Home
last modified time | relevance | path

Searched refs:anonymous (Results 1 – 25 of 110) sorted by relevance

12345

/src/sys/contrib/device-tree/src/powerpc/
H A Da3m071.dts19 model = "anonymous,a3m071";
20 compatible = "anonymous,a3m071";
128 compatible = "anonymous,a3m071-fpga";
H A Da4m072.dts20 model = "anonymous,a4m072";
21 compatible = "anonymous,a4m072";
/src/contrib/netbsd-tests/ipf/expected/
H A Dp217 # 'anonymous' table refs 2
20 # 'anonymous' table refs 2
/src/contrib/wpa/hostapd/
H A Dhostapd.eap_user13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous
15 # is transmitted only within the encrypted tunnel in phase 2. If non-anonymous
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
70 "not anonymous" PEAP
89 "not anonymous" MSCHAPV2 "password" [2]
/src/crypto/krb5/src/lib/krb5/krb/
H A Dchk_trans.c315 const krb5_data *anonymous; in krb5_check_transited_list() local
328 anonymous = krb5_anonymous_realm(); in krb5_check_transited_list()
329 if (crealm->length == anonymous->length && in krb5_check_transited_list()
330 (memcmp(crealm->data, anonymous->data, anonymous->length) == 0)) in krb5_check_transited_list()
H A Dgic_opt.c87 int anonymous) in krb5_get_init_creds_opt_set_anonymous() argument
89 if (anonymous) in krb5_get_init_creds_opt_set_anonymous()
/src/crypto/heimdal/lib/krb5/
H A Dinit_creds.c274 int anonymous) in krb5_get_init_creds_opt_set_anonymous() argument
277 opt->anonymous = anonymous; in krb5_get_init_creds_opt_set_anonymous()
/src/contrib/lib9p/pytest/
H A Dtestconf.ini.sample15 uname = anonymous
/src/contrib/pam-krb5/tests/data/scripts/fast/
H A Danonymous1 # Test anonymous FAST. -*- conf -*-
H A Danonymous-debug18 DEBUG (user %u) anonymous authentication for FAST succeeded
/src/contrib/tzdata/
H A DSECURITY15 anonymous.
/src/contrib/tzcode/
H A DSECURITY15 anonymous.
/src/crypto/krb5/src/clients/kinit/
H A Dkinit.c93 int anonymous; member
275 opts->anonymous = 1; in parse_options()
466 } else if (opts->anonymous) { in k5_begin()
672 if (opts->anonymous) in k5_kinit()
/src/usr.sbin/bsdconfig/include/
H A Doptions.hlp67 FTP username: Specify username and password instead of anonymous.
70 anonymous user. If you wish to log in as someone else,
/src/lib/libc/db/
H A DREADME8 anonymous ftp from ftp.cs.berkeley.edu. An archive in compressed format
/src/crypto/krb5/src/plugins/kdb/db2/libdb2/
H A DREADME.db210 anonymous ftp from ftp.cs.berkeley.edu:ucb/4bsd/db.tar.{Z,gz} and from
/src/contrib/file/
H A DMAINT11 of the file command for anonymous FTP, and people all over the
/src/contrib/sendmail/contrib/
H A Detrn.054 directory of the sendmail distribution through anonymous ftp
/src/crypto/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in177 this includes all RC4 and anonymous ciphers. Note that this rule does
219 The cipher suites offering no authentication. This is currently the anonymous
220 DH algorithms and anonymous ECDH algorithms. These cipher suites are vulnerable
241 Cipher suites using ephemeral DH key agreement, including anonymous cipher
250 Anonymous DH cipher suites, note that this does not include anonymous Elliptic
255 Cipher suites using ephemeral ECDH key agreement, including anonymous
767 Include all ciphers except NULL and anonymous DH then sort by
/src/contrib/wpa/wpa_supplicant/doc/docbook/
H A Dwpa_supplicant.conf.sgml102 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
115 anonymous_identity="anonymous@example.com"
/src/crypto/openssl/doc/man3/
H A DSSL_get_peer_certificate.pod32 L<SSL_CTX_set_verify(3)>). If an anonymous cipher
H A DSSL_CTX_add1_chain_cert.pod92 If the negotiated cipher suite is anonymous (and thus no certificate will
135 no server certificate is used because the cipher suites is anonymous and 0
H A DSSL_get_peer_signature_nid.pod49 signature (e.g. it uses RSA key exchange or is anonymous), the TLS version is
/src/contrib/ntp/
H A DWHERE-TO-START15 This distribution is normally available by anonymous ftp as the
/src/contrib/pam-krb5/docs/
H A Dpam_krb5.pod355 first authenticating as the anonymous user (WELLKNOWN/ANONYMOUS) and using
356 its credentials as the FAST armor. This requires anonymous PKINIT be
358 system, and that the Kerberos library support FAST and anonymous PKINIT.
363 weaker user passwords. This option uses anonymous authentication to
366 If anonymous PKINIT is not available or fails, FAST will not be used and
373 anonymous PKINIT if that cache could not be used.
381 anonymous authentication is done.
386 rather than anonymous PKINIT. This allows use of FAST with a realm that
387 doesn't support PKINIT or doesn't support anonymous authentication.
403 To use anonymous PKINIT to protect the FAST exchange, use the I<anon_fast>
[all …]

12345