HomeSort by: relevance | last modified time | path
    Searched refs:authenticated (Results 1 - 25 of 57) sorted by relevancy

1 2 3

  /src/crypto/external/bsd/openssh/dist/
auth2-kbdint.c 52 int r, authenticated = 0; local
63 authenticated = auth2_challenge(ssh, devs);
67 return authenticated;
auth2-krb5.c 58 int authenticated = 0, r; local
67 authenticated = 1;
74 return (authenticated);
auth2-passwd.c 58 int authenticated = 0, r; local
73 authenticated = 1;
75 return authenticated;
auth2.c 288 int r, authenticated = 0; local
362 authenticated = m->userauth(ssh, method);
364 if (!authctxt->authenticated && strcmp(method, "none") != 0)
367 userauth_finish(ssh, authenticated, method, NULL);
377 userauth_finish(struct ssh *ssh, int authenticated, const char *packet_method,
386 if (authenticated) {
388 fatal("INTERNAL ERROR: authenticated invalid user %s",
392 fatal("INTERNAL ERROR: authenticated and postponed");
400 if (authenticated && authctxt->pw->pw_uid == 0 &&
402 authenticated = 0
    [all...]
auth2-gss.c 258 int r, authenticated; local
271 authenticated = mm_ssh_gssapi_userok(authctxt->user);
278 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL);
287 int r, authenticated = 0; local
312 authenticated = mm_ssh_gssapi_userok(authctxt->user);
324 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL);
auth2-hostbased.c 70 int r, pktype, authenticated = 0; local
150 authenticated = 0;
155 authenticated = 1;
157 auth2_record_key(authctxt, authenticated, key);
160 debug2_f("authenticated %d", authenticated);
167 return authenticated;
monitor.c 262 int status, authenticated = 0, partial = 0; local
283 while (!authenticated) {
289 authenticated = (monitor_read(ssh, pmonitor,
298 if (authenticated &&
302 authenticated = 0;
307 if (authenticated) {
313 authenticated = 0;
316 if (options.use_pam && authenticated) {
324 authenticated = mm_answer_pam_account(ssh, pmonitor->m_sendfd, m);
330 auth_log(ssh, authenticated, partial
960 int r, authenticated; local
2080 int r, authenticated; local
    [all...]
auth2-chall.c 308 int authenticated = 0, res; local
350 authenticated = authctxt->valid ? 1 : 0;
363 if (authenticated) {
371 userauth_finish(ssh, authenticated, "keyboard-interactive",
auth2-pubkey.c 106 int req_presence = 0, req_verify = 0, authenticated = 0; local
229 authenticated = 0;
235 authenticated = 1;
237 if (authenticated == 1 && sig_details != NULL) {
254 authenticated = 0;
268 authenticated = 0;
272 auth2_record_key(authctxt, authenticated, key);
304 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) {
306 authenticated = 0;
308 debug2_f("authenticated %d pkalg %s", authenticated, pkalg)
    [all...]
auth.c 369 auth_log(struct ssh *ssh, int authenticated, int partial,
381 if (authenticated == 1 ||
392 authmsg = authenticated ? "Accepted" : "Failed";
393 if (authenticated)
auth.h 58 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
monitor_wrap.c 458 u_int authenticated = 0; local
475 if ((r = sshbuf_get_u32(m, &authenticated)) != 0)
488 debug3_f("user %sauthenticated", authenticated ? "" : "not ");
489 return (authenticated);
1159 u_int authenticated = 0; local
1168 if ((r = sshbuf_get_u32(m, &authenticated)) != 0)
1172 debug3_f("user %sauthenticated", authenticated ? "" : "not ");
1173 return (authenticated);
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/mech/
gss_get_name_attribute.c 41 int *authenticated,
52 if (authenticated != NULL)
53 *authenticated = 0;
71 authenticated,
gss_authorize_localname.c 87 int authenticated = 0, complete = 0; local
92 &authenticated,
103 if (authenticated &&
gss_pname_to_uid.c 68 int authenticated = 0, complete = 0; local
82 &authenticated,
92 if (authenticated) {
  /src/lib/libtelnet/
auth.c 86 static Authenticator *authenticated = 0; variable
155 authenticated = 0;
502 if (!(authenticated = ap))
503 authenticated = &NoAuth;
525 while (!authenticated)
534 if (!authenticated || authenticated == &NoAuth)
540 if (authenticated->status)
541 validuser = (*authenticated->status)(authenticated,
    [all...]
  /src/sys/external/bsd/drm/dist/bsd-core/
drm_fops.c 85 /* for compatibility root is always authenticated */
86 priv->authenticated = DRM_SUSER(p);
142 /* for compatibility root is always authenticated */
143 priv->authenticated = DRM_SUSER(p);
drm_vm.c 53 * call was succesful and the client is authenticated.
70 if (file_priv && !file_priv->authenticated)
drm_auth.c 135 * should be authenticated.
166 * Marks the client associated with the given magic number as authenticated.
179 priv->authenticated = 1;
  /src/external/bsd/openldap/dist/contrib/slapd-modules/acl/
gssacl.c 155 int authenticated, complete; local
177 &authenticated, &complete,
181 } else if ( authenticated == 0 ) {
  /src/sys/external/bsd/drm2/dist/include/drm/
drm_file.h 169 * @authenticated:
172 * nodes means it must be authenticated.
177 bool authenticated; member in struct:drm_file
240 /** @magic: Authentication magic, see @authenticated. */
  /src/external/bsd/wpa/dist/src/eapol_auth/
eapol_auth_sm_i.h 175 unsigned int authenticated; /* The number of times authentication has member in struct:eapol_state_machine
  /src/sys/external/bsd/drm2/dist/drm/mga/
mga_ioc32.c 195 file_priv->authenticated,
  /src/sys/external/bsd/drm2/dist/drm/
drm_auth.c 102 file->authenticated = 1;
169 fpriv->authenticated = 1;
  /src/libexec/rlogind/
rlogind.c 243 int authenticated = 0; local
380 authenticated++;
400 if (authenticated)

Completed in 41 milliseconds

1 2 3