/freebsd/sys/netinet/ |
H A D | sctp_input.c | 2114 stcb->asoc.authenticated = 1; in sctp_process_cookie_new() 4452 stcb->asoc.authenticated = 1; in sctp_process_control() 4572 !stcb->asoc.authenticated) { in sctp_process_control() 5179 stcb->asoc.authenticated = 1; in sctp_process_control() 5451 stcb->asoc.authenticated = 0; in sctp_common_input_processing() 5567 !stcb->asoc.authenticated) { in sctp_common_input_processing()
|
H A D | sctp_structs.h | 1134 uint8_t authenticated; /* packet authenticated ok */ member
|
/freebsd/crypto/openssh/ |
H A D | session.c | 2703 if (!authctxt->authenticated) in do_cleanup()
|
H A D | sshd.c | 2352 goto authenticated; 2375 authenticated: 2382 authctxt->authenticated = 1;
|
H A D | ChangeLog | 710 username being authenticated.
|
H A D | PROTOCOL | 94 1.7 transport: chacha20-poly1305@openssh.com authenticated encryption 96 OpenSSH supports authenticated encryption using ChaCha20 and Poly1305
|
H A D | monitor_wrap.c | 404 int r, authenticated = 0; in mm_auth_password() local 421 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_auth_password() 433 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_auth_password() 434 return (authenticated); in mm_auth_password() 1004 int r, authenticated = 0; in mm_ssh_gssapi_userok() local 1013 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_ssh_gssapi_userok() 1017 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_ssh_gssapi_userok() 1018 return (authenticated); in mm_ssh_gssapi_userok()
|
H A D | auth2.c | 275 int r, authenticated = 0; in input_userauth_request() local 349 authenticated = m->userauth(ssh, method); in input_userauth_request() 354 userauth_finish(ssh, authenticated, method, NULL); in input_userauth_request() 373 if (authenticated) { in userauth_finish() 387 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish() 389 authenticated = 0; in userauth_finish() 397 authenticated = 0; in userauth_finish() 406 if (authenticated || partial) in userauth_finish() 413 if (options.use_pam && authenticated) { in userauth_finish() 434 if (authenticated == 1) { in userauth_finish() [all …]
|
H A D | monitor.c | 292 while (!authenticated) { in monitor_child_preauth() 303 if (authenticated && in monitor_child_preauth() 307 authenticated = 0; in monitor_child_preauth() 312 if (authenticated) { in monitor_child_preauth() 318 authenticated = 0; in monitor_child_preauth() 338 if (!partial && !authenticated) in monitor_child_preauth() 340 if (authenticated || partial) { in monitor_child_preauth() 882 int r, authenticated; in mm_answer_authpassword() local 913 return (authenticated); in mm_answer_authpassword() 1932 int r, authenticated; in mm_answer_gss_userok() local [all …]
|
/freebsd/contrib/openbsm/etc/ |
H A D | audit_event | 666 6214:AUE_kadmind_auth:authenticated kadmind request:ua
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_EncryptInit.pod | 974 Sets the authenticated additional data used by a TLS1 multiblock cipher operation. 1202 the number of bytes authenticated in a call specifying AAD for an AEAD cipher, if the flag 1272 To specify additional authenticated data (AAD), a call to EVP_CipherUpdate(), 1275 I<outl> is set to the number of bytes authenticated. 1348 passing additional authenticated data (see L</AEAD INTERFACE>). 1367 To specify any additional authenticated data (AAD) and/or a Nonce, a call to
|
H A D | EVP_chacha20.pod | 37 is 256 bits and the IV is 96 bits. This supports additional authenticated data
|
/freebsd/contrib/sendmail/src/ |
H A D | srvrsmtp.c | 1825 authenticated: 2250 goto authenticated;
|
/freebsd/contrib/sendmail/cf/m4/ |
H A D | proto.m4 | 1882 # authenticated? 2178 # authenticated via TLS? 2179 R$* $: $1 $| $>RelayTLS client authenticated? 2374 # authenticated? 2384 # authenticated? 2451 dnl Bypass the test for users who have authenticated. 2666 R$@ $| $* $#error $@ 5.7.1 $: "550 not authenticated" 2906 dnl i.e. has the server been authenticated and is encryption active? 3215 # authenticated? 3229 R<?> $={TlsVerified} $: OK authenticated: continue [all …]
|
/freebsd/contrib/sendmail/ |
H A D | README | 392 the MAIL FROM command if the client is not authenticated. Use
|
H A D | RELEASE_NOTES | 4863 Log basic information about authenticated connections at LogLevel 5400 who authenticated via a "trusted" mechanism, i.e., one that
|
/freebsd/contrib/sendmail/cf/ |
H A D | README | 1539 - authenticated sessions, 1579 sender who has authenticated is also excepted from the 1581 this FEATURE() will not be applied to authenticated senders 2860 ruleset; they will be skipped if a sender has been authenticated using 3080 successfully authenticated themselves. If the verification of the cert 3300 authenticated themselves. A very simple example is: 3306 which checks whether a user has successfully authenticated using 3314 to allow relaying for users that authenticated using DIGEST-MD5 3323 parameter if it is identical to the authenticated user. 3325 Per default, relaying is allowed for any user who authenticated [all …]
|
/freebsd/contrib/sendmail/cf/cf/ |
H A D | submit.cf | 594 $.$?{auth_type}(authenticated$?{auth_ssf} bits=${auth_ssf}$.) 1046 # authenticated? 1145 # authenticated via TLS? 1146 R$* $: $1 $| $>RelayTLS client authenticated? 1216 R$@ $| $* $#error $@ 5.7.1 $: "550 not authenticated" 1312 # authenticated?
|
/freebsd/contrib/telnet/libtelnet/ |
H A D | auth.c | 96 static Authenticator *authenticated = 0; variable 202 authenticated = 0; in auth_init() 541 if (!(authenticated = ap)) in auth_finished() 542 authenticated = &NoAuth; in auth_finished() 564 while (!authenticated) in auth_wait() 573 if (!authenticated || authenticated == &NoAuth) in auth_wait() 579 if (authenticated->status) in auth_wait() 580 validuser = (*authenticated->status)(authenticated, in auth_wait()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | migration_guide.pod | 272 is both authenticated and encrypted using AES GCM mode.
|
/freebsd/sys/dev/drm2/ |
H A D | drm_fops.c | 198 priv->authenticated = DRM_SUSER(p); in drm_open_helper() 236 priv->authenticated = 1; in drm_open_helper() 405 temp->authenticated = 0; in drm_release()
|
H A D | drm_sysctl.c | 357 priv->authenticated ? 'y' : 'n',
|
H A D | drm_vm.c | 66 if (file_priv && !file_priv->authenticated) in drm_mmap()
|
H A D | drm_ioctl.c | 213 client->auth = pt->authenticated; in drm_getclient()
|
/freebsd/usr.sbin/bsdconfig/share/ |
H A D | mustberoot.subr | 262 # Prompts the user to enter a username and password to be authenticated via
|