| /freebsd/contrib/llvm-project/clang/lib/Headers/ |
| H A D | ptrauth.h | 61 authenticate. Nonetheless, this scheme provides a strong degree 77 check for null before attempting to authenticate it with one 129 This operation does not authenticate the original value and is 141 /* Authenticate a pointer using one scheme and resign it using another. 157 will not successfully authenticate. 165 /* Authenticate a pointer using one scheme and resign it as a C 186 /* Authenticate a data pointer.
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | port-aix.c | 120 * Since authenticate() doesn't check AUTH1, and sshd can't sanely support 121 * AUTH1 itself, in such a case authenticate() will allow access without 169 * Do authentication via AIX's authenticate routine. We loop until the 170 * reenter parameter is 0, but normally authenticate is called only once. 172 * Note: this function returns 1 on success, whereas AIX's authenticate() 183 result = authenticate((char *)name, (char *)password, &reenter, in sys_auth_passwd() 186 debug3("AIX/authenticate result %d, authmsg %.100s", result, in sys_auth_passwd()
|
| /freebsd/contrib/pam-krb5/module/ |
| H A D | alt-auth.c | 117 * Authenticate using an alternate principal mapping. 120 * provided password to try to authenticate as that user. If we succeed, fill 144 /* Log the principal we're attempting to authenticate as. */ in pamk5_alt_auth() 158 * Now, attempt to authenticate as that user. On success, save the in pamk5_alt_auth()
|
| H A D | auth.c | 323 * Authenticate via password. 326 * attempting to authenticate with and then attempt password authentication. 390 * Authenticate by trying each principal in the .k5login file. 393 * provided password to try to authenticate as that user. If at any point we 477 /* Now, attempt to authenticate as that user. */ in k5login_password_auth() 754 * Prompt the user for a password and authenticate the password with the KDC. 780 * Fill in the default principal to authenticate as. alt_auth_map or in pamk5_password_auth() 959 * Authenticate a user via Kerberos. 1018 * Note this means that, if the user can authenticate with multiple realms in pamk5_authenticate() 1029 * entered to authenticate to the password changing service, but don't in pamk5_authenticate() [all …]
|
| /freebsd/lib/libpam/modules/pam_krb5/ |
| H A D | pam_krb5.8 | 76 used to authenticate the user. 114 keytab to authenticate the Kerberos KDC's ticket. 182 used to authenticate the user.
|
| H A D | pam-krb5.8 | 191 user who did not authenticate with Kerberos (a return code of \f(CW\*(C`ignore\*(C'\fR in 350 to authenticate password logins to the root account (which isn't 372 attempting to use the supplied password to authenticate as each principal 557 expired accounts may be able to successfully authenticate. Many 590 change their password during the authenticate step. Under normal 764 module to authenticate the user without prompting the user again. If no 803 to use for authentication. This allows the user to authenticate with a 818 authenticate the user without prompting them again. If that 838 authenticate the user without prompting the user again. If no previous
|
| /freebsd/contrib/openpam/doc/man/ |
| H A D | pam_get_item.3 | 37 authenticate. 55 name to authenticate as.
|
| H A D | pam.man | 7 In PAM parlance, the application that uses PAM to authenticate a user 15 The sequence of operations the server goes through to authenticate a
|
| H A D | pam.3 | 68 In PAM parlance, the application that uses PAM to authenticate a user 76 The sequence of operations the server goes through to authenticate a
|
| /freebsd/lib/libutil/ |
| H A D | login_auth.3 | 24 .\" .Nm authenticate 41 .\". Fn authenticate "const char *name" "const char *classname" "const char *style" "const char *se…
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | kadmin.man | 65 The remote kadmin client uses Kerberos to authenticate to kadmind 70 ticket is used to authenticate to kadmind. Otherwise, the \fB\-p\fP and 72 used to authenticate. Once kadmin has determined the principal name, 74 ticket to authenticate to kadmind. 87 Use \fIprincipal\fP to authenticate. Otherwise, kadmin will append 491 to its password policy) so that it can successfully authenticate. 706 authenticate to the principal as a service. Multiple indicators 806 resets to 0 after a successful attempt to authenticate. A
|
| H A D | kerberos.man | 78 When you authenticate yourself with Kerberos you get an initial 89 re\-authenticate yourself to Kerberos to get new tickets using the 94 you to re\-authenticate.
|
| /freebsd/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ |
| H A D | kdb_ldap_conn.c | 43 /* Ensure that we have the parameters we need to authenticate to the LDAP 134 authenticate(krb5_ldap_context *ctx, krb5_ldap_server_handle *server) in authenticate() function 188 ret = authenticate(ldap_context, server); in initialize_server() 307 authenticate(ldap_context, handle) != 0) { in krb5_ldap_rebind()
|
| /freebsd/contrib/openpam/lib/libpam/ |
| H A D | pam_get_item.c | 101 * authenticate. 117 * name to authenticate as.
|
| /freebsd/usr.sbin/bluetooth/hccontrol/ |
| H A D | bluetooth.device.conf | 27 # authenticate the remote device at connection setup. At connection setup, 29 # try to authenticate the other device.
|
| /freebsd/contrib/openbsm/bin/auditdistd/ |
| H A D | auditdistd.conf.5 | 105 # Password used to authenticate in front of the receiver. 154 # Password used by the sender to authenticate. 321 Password used to authenticate the sender in front of the receiver.
|
| /freebsd/crypto/krb5/src/lib/rpc/ |
| H A D | svc_auth.c | 43 * Server side authenticators are called from authenticate by 70 * the raw form of credentials and verifiers. authenticate returns AUTH_OK
|
| /freebsd/share/man/man5/ |
| H A D | bluetooth.device.conf.5 | 76 parameter controls if the device requires to authenticate the remote device 80 the device will try to authenticate the other device at connection setup.
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/ |
| H A D | AArch64PointerAuth.h | 29 /// <authenticate LR> 36 /// <authenticate LR>
|
| /freebsd/lib/libpam/modules/pam_unix/ |
| H A D | pam_unix.8 | 85 authenticate the user. 96 This option will require the user to authenticate themselves as
|
| /freebsd/contrib/ntp/ntpq/ |
| H A D | ntpq.1ntpqmdoc | 153 .It Ic authenticate Op Cm yes Ns | Ns Cm no 156 does not authenticate requests unless 159 .Ic authenticate Cm yes 167 .Ic authenticate 228 used to authenticate configuration requests. 260 be echoed) which will be used to authenticate configuration
|
| H A D | ntpq.mdoc.in | 153 .It Ic authenticate Op Cm yes Ns | Ns Cm no 156 does not authenticate requests unless 159 .Ic authenticate Cm yes 167 .Ic authenticate 228 used to authenticate configuration requests. 260 be echoed) which will be used to authenticate configuration
|
| /freebsd/crypto/heimdal/appl/test/ |
| H A D | http_client.c | 349 if (http_find_header(&req, "WWW-Authenticate:") == NULL) in main() 350 errx(1, "Got %s but missed `WWW-Authenticate'", req.response); in main() 355 const char *h = http_find_header(&req, "WWW-Authenticate:"); in main() 357 errx(1, "Got %s but missed `WWW-Authenticate'", req.response); in main()
|
| /freebsd/contrib/pam-krb5/tests/fakepam/ |
| H A D | README | 55 authenticate as a variety of users, but PAM modules may expect the 99 The user as which to authenticate, passed into pam_start and also 186 "authenticate", "setcred", "chauthtok", "open_session", or
|
| /freebsd/lib/libgssapi/ |
| H A D | gss_inquire_context.3 | 79 If the context acceptor did not authenticate itself, 135 The acceptor did not authenticate itself.
|