Home
last modified time | relevance | path

Searched full:authenticated (Results 1 – 25 of 544) sorted by relevance

12345678910>>...22

/freebsd/contrib/bearssl/inc/
H A Dbearssl_aead.h40 * # Authenticated Encryption with Additional Data
60 * - Additional authenticated data, which is covered by the MAC but
65 * authenticated data and the nonce are sent to the receiver; the
92 * Inject some additional authenticated data. Additional data may
98 * authenticated data, and before beginning to encrypt the plaintext
125 * - The additional authenticated data must be processed first,
128 * - Nonce, plaintext and additional authenticated data all consist
153 * Pointer to the additional authenticated data injection function.
210 * \brief Inject additional authenticated data.
218 * \param data pointer to additional authenticated data.
[all …]
/freebsd/crypto/openssh/
H A Dauth2.c274 int r, authenticated = 0; in input_userauth_request()
346 authenticated = m->userauth(ssh, method); in input_userauth_request()
348 if (!authctxt->authenticated && strcmp(method, "none") != 0) in input_userauth_request()
351 userauth_finish(ssh, authenticated, method, NULL); in input_userauth_request()
361 userauth_finish(struct ssh *ssh, int authenticated, const char *packet_method,
370 if (authenticated) { in userauth_finish()
372 fatal("INTERNAL ERROR: authenticated invalid user %s", in userauth_finish()
376 fatal("INTERNAL ERROR: authenticated and postponed"); in userauth_finish()
384 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish()
386 authenticated in userauth_finish()
275 int r, authenticated = 0; input_userauth_request() local
362 userauth_finish(struct ssh * ssh,int authenticated,const char * packet_method,const char * submethod) userauth_finish() argument
721 auth2_record_key(Authctxt * authctxt,int authenticated,const struct sshkey * key) auth2_record_key() argument
[all...]
H A Dauth2-hostbased.c68 int r, pktype, authenticated = 0; in userauth_hostbased() local
148 authenticated = 0; in userauth_hostbased()
153 authenticated = 1; in userauth_hostbased()
155 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased()
158 debug2_f("authenticated %d", authenticated); in userauth_hostbased()
165 return authenticated; in userauth_hostbased()
H A Dmonitor.c277 int authenticated = 0, partial = 0; in monitor_child_preauth() local
300 while (!authenticated) { in monitor_child_preauth()
306 authenticated = (monitor_read(ssh, pmonitor, in monitor_child_preauth()
315 if (authenticated && in monitor_child_preauth()
319 authenticated = 0; in monitor_child_preauth()
324 if (authenticated) { in monitor_child_preauth()
330 authenticated = 0; in monitor_child_preauth()
333 if (options.use_pam && authenticated) { in monitor_child_preauth()
341 authenticated = mm_answer_pam_account( in monitor_child_preauth()
348 auth_log(ssh, authenticated, partial, in monitor_child_preauth()
[all …]
H A Dauth2-gss.c257 int r, authenticated; in input_gssapi_exchange_complete() local
270 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_exchange_complete()
277 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete()
286 int r, authenticated = 0; in input_gssapi_mic() local
311 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_mic()
323 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
H A Dauth2-kbdint.c50 int r, authenticated = 0; in userauth_kbdint() local
61 authenticated = auth2_challenge(ssh, devs); in userauth_kbdint()
65 return authenticated; in userauth_kbdint()
H A Dauth2-passwd.c56 int authenticated = 0, r; in userauth_passwd() local
71 authenticated = 1; in userauth_passwd()
73 return authenticated; in userauth_passwd()
H A Dauth2-pubkey.c104 int req_presence = 0, req_verify = 0, authenticated = 0; in userauth_pubkey() local
227 authenticated = 0; in userauth_pubkey()
233 authenticated = 1; in userauth_pubkey()
235 if (authenticated == 1 && sig_details != NULL) { in userauth_pubkey()
252 authenticated = 0; in userauth_pubkey()
266 authenticated = 0; in userauth_pubkey()
270 auth2_record_key(authctxt, authenticated, key); in userauth_pubkey()
302 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) { in userauth_pubkey()
304 authenticated = 0; in userauth_pubkey()
306 debug2_f("authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey()
[all …]
H A DPROTOCOL.chacha20poly13051 This document describes the chacha20-poly1305@openssh.com authenticated
17 authenticated encryption mode. The construction used is based on that
43 (Authenticated Encryption with Associated Data) that is used to encrypt
/freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/
H A DAArch64PointerAuth.h18 /// Variants of check performed on an authenticated pointer.
50 /// Check by comparing bits 62 and 61 of the authenticated address.
59 /// Check by comparing the authenticated value with an XPAC-ed one without
78 "Do not check authenticated address"), \
80 "Perform dummy load from authenticated address"), \
97 /// Some of the methods may need to know if the pointer was authenticated
/freebsd/crypto/heimdal/lib/gssapi/mech/
H A Dgss_get_name_attribute.c39 int *authenticated, in gss_get_name_attribute() argument
50 if (authenticated != NULL) in gss_get_name_attribute()
51 *authenticated = 0; in gss_get_name_attribute()
69 authenticated, in gss_get_name_attribute()
H A Dgss_authorize_localname.c85 int authenticated = 0, complete = 0; in attr_authorize_localname() local
90 &authenticated, in attr_authorize_localname()
101 if (authenticated && in attr_authorize_localname()
/freebsd/crypto/krb5/src/lib/gssapi/mechglue/
H A Dg_get_name_attr.c34 int *authenticated, in gss_get_name_attribute() argument
46 if (authenticated != NULL) in gss_get_name_attribute()
47 *authenticated = 0; in gss_get_name_attribute()
84 authenticated, in gss_get_name_attribute()
/freebsd/crypto/krb5/src/clients/ksu/
H A Dt_ksu.py196 expected_msg='Authenticated ksutest@KRBTEST.COM')
220 expected_msg='Authenticated ksutest@KRBTEST.COM')
222 expected_msg='Authenticated ksutest@KRBTEST.COM')
225 expected_msg='Authenticated %s@KRBTEST.COM' % caller_username)
233 expected_msg='Authenticated alice@KRBTEST.COM')
235 expected_msg='Authenticated ksutest@KRBTEST.COM')
237 expected_msg='Authenticated %s@KRBTEST.COM' % caller_username)
241 expected_msg='Authenticated ksutest/root@KRBTEST.COM')
/freebsd/contrib/telnet/libtelnet/
H A Dauth.c96 static Authenticator *authenticated = 0; variable
202 authenticated = 0; in auth_init()
541 if (!(authenticated = ap)) in auth_finished()
542 authenticated = &NoAuth; in auth_finished()
564 while (!authenticated) in auth_wait()
573 if (!authenticated || authenticated == &NoAuth) in auth_wait()
579 if (authenticated->status) in auth_wait()
580 validuser = (*authenticated->status)(authenticated, in auth_wait()
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A Dauth.c98 static Authenticator *authenticated = 0; variable
196 authenticated = 0; in auth_init()
544 if (!(authenticated = ap)) in auth_finished()
545 authenticated = &NoAuth; in auth_finished()
567 while (!authenticated) in auth_wait()
576 if (!authenticated || authenticated == &NoAuth) in auth_wait()
582 if (authenticated->status) in auth_wait()
583 validuser = (*authenticated->status)(authenticated, in auth_wait()
/freebsd/contrib/ntp/sntp/
H A Dnetworking.c125 * is present and the packet is not authenticated. If 1, the in process_pkt()
126 * packet is a crypto-NAK; if 3, the packet is authenticated in process_pkt()
127 * with DES; if 5, the packet is authenticated with MD5; if 6, in process_pkt()
128 * the packet is authenticated with SHA. If 2 or 4, the packet in process_pkt()
199 TRACE(1, ("sntp %s: packet from %s authenticated using key id %d.\n", in process_pkt()
/freebsd/crypto/openssl/doc/man3/
H A DCMS_add0_cert.pod30 I<cms> must be of type signed data or (authenticated) enveloped data.
38 I<cms> must be of type signed data or (authenticated) enveloped data.
49 data or authenticated enveloped data or an error will be returned.
/freebsd/contrib/pam-krb5/tests/data/scripts/expired/
H A Ddefer-mit30 INFO user %u authenticated as %0 (expired)
33 INFO user %u authenticated as %0
H A Ddefer-mit-debug35 INFO user %u authenticated as %0 (expired)
47 INFO user %u authenticated as %0
/freebsd/secure/lib/libcrypto/man/man3/
H A DCMS_add0_cert.389 \&\fIcms\fR must be of type signed data or (authenticated) enveloped data.
97 \&\fIcms\fR must be of type signed data or (authenticated) enveloped data.
107 data or authenticated enveloped data or an error will be returned.
/freebsd/lib/libpam/modules/pam_unix/
H A Dpam_unix.8104 authenticated, then this option will forgo password prompting, and
119 authenticated, but the password matches an empty string,
142 The function verifies that the authenticated user is allowed to log
/freebsd/contrib/wpa/src/pae/
H A Dieee802_1x_cp.c26 enum connect_type { PENDING, UNAUTHENTICATED, AUTHENTICATED, SECURE }; enumerator
185 SM_STATE(CP, AUTHENTICATED) in SM_STATE() argument
187 SM_ENTRY(CP, AUTHENTICATED); in SM_STATE()
372 else if (sm->connect == AUTHENTICATED) in SM_STEP()
373 SM_ENTER(CP, AUTHENTICATED); in SM_STEP()
384 if (sm->connect != AUTHENTICATED) in SM_STEP()
576 sm->connect = AUTHENTICATED; in ieee802_1x_cp_connect_authenticated()
/freebsd/contrib/pam-krb5/tests/module/
H A Dfast-t.c2 * Tests for authenticated FAST support in pam-krb5.
6 * protecting it against various attacks. This tests authenticated FAST;
/freebsd/contrib/ntp/html/
H A Daccopt.html79 authenticated source. A value of -1 means "unlimited", which is the
128 even if authenticated.</dd>
139 authenticated. This includes broadcast, symmetric-active and
156 <dd>Deny packets that are not cryptographically authenticated. Note
163 authenticated. If <tt>auth</tt> is disabled, but

12345678910>>...22