Home
last modified time | relevance | path

Searched full:authentication (Results 1 – 25 of 1874) sorted by relevance

12345678910>>...75

/freebsd/contrib/wpa/hostapd/
H A DREADME2 Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
81 Any wired Ethernet driver for wired IEEE 802.1X authentication
104 minimal authentication mechanism for stations, whereas IEEE 802.1X
109 Access Entity, and Authentication Server. Supplicant is a component in
110 a station and it performs the authentication with the Authentication
112 between a Supplicant and an Authentication Server. In addition, it has a
[all …]
/freebsd/contrib/openpam/doc/man/
H A Dpam.323 .Nd Pluggable Authentication Modules Library
63 The Pluggable Authentication Modules (PAM) library abstracts a number
64 of common authentication-related operations and provides a framework
72 The user requesting authentication is called the applicant, while the
82 grouped into four facilities: authentication, account management,
121 .Ss Authentication
122 There are two authentication primitives:
167 Authentication information is unavailable.
169 Authentication token aging disabled.
171 Authentication token failure.
[all …]
H A Dpam_get_authtok.37 .Nd retrieve authentication token
17 authentication token or retrieves a cached authentication token,
19 Either way, a pointer to the authentication token is stored in the
30 Returns the current authentication token, or the new token
31 when changing authentication tokens.
33 Returns the previous authentication token when changing
34 authentication tokens.
93 This should only be used for non-reusable authentication
H A Dpam_chauthtok.316 function attempts to change the authentication token
29 Change only those authentication tokens that have expired.
46 Authentication token aging disabled.
48 Authentication token failure.
50 Authentication token lock busy.
52 Failed to recover old authentication token.
73 .%T "X/Open Single Sign-On Service (XSSO) - Pluggable Authentication Modules"
/freebsd/lib/libc/rpc/
H A Drpc_clnt_auth.312 .Nd library routines for client side remote procedure call authentication
29 with desired authentication.
41 The client's authentication information
50 style of authentication is discussed here.
54 A function macro that destroys the authentication
65 authentication handle that passes nonusable
66 authentication information with each remote procedure call.
67 This is the default authentication used by RPC.
69 Create and return an RPC authentication handle that contains
71 authentication information.
/freebsd/lib/libpam/modules/pam_krb5/
H A Dpam-krb5.877 operations: authentication, account management, session management, and
81 authentication and session management modules so that each application
82 doesn't have to know the best way to check user authentication or create a
92 performs a Kerberos initial authentication, storing the obtained
103 After doing the initial authentication, the Kerberos PAM module will
105 verify those tickets. Unless this step is performed, the authentication
112 authentication if the obtained tickets cannot be checked, set
195 Kerberos authentication. If the network is not available, some Kerberos
200 authentication module such as \fBpam_unix\fR first with a control field of
202 password authentication was successful.
[all …]
H A Dpam_krb5.815 authentication,
26 .Ss Kerberos 5 Authentication Module
27 The Kerberos 5 authentication component
48 When prompting for the current password, the authentication
61 The following options may be passed to the authentication module:
72 authentication attempt was declined.
74 If the authentication module is not the first in the stack,
77 If this fails, the authentication
79 This option has no effect if the authentication module is
92 useful option if the authentication module is used for services such
[all …]
/freebsd/crypto/heimdal/appl/telnet/telnetd/
H A Dtelnetd.892 be used for authentication.
96 .Dv AUTHENTICATION
102 Turns on authentication debugging code.
105 can provide valid authentication information
111 can provide valid authentication information
119 Only allow connections that supply some authentication information.
121 by any of the existing authentication mechanisms,
134 Authentication information is not required.
135 If no or insufficient authentication information
141 This disables the authentication code.
[all …]
/freebsd/contrib/pam-krb5/docs/
H A Dpam_krb5.pod24 operations: authentication, account management, session management, and
28 authentication and session management modules so that each application
29 doesn't have to know the best way to check user authentication or create a
42 performs a Kerberos initial authentication, storing the obtained
53 After doing the initial authentication, the Kerberos PAM module will
55 verify those tickets. Unless this step is performed, the authentication
62 authentication if the obtained tickets cannot be checked, set
150 Kerberos authentication. If the network is not available, some Kerberos
155 authentication module such as B<pam_unix> first with a control field of
157 password authentication was successful.
[all …]
/freebsd/usr.sbin/ctld/
H A Dctl.conf.5152 Sets the authentication type.
160 it is usually used to disable authentication for a given
163 A set of CHAP authentication credentials.
172 A set of mutual CHAP authentication credentials.
210 Assign a previously defined authentication group to the portal group,
218 .Qq Ar no-authentication ,
220 to permit discovery without authentication.
248 and authentication credentials.
249 The target is returned if it does not require CHAP authentication,
254 targets that require CHAP authentication will only be returned if
[all …]
/freebsd/lib/libpam/modules/pam_ssh/
H A Dpam_ssh.840 .Nd authentication and session management with SSH private keys
50 authentication service module for PAM,
53 authentication
62 .Ss SSH Authentication Module
65 authentication component
71 The following options may be passed to the authentication module:
74 If the authentication module
81 the authentication module returns failure
84 if the authentication module
95 Normally, keys with no passphrase are ignored for authentication
[all …]
/freebsd/lib/libpam/modules/pam_unix/
H A Dpam_unix.850 authentication service module for PAM,
53 authentication, account management, and password management.
63 .Ss Ux Ss Authentication Module
66 authentication component provides functions to verify the identity of
75 The following options may be passed to the authentication module:
83 If the authentication module is not the first in the stack, and a
86 If this fails, the authentication module returns failure without
88 This option has no effect if the authentication module is the first in
105 silently allow authentication to succeed.
121 silently allow authentication to succeed.
[all …]
/freebsd/contrib/ntp/sntp/tests/
H A DpacketProcessing.c189 /* Activate authentication option */ in test_TooShortExtensionFieldLength()
191 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION));
195 /* We demand authentication, but no MAC header is present. */ in test_UnauthenticatedPacketReject()
205 /* Activate authentication option */ in test_UnauthenticatedPacketReject()
207 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION));
224 /* Activate authentication option */
226 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION)); in test_AuthenticatedPacketInvalid()
257 /* Activate authentication option */ in test_AuthenticatedPacketUnknownKey()
259 TEST_ASSERT_TRUE(ENABLED_OPT(AUTHENTICATION)); in test_AuthenticatedPacketUnknownKey()
284 TEST_ASSERT_FALSE(ENABLED_OPT(AUTHENTICATION)); in test_ServerVersionTooOld()
[all...]
/freebsd/crypto/openssh/
H A Dsshd.871 key exchange, encryption, authentication, command execution,
214 authentication, and termination of each connection is logged.
254 from making DNS requests unless the authentication
256 Authentication mechanisms that may require DNS include
269 .Sh AUTHENTICATION
283 through a cryptographic message authentication code (MAC).
285 Finally, the server and the client enter an authentication dialog.
287 host-based authentication,
288 public key authentication,
289 challenge-response authentication,
[all …]
H A Dsshd_config.5187 Specifies the authentication methods that must be successfully completed
190 authentication method names, or by the single string
192 to indicate the default behaviour of accepting any single authentication
194 If the default is overridden, then successful authentication requires
199 would require the user to complete public key authentication, followed by
200 either password or keyboard interactive authentication.
203 keyboard-interactive authentication before public key.
205 For keyboard interactive authentication it is also possible to
206 restrict authentication to a specific device by appending a
214 would restrict keyboard interactive authentication to the
[all …]
H A Dsshd_config32 # Authentication:
59 # Change to "yes" to enable built-in password authentication.
64 # Change to "no" to disable keyboard-interactive authentication. Depending on
67 # Keyboard interactive authentication is also used for PAM authentication.
80 # Set this to 'no' to disable PAM authentication, account processing,
81 # and session processing. If this is enabled, PAM authentication will
84 # PAM authentication via KbdInteractiveAuthentication may bypass
87 # PAM authentication, then enable this but set PasswordAuthentication
H A Dssh.1120 Enables forwarding of connections from an authentication agent such as
137 Disables forwarding of the authentication agent connection.
294 authentication.
298 public key authentication is read.
344 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI
436 A comma-separated list of MAC (message authentication code) algorithms,
790 debugging connection, authentication, and configuration problems.
888 .Sh AUTHENTICATION
891 The methods available for authentication are:
892 GSSAPI-based authentication,
[all …]
H A DOVERVIEW76 implement X11 forwarding, TCP/IP forwarding, and authentication
80 Authentication agent
82 - Code to communicate with the authentication agent is in authfd.c.
84 Authentication methods
86 - Code for various authentication methods resides in auth-*.c
93 - In the client end, authentication code is in sshconnect.c. It
96 authentication agent using authfd.c.
103 proxy), and performs authentication (ssh_login in sshconnect.c).
139 negotiate encryption, then perform authentication, preparatory
149 - authentication
/freebsd/lib/libpam/modules/pam_ksu/
H A Dpam_ksu.848 The Kerberos 5 SU authentication service module for PAM,
50 for only one PAM category: authentication.
60 .Ss Kerberos 5 SU Authentication Module
61 The Kerberos 5 SU authentication component provides functions to verify
69 for authentication and authorization will be the
87 The following options may be passed to the authentication module:
95 If the authentication module
102 the authentication module returns failure
105 if the authentication module
/freebsd/contrib/wpa/src/rsn_supp/
H A Dpreauth.c2 * RSN pre-authentication (supplicant)
120 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " in rsn_preauth_eapol_cb()
134 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " in rsn_preauth_timeout()
168 * rsn_preauth_init - Start new RSN pre-authentication
172 * Returns: 0 on success, -1 on another pre-authentication is in progress,
176 * This function request an RSN pre-authentication with a given destination
179 * pre-authentication.
192 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init()
199 "processing for pre-authentication"); in rsn_preauth_init()
211 "pre-authentication"); in rsn_preauth_init()
[all …]
/freebsd/share/doc/psd/26.rpcrfc/
H A Drpc.rfc.ms164 control mechanisms can be built on top of the message authentication.
165 Several different authentication protocols can be supported. A field
167 information on specific authentication protocols can be found in the
168 \fIAuthentication Protocols\fP\,
193 Reasons why remote authentication failed.
243 Provisions for authentication of caller to service and vice-versa are
245 authentication fields, the credentials and verifier. The reply
246 message has one authentication field, the response verifier. The RPC
274 authentication fields is specified by individual, independent
275 authentication protocol specifications. (See
[all …]
/freebsd/usr.sbin/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf.538 and EAP authentication with Authentication Server using
101 EAP fast re-authentication; either 1 (default) or 0.
102 Control fast re-authentication support in EAP methods that support it.
193 (WPA using EAP authentication),
195 (IEEE 802.1x using EAP authentication and,
202 List of allowed IEEE 802.11 authentication algorithms; one or more of:
204 (Open System authentication, required for WPA/WPA2),
206 (Shared Key authentication),
268 (EAP-PEAP, with tunneled EAP authentication),
270 (EAP-TTLS, with tunneled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 authentication).
[all …]
/freebsd/share/man/man9/
H A Dcrypto_session.9110 authentication algorithm requested by
114 does not specify an authentication algorithm,
161 The authentication algorithm is specified in
173 compute an authentication digest over the request additional authentication
180 and the authentication algorithm is specified in
213 If either the cipher or authentication algorithms require an explicit
230 Authentication algorithm.
232 Length of authentication key in bytes.
233 If the authentication algorithm does not use a key,
236 Pointer to the authentication key.
/freebsd/contrib/pam-krb5/
H A DNEWS26 ensure the stored principal in the authentication context is always
196 Add an anon_fast option that attempts anonymous authentication
200 authentication will be used as a fallback if the specified FAST ticket
213 process, which may be desirable if authentication mechanisms other
235 Fix alt_auth_map support to preserve the realm of the authentication
236 identity when forming the alternate authentication principal, matching
241 realm of the authentication identity. Note that this can be used as a
242 simple way to attempt authentication in an alternate realm first and
244 authentication in multiple realms should instead run the module
260 Retry authentication under try_first_pass on several other errors in
[all …]
/freebsd/lib/libpam/modules/pam_self/
H A Dpam_self.848 The Self authentication service module for PAM,
51 authentication.
57 .Ss Self Authentication Module
58 The Self authentication component
62 If the current real user ID is zero, authentication will fail,
67 The following options may be passed to the authentication module:
76 These messages include reasons why the user's authentication attempt

12345678910>>...75