Home
last modified time | relevance | path

Searched full:authentication (Results 1 – 25 of 1962) sorted by relevance

12345678910>>...79

/freebsd/contrib/wpa/hostapd/
H A DREADME2 Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
81 Any wired Ethernet driver for wired IEEE 802.1X authentication
104 minimal authentication mechanism for stations, whereas IEEE 802.1X
109 Access Entity, and Authentication Server. Supplicant is a component in
110 a station and it performs the authentication with the Authentication
112 between a Supplicant and an Authentication Server. In addition, it has a
[all …]
/freebsd/contrib/openpam/doc/man/
H A Dpam.323 .Nd Pluggable Authentication Modules Library
63 The Pluggable Authentication Modules (PAM) library abstracts a number
64 of common authentication-related operations and provides a framework
72 The user requesting authentication is called the applicant, while the
82 grouped into four facilities: authentication, account management,
121 .Ss Authentication
122 There are two authentication primitives:
167 Authentication information is unavailable.
169 Authentication token aging disabled.
171 Authentication token failure.
[all …]
H A Dpam_get_authtok.37 .Nd retrieve authentication token
17 authentication token or retrieves a cached authentication token,
19 Either way, a pointer to the authentication token is stored in the
30 Returns the current authentication token, or the new token
31 when changing authentication tokens.
33 Returns the previous authentication token when changing
34 authentication tokens.
93 This should only be used for non-reusable authentication
H A Dpam_chauthtok.316 function attempts to change the authentication token
29 Change only those authentication tokens that have expired.
46 Authentication token aging disabled.
48 Authentication token failure.
50 Authentication token lock busy.
52 Failed to recover old authentication token.
73 .%T "X/Open Single Sign-On Service (XSSO) - Pluggable Authentication Modules"
/freebsd/crypto/krb5/doc/rpc/
H A Ddesign.tex30 This document describes the integration of GSS-API authentication and
35 The requirements of the GSS-API authentication system for Sun RPC are:
38 \item It must provide mutual authentication between RPC clients and
57 indicating that they do not understand the authentication flavor, but
72 authentication flavor. Knowledge of standard Sun RPC programming is
77 A RPC client can select the GSS-API authentication flavor in the same
78 way it can select any other authentication flavor, by setting the
86 There are two functions that create GSS-API authentication flavor
104 auth_gssapi_create creates a GSS-API authentication structure and
160 ``GSS-API authentication error $<$msg$>$:''.
[all …]
/freebsd/lib/libpam/modules/pam_krb5/
H A Dpam-krb5.877 operations: authentication, account management, session management, and
81 authentication and session management modules so that each application
82 doesn't have to know the best way to check user authentication or create a
92 performs a Kerberos initial authentication, storing the obtained
103 After doing the initial authentication, the Kerberos PAM module will
105 verify those tickets. Unless this step is performed, the authentication
112 authentication if the obtained tickets cannot be checked, set
195 Kerberos authentication. If the network is not available, some Kerberos
200 authentication module such as \fBpam_unix\fR first with a control field of
202 password authentication was successful.
[all …]
H A Dpam_krb5.815 authentication,
26 .Ss Kerberos 5 Authentication Module
27 The Kerberos 5 authentication component
48 When prompting for the current password, the authentication
61 The following options may be passed to the authentication module:
72 authentication attempt was declined.
74 If the authentication module is not the first in the stack,
77 If this fails, the authentication
79 This option has no effect if the authentication module is
92 useful option if the authentication module is used for services such
[all …]
/freebsd/lib/libc/rpc/
H A Drpc_clnt_auth.312 .Nd library routines for client side remote procedure call authentication
29 with desired authentication.
41 The client's authentication information
50 style of authentication is discussed here.
54 A function macro that destroys the authentication
65 authentication handle that passes nonusable
66 authentication information with each remote procedure call.
67 This is the default authentication used by RPC.
69 Create and return an RPC authentication handle that contains
71 authentication information.
H A Drpc_secure.343 Authentication.
53 secure authentication system, known as
55 authentication.
64 authentication system to work.
69 used on the client side, returns an authentication handle that
70 will enable the use of the secure authentication system.
95 then the authentication system will assume
112 then the authentication system will
123 authentication routines,
169 secure authentication system
[all …]
/freebsd/crypto/heimdal/appl/telnet/telnetd/
H A Dtelnetd.892 be used for authentication.
96 .Dv AUTHENTICATION
102 Turns on authentication debugging code.
105 can provide valid authentication information
111 can provide valid authentication information
119 Only allow connections that supply some authentication information.
121 by any of the existing authentication mechanisms,
134 Authentication information is not required.
135 If no or insufficient authentication information
141 This disables the authentication code.
[all …]
/freebsd/contrib/pam-krb5/docs/
H A Dpam_krb5.pod24 operations: authentication, account management, session management, and
28 authentication and session management modules so that each application
29 doesn't have to know the best way to check user authentication or create a
42 performs a Kerberos initial authentication, storing the obtained
53 After doing the initial authentication, the Kerberos PAM module will
55 verify those tickets. Unless this step is performed, the authentication
62 authentication if the obtained tickets cannot be checked, set
150 Kerberos authentication. If the network is not available, some Kerberos
155 authentication module such as B<pam_unix> first with a control field of
157 password authentication was successful.
[all …]
/freebsd/lib/libpam/modules/pam_ssh/
H A Dpam_ssh.840 .Nd authentication and session management with SSH private keys
50 authentication service module for PAM,
53 authentication
62 .Ss SSH Authentication Module
65 authentication component
71 The following options may be passed to the authentication module:
74 If the authentication module
81 the authentication module returns failure
84 if the authentication module
95 Normally, keys with no passphrase are ignored for authentication
[all …]
/freebsd/lib/libpam/modules/pam_unix/
H A Dpam_unix.850 authentication service module for PAM,
53 authentication, account management, and password management.
63 .Ss Ux Ss Authentication Module
66 authentication component provides functions to verify the identity of
75 The following options may be passed to the authentication module:
83 If the authentication module is not the first in the stack, and a
86 If this fails, the authentication module returns failure without
88 This option has no effect if the authentication module is the first in
105 silently allow authentication to succeed.
121 silently allow authentication to succeed.
[all …]
/freebsd/contrib/ntp/sntp/tests/
H A DpacketProcessing.c189 /* Activate authentication option */ in test_TooShortExtensionFieldLength()
191 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION));
195 /* We demand authentication, but no MAC header is present. */ in test_UnauthenticatedPacketReject()
205 /* Activate authentication option */ in test_UnauthenticatedPacketReject()
207 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION));
224 /* Activate authentication option */
226 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION)); in test_AuthenticatedPacketInvalid()
257 /* Activate authentication option */ in test_AuthenticatedPacketUnknownKey()
259 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION)); in test_AuthenticatedPacketUnknownKey()
284 TEST_ASSERT_FALSE(ENABLED_OPT(AUTHENTICATION)); in test_ServerVersionTooOld()
[all...]
/freebsd/crypto/openssh/
H A Dsshd.871 key exchange, encryption, authentication, command execution,
214 authentication, and termination of each connection is logged.
254 from making DNS requests unless the authentication
256 Authentication mechanisms that may require DNS include
269 .Sh AUTHENTICATION
283 through a cryptographic message authentication code (MAC).
285 Finally, the server and the client enter an authentication dialog.
287 host-based authentication,
288 public key authentication,
289 challenge-response authentication,
[all …]
H A Dsshd_config.5187 Specifies the authentication methods that must be successfully completed
190 authentication method names, or by the single string
192 to indicate the default behaviour of accepting any single authentication
194 If the default is overridden, then successful authentication requires
199 would require the user to complete public key authentication, followed by
200 either password or keyboard interactive authentication.
203 keyboard-interactive authentication before public key.
205 For keyboard interactive authentication it is also possible to
206 restrict authentication to a specific device by appending a
214 would restrict keyboard interactive authentication to the
[all …]
H A Dssh.1120 Enables forwarding of connections from an authentication agent such as
137 Disables forwarding of the authentication agent connection.
294 authentication.
298 public key authentication is read.
344 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI
436 A comma-separated list of MAC (message authentication code) algorithms,
780 debugging connection, authentication, and configuration problems.
878 .Sh AUTHENTICATION
881 The methods available for authentication are:
882 GSSAPI-based authentication,
[all …]
/freebsd/usr.sbin/ctld/
H A Dctl.conf.5125 Sets the authentication type.
133 it is usually used to disable authentication for a given
136 A set of CHAP authentication credentials.
145 A set of mutual CHAP authentication credentials.
170 Assign a previously defined authentication group to the portal group,
178 .Qq Ar no-authentication ,
180 to permit discovery without authentication.
208 and authentication credentials.
209 The target is returned if it does not require CHAP authentication,
214 targets that require CHAP authentication will only be returned if
[all …]
/freebsd/lib/libpam/modules/pam_ksu/
H A Dpam_ksu.848 The Kerberos 5 SU authentication service module for PAM,
50 for only one PAM category: authentication.
60 .Ss Kerberos 5 SU Authentication Module
61 The Kerberos 5 SU authentication component provides functions to verify
69 for authentication and authorization will be the
87 The following options may be passed to the authentication module:
95 If the authentication module
102 the authentication module returns failure
105 if the authentication module
/freebsd/contrib/wpa/src/rsn_supp/
H A Dpreauth.c2 * RSN pre-authentication (supplicant)
120 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " in rsn_preauth_eapol_cb()
134 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " in rsn_preauth_timeout()
168 * rsn_preauth_init - Start new RSN pre-authentication
172 * Returns: 0 on success, -1 on another pre-authentication is in progress,
176 * This function request an RSN pre-authentication with a given destination
179 * pre-authentication.
192 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init()
199 "processing for pre-authentication"); in rsn_preauth_init()
211 "pre-authentication"); in rsn_preauth_init()
[all …]
/freebsd/crypto/krb5/doc/admin/
H A Dauth_indicator.rst3 Authentication indicators
9 annotations are called "authentication indicators." Service
10 principals can be configured to require particular authentication
12 authentication indicator value can be any string chosen by the KDC
15 To use authentication indicators with PKINIT or OTP, first configure
28 For example, a realm could be configured to set the authentication
35 authentication indicator value::
55 GSSAPI server applications can inspect authentication indicators
/freebsd/crypto/krb5/doc/html/_sources/admin/
H A Dauth_indicator.rst.txt3 Authentication indicators
9 annotations are called "authentication indicators." Service
10 principals can be configured to require particular authentication
12 authentication indicator value can be any string chosen by the KDC
15 To use authentication indicators with PKINIT or OTP, first configure
28 For example, a realm could be configured to set the authentication
35 authentication indicator value::
55 GSSAPI server applications can inspect authentication indicators
/freebsd/share/doc/psd/26.rpcrfc/
H A Drpc.rfc.ms164 control mechanisms can be built on top of the message authentication.
165 Several different authentication protocols can be supported. A field
167 information on specific authentication protocols can be found in the
168 \fIAuthentication Protocols\fP\,
193 Reasons why remote authentication failed.
243 Provisions for authentication of caller to service and vice-versa are
245 authentication fields, the credentials and verifier. The reply
246 message has one authentication field, the response verifier. The RPC
274 authentication fields is specified by individual, independent
275 authentication protocol specifications. (See
[all …]
/freebsd/usr.sbin/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf.538 and EAP authentication with Authentication Server using
101 EAP fast re-authentication; either 1 (default) or 0.
102 Control fast re-authentication support in EAP methods that support it.
193 (WPA using EAP authentication),
195 (IEEE 802.1x using EAP authentication and,
202 List of allowed IEEE 802.11 authentication algorithms; one or more of:
204 (Open System authentication, required for WPA/WPA2),
206 (Shared Key authentication),
268 (EAP-PEAP, with tunneled EAP authentication),
270 (EAP-TTLS, with tunneled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 authentication).
[all …]
/freebsd/share/man/man9/
H A Dcrypto_session.9110 authentication algorithm requested by
114 does not specify an authentication algorithm,
161 The authentication algorithm is specified in
173 compute an authentication digest over the request additional authentication
180 and the authentication algorithm is specified in
213 If either the cipher or authentication algorithms require an explicit
230 Authentication algorithm.
232 Length of authentication key in bytes.
233 If the authentication algorithm does not use a key,
236 Pointer to the authentication key.

12345678910>>...79