Home
last modified time | relevance | path

Searched refs:authenticated (Results 26 – 50 of 78) sorted by relevance

1234

/freebsd/contrib/wpa/src/pae/
H A Dieee802_1x_kay.h175 bool authenticated; member
H A Dieee802_1x_kay.c1733 kay->authenticated = true; in ieee802_1x_mka_decode_dist_sak_body()
1745 kay->authenticated = false; in ieee802_1x_mka_decode_dist_sak_body()
2407 kay->authenticated = false; in ieee802_1x_kay_decide_macsec_use()
2416 kay->authenticated = true; in ieee802_1x_kay_decide_macsec_use()
2602 kay->authenticated = false; in ieee802_1x_participant_timer()
2659 kay->authenticated = false; in ieee802_1x_participant_timer()
3478 kay->authenticated = false; in ieee802_1x_kay_init()
3978 kay->authenticated ? "Yes" : "No", in ieee802_1x_kay_get_status()
/freebsd/contrib/ntp/ntpdc/
H A Dntpdc-opts.def200 state of the local server must be authenticated, which requires
263 server does not now require timestamps in authenticated requests,
534 authenticated by the server using a configured NTP key (the
548 command which would result in an authenticated request to the
578 The following commands all make authenticated requests.
674 if the peer has been correctly authenticated using either public key
/freebsd/crypto/heimdal/doc/
H A Dmisc.texi10 you login (boring), and by using Kerberos authenticated telnet to access
H A Dwhatis.texi103 considers @var{A} as properly authenticated.
/freebsd/sys/dev/drm2/
H A Ddrm_ioctl.c213 client->auth = pt->authenticated; in drm_getclient()
H A Ddrm_sysctl.c357 priv->authenticated ? 'y' : 'n',
/freebsd/contrib/sendmail/cf/cf/
H A Dsubmit.cf594 $.$?{auth_type}(authenticated$?{auth_ssf} bits=${auth_ssf}$.)
1046 # authenticated?
1145 # authenticated via TLS?
1146 R$* $: $1 $| $>RelayTLS client authenticated?
1216 R$@ $| $* $#error $@ 5.7.1 $: "550 not authenticated"
1312 # authenticated?
/freebsd/contrib/ntp/ntpd/
H A Dinvoke-ntp.keys.texi65 any properly-authenticated message will be
H A Dntp.keys.def70 any properly-authenticated message will be
H A Dinvoke-ntp.conf.texi496 authenticated using either symmetric key or public key cryptography.
500 authenticated.
703 authenticated; if the
705 subcommand is present, the association is authenticated
708 subcommand is present, the association is authenticated
744 authenticated with that key.
1546 even if they come from an authenticated source.
1604 Deny service unless the packet is cryptographically authenticated.
1722 authenticated and the server stratum is less than or equal
2397 peer has been correctly authenticated using either public key or
[all …]
H A Dntp.conf.def540 authenticated using either symmetric key or public key cryptography.
544 authenticated.
757 authenticated; if the
759 subcommand is present, the association is authenticated
762 subcommand is present, the association is authenticated
798 authenticated with that key.
1622 even if they come from an authenticated source.
1680 Deny service unless the packet is cryptographically authenticated.
1800 authenticated and the server stratum is less than or equal
2526 peer has been correctly authenticated using either public key or
[all …]
/freebsd/contrib/sendmail/cf/m4/
H A Dproto.m41882 # authenticated?
2178 # authenticated via TLS?
2179 R$* $: $1 $| $>RelayTLS client authenticated?
2374 # authenticated?
2384 # authenticated?
2451 dnl Bypass the test for users who have authenticated.
2666 R$@ $| $* $#error $@ 5.7.1 $: "550 not authenticated"
2906 dnl i.e. has the server been authenticated and is encryption active?
3215 # authenticated?
3229 R<?> $={TlsVerified} $: OK authenticated: continue
[all …]
H A Dcfhead.m4284 define(`_REC_AUTH_', `$.$?{auth_type}(authenticated')
/freebsd/crypto/openssl/doc/man3/
H A DHMAC.pod111 be authenticated (I<len> bytes at I<data>).
H A DEVP_EncryptInit.pod974 Sets the authenticated additional data used by a TLS1 multiblock cipher operation.
1202 the number of bytes authenticated in a call specifying AAD for an AEAD cipher, if the flag
1272 To specify additional authenticated data (AAD), a call to EVP_CipherUpdate(),
1275 I<outl> is set to the number of bytes authenticated.
1348 passing additional authenticated data (see L</AEAD INTERFACE>).
1367 To specify any additional authenticated data (AAD) and/or a Nonce, a call to
/freebsd/crypto/openssl/providers/implementations/ciphers/
H A Dcipher_aes_ccm_hw_s390x.inc46 * Process additional authenticated data. Code is big-endian.
H A Dcipher_aes_gcm_hw_s390x.inc138 * Process additional authenticated data. Returns 1 on success. Code is
/freebsd/contrib/libpcap/rpcapd/
H A Ddaemon.c228 int authenticated = 0; // 1 if the client has successfully authenticated in daemon_serviceloop() local
506 while (!authenticated) in daemon_serviceloop()
606 authenticated = 1; in daemon_serviceloop()
/freebsd/crypto/openssh/
H A Dsshd.c2352 goto authenticated;
2375 authenticated:
2382 authctxt->authenticated = 1;
/freebsd/contrib/wpa/hostapd/
H A DREADME200 an AP to authenticated stations. The Authenticator in hostapd can be
202 (shared by all authenticated stations) with wep_key_len_broadcast
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-enc.pod.in282 This command does not support authenticated encryption modes
295 For bulk encryption of data, whether using authenticated encryption
/freebsd/usr.sbin/bsdconfig/share/
H A Dmustberoot.subr262 # Prompts the user to enter a username and password to be authenticated via
/freebsd/sys/netinet/
H A Dsctp_structs.h1134 uint8_t authenticated; /* packet authenticated ok */ member
H A Dsctp_input.c2114 stcb->asoc.authenticated = 1; in sctp_process_cookie_new()
4452 stcb->asoc.authenticated = 1; in sctp_process_control()
4572 !stcb->asoc.authenticated) { in sctp_process_control()
5179 stcb->asoc.authenticated = 1; in sctp_process_control()
5451 stcb->asoc.authenticated = 0; in sctp_common_input_processing()
5567 !stcb->asoc.authenticated) { in sctp_common_input_processing()

1234