| /freebsd/contrib/bearssl/inc/ |
| H A D | bearssl_aead.h | 40 * # Authenticated Encryption with Additional Data 60 * - Additional authenticated data, which is covered by the MAC but 65 * authenticated data and the nonce are sent to the receiver; the 92 * Inject some additional authenticated data. Additional data may 98 * authenticated data, and before beginning to encrypt the plaintext 125 * - The additional authenticated data must be processed first, 128 * - Nonce, plaintext and additional authenticated data all consist 153 * Pointer to the additional authenticated data injection function. 210 * \brief Inject additional authenticated data. 218 * \param data pointer to additional authenticated data. [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | auth2.c | 274 int r, authenticated = 0; in input_userauth_request() 346 authenticated = m->userauth(ssh, method); in input_userauth_request() 348 if (!authctxt->authenticated && strcmp(method, "none") != 0) in input_userauth_request() 351 userauth_finish(ssh, authenticated, method, NULL); in input_userauth_request() 361 userauth_finish(struct ssh *ssh, int authenticated, const char *packet_method, 370 if (authenticated) { in userauth_finish() 372 fatal("INTERNAL ERROR: authenticated invalid user %s", in userauth_finish() 376 fatal("INTERNAL ERROR: authenticated and postponed"); in userauth_finish() 384 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish() 386 authenticated in userauth_finish() 275 int r, authenticated = 0; input_userauth_request() local 362 userauth_finish(struct ssh * ssh,int authenticated,const char * packet_method,const char * submethod) userauth_finish() argument 721 auth2_record_key(Authctxt * authctxt,int authenticated,const struct sshkey * key) auth2_record_key() argument [all...] |
| H A D | auth2-hostbased.c | 68 int r, pktype, authenticated = 0; in userauth_hostbased() local 148 authenticated = 0; in userauth_hostbased() 153 authenticated = 1; in userauth_hostbased() 155 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased() 158 debug2_f("authenticated %d", authenticated); in userauth_hostbased() 165 return authenticated; in userauth_hostbased()
|
| H A D | monitor.c | 277 int authenticated = 0, partial = 0; in monitor_child_preauth() local 300 while (!authenticated) { in monitor_child_preauth() 306 authenticated = (monitor_read(ssh, pmonitor, in monitor_child_preauth() 315 if (authenticated && in monitor_child_preauth() 319 authenticated = 0; in monitor_child_preauth() 324 if (authenticated) { in monitor_child_preauth() 330 authenticated = 0; in monitor_child_preauth() 333 if (options.use_pam && authenticated) { in monitor_child_preauth() 341 authenticated = mm_answer_pam_account( in monitor_child_preauth() 348 auth_log(ssh, authenticated, partial, in monitor_child_preauth() [all …]
|
| H A D | auth2-gss.c | 257 int r, authenticated; in input_gssapi_exchange_complete() local 270 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_exchange_complete() 277 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete() 286 int r, authenticated = 0; in input_gssapi_mic() local 311 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_mic() 323 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
|
| H A D | auth2-kbdint.c | 50 int r, authenticated = 0; in userauth_kbdint() local 61 authenticated = auth2_challenge(ssh, devs); in userauth_kbdint() 65 return authenticated; in userauth_kbdint()
|
| H A D | auth2-passwd.c | 56 int authenticated = 0, r; in userauth_passwd() local 71 authenticated = 1; in userauth_passwd() 73 return authenticated; in userauth_passwd()
|
| H A D | auth2-pubkey.c | 104 int req_presence = 0, req_verify = 0, authenticated = 0; in userauth_pubkey() local 227 authenticated = 0; in userauth_pubkey() 233 authenticated = 1; in userauth_pubkey() 235 if (authenticated == 1 && sig_details != NULL) { in userauth_pubkey() 252 authenticated = 0; in userauth_pubkey() 266 authenticated = 0; in userauth_pubkey() 270 auth2_record_key(authctxt, authenticated, key); in userauth_pubkey() 302 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) { in userauth_pubkey() 304 authenticated = 0; in userauth_pubkey() 306 debug2_f("authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey() [all …]
|
| H A D | PROTOCOL.chacha20poly1305 | 1 This document describes the chacha20-poly1305@openssh.com authenticated 17 authenticated encryption mode. The construction used is based on that 43 (Authenticated Encryption with Associated Data) that is used to encrypt
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/ |
| H A D | AArch64PointerAuth.h | 18 /// Variants of check performed on an authenticated pointer. 50 /// Check by comparing bits 62 and 61 of the authenticated address. 59 /// Check by comparing the authenticated value with an XPAC-ed one without 78 "Do not check authenticated address"), \ 80 "Perform dummy load from authenticated address"), \ 97 /// Some of the methods may need to know if the pointer was authenticated
|
| /freebsd/crypto/heimdal/lib/gssapi/mech/ |
| H A D | gss_get_name_attribute.c | 39 int *authenticated, in gss_get_name_attribute() argument 50 if (authenticated != NULL) in gss_get_name_attribute() 51 *authenticated = 0; in gss_get_name_attribute() 69 authenticated, in gss_get_name_attribute()
|
| H A D | gss_authorize_localname.c | 85 int authenticated = 0, complete = 0; in attr_authorize_localname() local 90 &authenticated, in attr_authorize_localname() 101 if (authenticated && in attr_authorize_localname()
|
| /freebsd/crypto/krb5/src/lib/gssapi/mechglue/ |
| H A D | g_get_name_attr.c | 34 int *authenticated, in gss_get_name_attribute() argument 46 if (authenticated != NULL) in gss_get_name_attribute() 47 *authenticated = 0; in gss_get_name_attribute() 84 authenticated, in gss_get_name_attribute()
|
| /freebsd/crypto/krb5/src/clients/ksu/ |
| H A D | t_ksu.py | 196 expected_msg='Authenticated ksutest@KRBTEST.COM') 220 expected_msg='Authenticated ksutest@KRBTEST.COM') 222 expected_msg='Authenticated ksutest@KRBTEST.COM') 225 expected_msg='Authenticated %s@KRBTEST.COM' % caller_username) 233 expected_msg='Authenticated alice@KRBTEST.COM') 235 expected_msg='Authenticated ksutest@KRBTEST.COM') 237 expected_msg='Authenticated %s@KRBTEST.COM' % caller_username) 241 expected_msg='Authenticated ksutest/root@KRBTEST.COM')
|
| /freebsd/contrib/telnet/libtelnet/ |
| H A D | auth.c | 96 static Authenticator *authenticated = 0; variable 202 authenticated = 0; in auth_init() 541 if (!(authenticated = ap)) in auth_finished() 542 authenticated = &NoAuth; in auth_finished() 564 while (!authenticated) in auth_wait() 573 if (!authenticated || authenticated == &NoAuth) in auth_wait() 579 if (authenticated->status) in auth_wait() 580 validuser = (*authenticated->status)(authenticated, in auth_wait()
|
| /freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
| H A D | auth.c | 98 static Authenticator *authenticated = 0; variable 196 authenticated = 0; in auth_init() 544 if (!(authenticated = ap)) in auth_finished() 545 authenticated = &NoAuth; in auth_finished() 567 while (!authenticated) in auth_wait() 576 if (!authenticated || authenticated == &NoAuth) in auth_wait() 582 if (authenticated->status) in auth_wait() 583 validuser = (*authenticated->status)(authenticated, in auth_wait()
|
| /freebsd/contrib/ntp/sntp/ |
| H A D | networking.c | 125 * is present and the packet is not authenticated. If 1, the in process_pkt() 126 * packet is a crypto-NAK; if 3, the packet is authenticated in process_pkt() 127 * with DES; if 5, the packet is authenticated with MD5; if 6, in process_pkt() 128 * the packet is authenticated with SHA. If 2 or 4, the packet in process_pkt() 199 TRACE(1, ("sntp %s: packet from %s authenticated using key id %d.\n", in process_pkt()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | CMS_add0_cert.pod | 30 I<cms> must be of type signed data or (authenticated) enveloped data. 38 I<cms> must be of type signed data or (authenticated) enveloped data. 49 data or authenticated enveloped data or an error will be returned.
|
| /freebsd/contrib/pam-krb5/tests/data/scripts/expired/ |
| H A D | defer-mit | 30 INFO user %u authenticated as %0 (expired) 33 INFO user %u authenticated as %0
|
| H A D | defer-mit-debug | 35 INFO user %u authenticated as %0 (expired) 47 INFO user %u authenticated as %0
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | CMS_add0_cert.3 | 89 \&\fIcms\fR must be of type signed data or (authenticated) enveloped data. 97 \&\fIcms\fR must be of type signed data or (authenticated) enveloped data. 107 data or authenticated enveloped data or an error will be returned.
|
| /freebsd/lib/libpam/modules/pam_unix/ |
| H A D | pam_unix.8 | 104 authenticated, then this option will forgo password prompting, and 119 authenticated, but the password matches an empty string, 142 The function verifies that the authenticated user is allowed to log
|
| /freebsd/contrib/wpa/src/pae/ |
| H A D | ieee802_1x_cp.c | 26 enum connect_type { PENDING, UNAUTHENTICATED, AUTHENTICATED, SECURE }; enumerator 185 SM_STATE(CP, AUTHENTICATED) in SM_STATE() argument 187 SM_ENTRY(CP, AUTHENTICATED); in SM_STATE() 372 else if (sm->connect == AUTHENTICATED) in SM_STEP() 373 SM_ENTER(CP, AUTHENTICATED); in SM_STEP() 384 if (sm->connect != AUTHENTICATED) in SM_STEP() 576 sm->connect = AUTHENTICATED; in ieee802_1x_cp_connect_authenticated()
|
| /freebsd/contrib/pam-krb5/tests/module/ |
| H A D | fast-t.c | 2 * Tests for authenticated FAST support in pam-krb5. 6 * protecting it against various attacks. This tests authenticated FAST;
|
| /freebsd/contrib/ntp/html/ |
| H A D | accopt.html | 79 authenticated source. A value of -1 means "unlimited", which is the 128 even if authenticated.</dd> 139 authenticated. This includes broadcast, symmetric-active and 156 <dd>Deny packets that are not cryptographically authenticated. Note 163 authenticated. If <tt>auth</tt> is disabled, but
|