Home
last modified time | relevance | path

Searched full:authenticate (Results 1 – 25 of 452) sorted by relevance

12345678910>>...19

/freebsd/contrib/llvm-project/clang/lib/Headers/
H A Dptrauth.h61 authenticate. Nonetheless, this scheme provides a strong degree
77 check for null before attempting to authenticate it with one
129 This operation does not authenticate the original value and is
141 /* Authenticate a pointer using one scheme and resign it using another.
157 will not successfully authenticate.
165 /* Authenticate a pointer using one scheme and resign it as a C
186 /* Authenticate a data pointer.
/freebsd/crypto/openssh/openbsd-compat/
H A Dport-aix.c120 * Since authenticate() doesn't check AUTH1, and sshd can't sanely support
121 * AUTH1 itself, in such a case authenticate() will allow access without
169 * Do authentication via AIX's authenticate routine. We loop until the
170 * reenter parameter is 0, but normally authenticate is called only once.
172 * Note: this function returns 1 on success, whereas AIX's authenticate()
183 result = authenticate((char *)name, (char *)password, &reenter, in sys_auth_passwd()
186 debug3("AIX/authenticate result %d, authmsg %.100s", result, in sys_auth_passwd()
/freebsd/contrib/pam-krb5/module/
H A Dalt-auth.c117 * Authenticate using an alternate principal mapping.
120 * provided password to try to authenticate as that user. If we succeed, fill
144 /* Log the principal we're attempting to authenticate as. */ in pamk5_alt_auth()
158 * Now, attempt to authenticate as that user. On success, save the in pamk5_alt_auth()
H A Dauth.c323 * Authenticate via password.
326 * attempting to authenticate with and then attempt password authentication.
390 * Authenticate by trying each principal in the .k5login file.
393 * provided password to try to authenticate as that user. If at any point we
477 /* Now, attempt to authenticate as that user. */ in k5login_password_auth()
754 * Prompt the user for a password and authenticate the password with the KDC.
780 * Fill in the default principal to authenticate as. alt_auth_map or in pamk5_password_auth()
959 * Authenticate a user via Kerberos.
1018 * Note this means that, if the user can authenticate with multiple realms in pamk5_authenticate()
1029 * entered to authenticate to the password changing service, but don't in pamk5_authenticate()
[all …]
/freebsd/lib/libpam/modules/pam_krb5/
H A Dpam_krb5.876 used to authenticate the user.
114 keytab to authenticate the Kerberos KDC's ticket.
182 used to authenticate the user.
H A Dpam-krb5.8191 user who did not authenticate with Kerberos (a return code of \f(CW\*(C`ignore\*(C'\fR in
350 to authenticate password logins to the root account (which isn't
372 attempting to use the supplied password to authenticate as each principal
557 expired accounts may be able to successfully authenticate. Many
590 change their password during the authenticate step. Under normal
764 module to authenticate the user without prompting the user again. If no
803 to use for authentication. This allows the user to authenticate with a
818 authenticate the user without prompting them again. If that
838 authenticate the user without prompting the user again. If no previous
/freebsd/contrib/openpam/doc/man/
H A Dpam_get_item.337 authenticate.
55 name to authenticate as.
H A Dpam.man7 In PAM parlance, the application that uses PAM to authenticate a user
15 The sequence of operations the server goes through to authenticate a
H A Dpam.368 In PAM parlance, the application that uses PAM to authenticate a user
76 The sequence of operations the server goes through to authenticate a
/freebsd/lib/libutil/
H A Dlogin_auth.324 .\" .Nm authenticate
41 .\". Fn authenticate "const char *name" "const char *classname" "const char *style" "const char *se…
/freebsd/crypto/krb5/src/man/
H A Dkadmin.man65 The remote kadmin client uses Kerberos to authenticate to kadmind
70 ticket is used to authenticate to kadmind. Otherwise, the \fB\-p\fP and
72 used to authenticate. Once kadmin has determined the principal name,
74 ticket to authenticate to kadmind.
87 Use \fIprincipal\fP to authenticate. Otherwise, kadmin will append
491 to its password policy) so that it can successfully authenticate.
706 authenticate to the principal as a service. Multiple indicators
806 resets to 0 after a successful attempt to authenticate. A
H A Dkerberos.man78 When you authenticate yourself with Kerberos you get an initial
89 re\-authenticate yourself to Kerberos to get new tickets using the
94 you to re\-authenticate.
/freebsd/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/
H A Dkdb_ldap_conn.c43 /* Ensure that we have the parameters we need to authenticate to the LDAP
134 authenticate(krb5_ldap_context *ctx, krb5_ldap_server_handle *server) in authenticate() function
188 ret = authenticate(ldap_context, server); in initialize_server()
307 authenticate(ldap_context, handle) != 0) { in krb5_ldap_rebind()
/freebsd/contrib/openpam/lib/libpam/
H A Dpam_get_item.c101 * authenticate.
117 * name to authenticate as.
/freebsd/usr.sbin/bluetooth/hccontrol/
H A Dbluetooth.device.conf27 # authenticate the remote device at connection setup. At connection setup,
29 # try to authenticate the other device.
/freebsd/contrib/openbsm/bin/auditdistd/
H A Dauditdistd.conf.5105 # Password used to authenticate in front of the receiver.
154 # Password used by the sender to authenticate.
321 Password used to authenticate the sender in front of the receiver.
/freebsd/crypto/krb5/src/lib/rpc/
H A Dsvc_auth.c43 * Server side authenticators are called from authenticate by
70 * the raw form of credentials and verifiers. authenticate returns AUTH_OK
/freebsd/share/man/man5/
H A Dbluetooth.device.conf.576 parameter controls if the device requires to authenticate the remote device
80 the device will try to authenticate the other device at connection setup.
/freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/
H A DAArch64PointerAuth.h29 /// <authenticate LR>
36 /// <authenticate LR>
/freebsd/lib/libpam/modules/pam_unix/
H A Dpam_unix.885 authenticate the user.
96 This option will require the user to authenticate themselves as
/freebsd/contrib/ntp/ntpq/
H A Dntpq.1ntpqmdoc153 .It Ic authenticate Op Cm yes Ns | Ns Cm no
156 does not authenticate requests unless
159 .Ic authenticate Cm yes
167 .Ic authenticate
228 used to authenticate configuration requests.
260 be echoed) which will be used to authenticate configuration
H A Dntpq.mdoc.in153 .It Ic authenticate Op Cm yes Ns | Ns Cm no
156 does not authenticate requests unless
159 .Ic authenticate Cm yes
167 .Ic authenticate
228 used to authenticate configuration requests.
260 be echoed) which will be used to authenticate configuration
/freebsd/crypto/heimdal/appl/test/
H A Dhttp_client.c349 if (http_find_header(&req, "WWW-Authenticate:") == NULL) in main()
350 errx(1, "Got %s but missed `WWW-Authenticate'", req.response); in main()
355 const char *h = http_find_header(&req, "WWW-Authenticate:"); in main()
357 errx(1, "Got %s but missed `WWW-Authenticate'", req.response); in main()
/freebsd/contrib/pam-krb5/tests/fakepam/
H A DREADME55 authenticate as a variety of users, but PAM modules may expect the
99 The user as which to authenticate, passed into pam_start and also
186 "authenticate", "setcred", "chauthtok", "open_session", or
/freebsd/lib/libgssapi/
H A Dgss_inquire_context.379 If the context acceptor did not authenticate itself,
135 The acceptor did not authenticate itself.

12345678910>>...19