| /src/crypto/external/bsd/openssh/dist/ |
| auth2-kbdint.c | 52 int r, authenticated = 0; local 63 authenticated = auth2_challenge(ssh, devs); 67 return authenticated;
|
| auth2-krb5.c | 58 int authenticated = 0, r; local 67 authenticated = 1; 74 return (authenticated);
|
| auth2-passwd.c | 58 int authenticated = 0, r; local 73 authenticated = 1; 75 return authenticated;
|
| auth2.c | 288 int r, authenticated = 0; local 362 authenticated = m->userauth(ssh, method); 364 if (!authctxt->authenticated && strcmp(method, "none") != 0) 367 userauth_finish(ssh, authenticated, method, NULL); 377 userauth_finish(struct ssh *ssh, int authenticated, const char *packet_method, 386 if (authenticated) { 388 fatal("INTERNAL ERROR: authenticated invalid user %s", 392 fatal("INTERNAL ERROR: authenticated and postponed"); 400 if (authenticated && authctxt->pw->pw_uid == 0 && 402 authenticated = 0 [all...] |
| auth2-gss.c | 258 int r, authenticated; local 271 authenticated = mm_ssh_gssapi_userok(authctxt->user); 278 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); 287 int r, authenticated = 0; local 312 authenticated = mm_ssh_gssapi_userok(authctxt->user); 324 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL);
|
| auth2-hostbased.c | 70 int r, pktype, authenticated = 0; local 150 authenticated = 0; 155 authenticated = 1; 157 auth2_record_key(authctxt, authenticated, key); 160 debug2_f("authenticated %d", authenticated); 167 return authenticated;
|
| monitor.c | 262 int status, authenticated = 0, partial = 0; local 283 while (!authenticated) { 289 authenticated = (monitor_read(ssh, pmonitor, 298 if (authenticated && 302 authenticated = 0; 307 if (authenticated) { 313 authenticated = 0; 316 if (options.use_pam && authenticated) { 324 authenticated = mm_answer_pam_account(ssh, pmonitor->m_sendfd, m); 330 auth_log(ssh, authenticated, partial 960 int r, authenticated; local 2080 int r, authenticated; local [all...] |
| auth2-chall.c | 308 int authenticated = 0, res; local 350 authenticated = authctxt->valid ? 1 : 0; 363 if (authenticated) { 371 userauth_finish(ssh, authenticated, "keyboard-interactive",
|
| auth2-pubkey.c | 106 int req_presence = 0, req_verify = 0, authenticated = 0; local 229 authenticated = 0; 235 authenticated = 1; 237 if (authenticated == 1 && sig_details != NULL) { 254 authenticated = 0; 268 authenticated = 0; 272 auth2_record_key(authctxt, authenticated, key); 304 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) { 306 authenticated = 0; 308 debug2_f("authenticated %d pkalg %s", authenticated, pkalg) [all...] |
| auth.c | 369 auth_log(struct ssh *ssh, int authenticated, int partial, 381 if (authenticated == 1 || 392 authmsg = authenticated ? "Accepted" : "Failed"; 393 if (authenticated)
|
| auth.h | 58 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
|
| monitor_wrap.c | 458 u_int authenticated = 0; local 475 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) 488 debug3_f("user %sauthenticated", authenticated ? "" : "not "); 489 return (authenticated); 1159 u_int authenticated = 0; local 1168 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) 1172 debug3_f("user %sauthenticated", authenticated ? "" : "not "); 1173 return (authenticated);
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/mech/ |
| gss_get_name_attribute.c | 41 int *authenticated, 52 if (authenticated != NULL) 53 *authenticated = 0; 71 authenticated,
|
| gss_authorize_localname.c | 87 int authenticated = 0, complete = 0; local 92 &authenticated, 103 if (authenticated &&
|
| gss_pname_to_uid.c | 68 int authenticated = 0, complete = 0; local 82 &authenticated, 92 if (authenticated) {
|
| /src/lib/libtelnet/ |
| auth.c | 86 static Authenticator *authenticated = 0; variable 155 authenticated = 0; 502 if (!(authenticated = ap)) 503 authenticated = &NoAuth; 525 while (!authenticated) 534 if (!authenticated || authenticated == &NoAuth) 540 if (authenticated->status) 541 validuser = (*authenticated->status)(authenticated, [all...] |
| /src/sys/external/bsd/drm/dist/bsd-core/ |
| drm_fops.c | 85 /* for compatibility root is always authenticated */ 86 priv->authenticated = DRM_SUSER(p); 142 /* for compatibility root is always authenticated */ 143 priv->authenticated = DRM_SUSER(p);
|
| drm_vm.c | 53 * call was succesful and the client is authenticated. 70 if (file_priv && !file_priv->authenticated)
|
| drm_auth.c | 135 * should be authenticated. 166 * Marks the client associated with the given magic number as authenticated. 179 priv->authenticated = 1;
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/acl/ |
| gssacl.c | 155 int authenticated, complete; local 177 &authenticated, &complete, 181 } else if ( authenticated == 0 ) {
|
| /src/sys/external/bsd/drm2/dist/include/drm/ |
| drm_file.h | 169 * @authenticated: 172 * nodes means it must be authenticated. 177 bool authenticated; member in struct:drm_file 240 /** @magic: Authentication magic, see @authenticated. */
|
| /src/external/bsd/wpa/dist/src/eapol_auth/ |
| eapol_auth_sm_i.h | 175 unsigned int authenticated; /* The number of times authentication has member in struct:eapol_state_machine
|
| /src/sys/external/bsd/drm2/dist/drm/mga/ |
| mga_ioc32.c | 195 file_priv->authenticated,
|
| /src/sys/external/bsd/drm2/dist/drm/ |
| drm_auth.c | 102 file->authenticated = 1; 169 fpriv->authenticated = 1;
|
| /src/libexec/rlogind/ |
| rlogind.c | 243 int authenticated = 0; local 380 authenticated++; 400 if (authenticated)
|