HomeSort by: relevance | last modified time | path
    Searched defs:authenticated (Results 1 - 25 of 26) sorted by relevancy

1 2

  /src/crypto/external/bsd/openssh/dist/
auth2-kbdint.c 52 int r, authenticated = 0; local
63 authenticated = auth2_challenge(ssh, devs);
67 return authenticated;
auth2-passwd.c 58 int authenticated = 0, r; local
73 authenticated = 1;
75 return authenticated;
auth2-krb5.c 58 int authenticated = 0, r; local
67 authenticated = 1;
74 return (authenticated);
auth2-gss.c 261 int r, authenticated; local
274 authenticated = mm_ssh_gssapi_userok(authctxt->user);
281 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL);
290 int r, authenticated = 0; local
315 authenticated = mm_ssh_gssapi_userok(authctxt->user);
327 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL);
auth2-hostbased.c 70 int r, pktype, authenticated = 0; local
151 authenticated = 0;
156 authenticated = 1;
158 auth2_record_key(authctxt, authenticated, key);
161 debug2_f("authenticated %d", authenticated);
168 return authenticated;
auth2-chall.c 308 int authenticated = 0, res; local
350 authenticated = authctxt->valid ? 1 : 0;
363 if (authenticated) {
371 userauth_finish(ssh, authenticated, "keyboard-interactive",
auth.h 58 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
auth2-pubkey.c 106 int req_presence = 0, req_verify = 0, authenticated = 0; local
230 authenticated = 0;
236 authenticated = 1;
238 if (authenticated == 1 && sig_details != NULL) {
255 authenticated = 0;
269 authenticated = 0;
273 auth2_record_key(authctxt, authenticated, key);
305 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) {
307 authenticated = 0;
309 debug2_f("authenticated %d pkalg %s", authenticated, pkalg)
    [all...]
auth2.c 287 int r, authenticated = 0; local
361 authenticated = m->userauth(ssh, method);
363 if (!authctxt->authenticated && strcmp(method, "none") != 0)
366 userauth_finish(ssh, authenticated, method, NULL);
376 userauth_finish(struct ssh *ssh, int authenticated, const char *packet_method,
385 if (authenticated) {
387 fatal("INTERNAL ERROR: authenticated invalid user %s",
391 fatal("INTERNAL ERROR: authenticated and postponed");
399 if (authenticated && authctxt->pw->pw_uid == 0 &&
401 authenticated = 0
    [all...]
monitor_wrap.c 479 u_int authenticated = 0; local
496 if ((r = sshbuf_get_u32(m, &authenticated)) != 0)
509 debug3_f("user %sauthenticated", authenticated ? "" : "not ");
510 return (authenticated);
1180 u_int authenticated = 0; local
1189 if ((r = sshbuf_get_u32(m, &authenticated)) != 0)
1193 debug3_f("user %sauthenticated", authenticated ? "" : "not ");
1194 return (authenticated);
monitor.c 267 int status, authenticated = 0, partial = 0; local
289 while (!authenticated) {
295 authenticated = (monitor_read(ssh, pmonitor,
304 if (authenticated &&
308 authenticated = 0;
313 if (authenticated) {
319 authenticated = 0;
322 if (options.use_pam && authenticated) {
330 authenticated = mm_answer_pam_account(ssh, pmonitor->m_sendfd, m);
336 auth_log(ssh, authenticated, partial
988 int r, authenticated; local
2115 int r, authenticated; local
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/mech/
gss_pname_to_uid.c 68 int authenticated = 0, complete = 0; local
82 &authenticated,
92 if (authenticated) {
gss_authorize_localname.c 87 int authenticated = 0, complete = 0; local
92 &authenticated,
103 if (authenticated &&
  /src/sys/external/bsd/drm2/dist/drm/amd/display/modules/hdcp/
amdgpu_hdcp1_execution.c 253 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, function
483 status = authenticated(hdcp, event_ctx, input);
amdgpu_hdcp2_execution.c 560 static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp, function
803 status = authenticated(hdcp, event_ctx, input);
871 status = authenticated(hdcp, event_ctx, input);
  /src/external/bsd/openldap/dist/contrib/slapd-modules/acl/
gssacl.c 155 int authenticated, complete; local
177 &authenticated, &complete,
181 } else if ( authenticated == 0 ) {
  /src/lib/libtelnet/
auth.c 86 static Authenticator *authenticated = 0; variable
155 authenticated = 0;
502 if (!(authenticated = ap))
503 authenticated = &NoAuth;
525 while (!authenticated)
534 if (!authenticated || authenticated == &NoAuth)
540 if (authenticated->status)
541 validuser = (*authenticated->status)(authenticated,
    [all...]
  /src/sys/external/bsd/drm2/dist/include/drm/
drm_file.h 169 * @authenticated:
172 * nodes means it must be authenticated.
177 bool authenticated; member in struct:drm_file
240 /** @magic: Authentication magic, see @authenticated. */
  /src/libexec/rlogind/
rlogind.c 243 int authenticated = 0; local
380 authenticated++;
400 if (authenticated)
  /src/external/mit/xorg/lib/libxcb/files/
xf86dri.h 389 uint32_t authenticated; member in struct:xcb_xf86dri_auth_connection_reply_t
dri2.h 185 uint32_t authenticated; member in struct:xcb_dri2_authenticate_reply_t
  /src/external/bsd/libpcap/dist/rpcapd/
daemon.c 79 // Timeout, in seconds, when we're waiting for an authenticated client
226 int authenticated = 0; // 1 if the client has successfully authenticated local
504 while (!authenticated)
602 // OK, we're authenticated; we sent back
604 authenticated = 1;
637 // the client is authenticated.
722 // OK, the client has authenticated itself, and we can start
1019 // We're already authenticated; you don't
  /src/external/bsd/wpa/dist/src/eapol_auth/
eapol_auth_sm_i.h 175 unsigned int authenticated; /* The number of times authentication has member in struct:eapol_state_machine
  /src/external/bsd/wpa/dist/src/pae/
ieee802_1x_kay.h 176 bool authenticated; member in struct:ieee802_1x_kay
  /src/sys/external/bsd/drm/dist/bsd-core/
drmP.h 545 int authenticated; member in struct:drm_file

Completed in 80 milliseconds

1 2