/freebsd/contrib/wpa/src/pae/ |
H A D | ieee802_1x_kay.h | 175 bool authenticated; member
|
H A D | ieee802_1x_kay.c | 1733 kay->authenticated = true; in ieee802_1x_mka_decode_dist_sak_body() 1745 kay->authenticated = false; in ieee802_1x_mka_decode_dist_sak_body() 2407 kay->authenticated = false; in ieee802_1x_kay_decide_macsec_use() 2416 kay->authenticated = true; in ieee802_1x_kay_decide_macsec_use() 2602 kay->authenticated = false; in ieee802_1x_participant_timer() 2659 kay->authenticated = false; in ieee802_1x_participant_timer() 3478 kay->authenticated = false; in ieee802_1x_kay_init() 3978 kay->authenticated ? "Yes" : "No", in ieee802_1x_kay_get_status()
|
/freebsd/contrib/ntp/ntpdc/ |
H A D | ntpdc-opts.def | 200 state of the local server must be authenticated, which requires 263 server does not now require timestamps in authenticated requests, 534 authenticated by the server using a configured NTP key (the 548 command which would result in an authenticated request to the 578 The following commands all make authenticated requests. 674 if the peer has been correctly authenticated using either public key
|
/freebsd/crypto/heimdal/doc/ |
H A D | misc.texi | 10 you login (boring), and by using Kerberos authenticated telnet to access
|
H A D | whatis.texi | 103 considers @var{A} as properly authenticated.
|
/freebsd/sys/dev/drm2/ |
H A D | drm_ioctl.c | 213 client->auth = pt->authenticated; in drm_getclient()
|
H A D | drm_sysctl.c | 357 priv->authenticated ? 'y' : 'n',
|
/freebsd/contrib/sendmail/cf/cf/ |
H A D | submit.cf | 594 $.$?{auth_type}(authenticated$?{auth_ssf} bits=${auth_ssf}$.) 1046 # authenticated? 1145 # authenticated via TLS? 1146 R$* $: $1 $| $>RelayTLS client authenticated? 1216 R$@ $| $* $#error $@ 5.7.1 $: "550 not authenticated" 1312 # authenticated?
|
/freebsd/contrib/ntp/ntpd/ |
H A D | invoke-ntp.keys.texi | 65 any properly-authenticated message will be
|
H A D | ntp.keys.def | 70 any properly-authenticated message will be
|
H A D | invoke-ntp.conf.texi | 496 authenticated using either symmetric key or public key cryptography. 500 authenticated. 703 authenticated; if the 705 subcommand is present, the association is authenticated 708 subcommand is present, the association is authenticated 744 authenticated with that key. 1546 even if they come from an authenticated source. 1604 Deny service unless the packet is cryptographically authenticated. 1722 authenticated and the server stratum is less than or equal 2397 peer has been correctly authenticated using either public key or [all …]
|
H A D | ntp.conf.def | 540 authenticated using either symmetric key or public key cryptography. 544 authenticated. 757 authenticated; if the 759 subcommand is present, the association is authenticated 762 subcommand is present, the association is authenticated 798 authenticated with that key. 1622 even if they come from an authenticated source. 1680 Deny service unless the packet is cryptographically authenticated. 1800 authenticated and the server stratum is less than or equal 2526 peer has been correctly authenticated using either public key or [all …]
|
/freebsd/contrib/sendmail/cf/m4/ |
H A D | proto.m4 | 1882 # authenticated? 2178 # authenticated via TLS? 2179 R$* $: $1 $| $>RelayTLS client authenticated? 2374 # authenticated? 2384 # authenticated? 2451 dnl Bypass the test for users who have authenticated. 2666 R$@ $| $* $#error $@ 5.7.1 $: "550 not authenticated" 2906 dnl i.e. has the server been authenticated and is encryption active? 3215 # authenticated? 3229 R<?> $={TlsVerified} $: OK authenticated: continue [all …]
|
H A D | cfhead.m4 | 284 define(`_REC_AUTH_', `$.$?{auth_type}(authenticated')
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | HMAC.pod | 111 be authenticated (I<len> bytes at I<data>).
|
H A D | EVP_EncryptInit.pod | 974 Sets the authenticated additional data used by a TLS1 multiblock cipher operation. 1202 the number of bytes authenticated in a call specifying AAD for an AEAD cipher, if the flag 1272 To specify additional authenticated data (AAD), a call to EVP_CipherUpdate(), 1275 I<outl> is set to the number of bytes authenticated. 1348 passing additional authenticated data (see L</AEAD INTERFACE>). 1367 To specify any additional authenticated data (AAD) and/or a Nonce, a call to
|
/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_ccm_hw_s390x.inc | 46 * Process additional authenticated data. Code is big-endian.
|
H A D | cipher_aes_gcm_hw_s390x.inc | 138 * Process additional authenticated data. Returns 1 on success. Code is
|
/freebsd/contrib/libpcap/rpcapd/ |
H A D | daemon.c | 228 int authenticated = 0; // 1 if the client has successfully authenticated in daemon_serviceloop() local 506 while (!authenticated) in daemon_serviceloop() 606 authenticated = 1; in daemon_serviceloop()
|
/freebsd/crypto/openssh/ |
H A D | sshd.c | 2352 goto authenticated; 2375 authenticated: 2382 authctxt->authenticated = 1;
|
/freebsd/contrib/wpa/hostapd/ |
H A D | README | 200 an AP to authenticated stations. The Authenticator in hostapd can be 202 (shared by all authenticated stations) with wep_key_len_broadcast
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-enc.pod.in | 282 This command does not support authenticated encryption modes 295 For bulk encryption of data, whether using authenticated encryption
|
/freebsd/usr.sbin/bsdconfig/share/ |
H A D | mustberoot.subr | 262 # Prompts the user to enter a username and password to be authenticated via
|
/freebsd/sys/netinet/ |
H A D | sctp_structs.h | 1134 uint8_t authenticated; /* packet authenticated ok */ member
|
H A D | sctp_input.c | 2114 stcb->asoc.authenticated = 1; in sctp_process_cookie_new() 4452 stcb->asoc.authenticated = 1; in sctp_process_control() 4572 !stcb->asoc.authenticated) { in sctp_process_control() 5179 stcb->asoc.authenticated = 1; in sctp_process_control() 5451 stcb->asoc.authenticated = 0; in sctp_common_input_processing() 5567 !stcb->asoc.authenticated) { in sctp_common_input_processing()
|