticate the user without prompting the user again. If no
804 to use for authentication. This allows the user to authenticate with a
820 authenticate the user without prompting them again. If that
842 authenticate the user without prompting the user again. If no previous
/freebsd/contrib/ntp/ntpq/
H A Dntpq.1ntpqmdoc153 .It Ic authenticate Op Cm yes Ns | Ns Cm no
156 does not authenticate requests unless
159 .Ic authenticate Cm yes
167 .Ic authenticate
228 used to authenticate configuration requests.
260 be echoed) which will be used to authenticate configuration

12345678910>>...19