/freebsd-10-stable/crypto/openssh/ |
H A D | auth2-kbdint.c | 48 int authenticated = 0; local 58 authenticated = auth2_challenge(authctxt, devs); 62 return authenticated;
|
H A D | auth2-passwd.c | 54 int authenticated = 0; local 71 authenticated = 1; 74 return authenticated;
|
H A D | auth1.c | 120 int authenticated = 0; local 133 authenticated = PRIVSEP(auth_password(authctxt, password)); 138 return (authenticated); 145 int authenticated = 0; local 153 authenticated = auth_rsa(authctxt, n); 156 return (authenticated); 163 int keybits, authenticated = 0; local 189 authenticated = auth_rhosts_rsa(authctxt, client_user, 195 return (authenticated); 221 int authenticated local 241 int authenticated = 0; local [all...] |
H A D | auth-chall.c | 87 int authenticated = 0; local 96 authenticated = 1; 104 authenticated = 1; 116 return authenticated;
|
H A D | auth2.c | 220 int authenticated = 0; local 309 authenticated = m->userauth(authctxt); 311 userauth_finish(authctxt, authenticated, method, NULL); 320 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, argument 326 if (!authctxt->valid && authenticated) 327 fatal("INTERNAL ERROR: authenticated invalid user %s", 329 if (authenticated && authctxt->postponed) 330 fatal("INTERNAL ERROR: authenticated and postponed"); 333 if (authenticated && authctxt->pw->pw_uid == 0 && 335 authenticated [all...] |
H A D | auth2-gss.c | 229 int authenticated; local 241 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 248 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 257 int authenticated = 0; local 277 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 289 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
|
H A D | auth2-hostbased.c | 67 int authenticated = 0; local 139 authenticated = 0; 143 authenticated = 1; 147 debug2("userauth_hostbased: authenticated %d", authenticated); 155 return authenticated;
|
H A D | auth2-chall.c | 292 int authenticated = 0, res; local 329 authenticated = authctxt->valid ? 1 : 0; 342 if (authenticated) { 350 userauth_finish(authctxt, authenticated, "keyboard-interactive",
|
H A D | monitor.c | 338 int authenticated = 0, partial = 0; local 364 while (!authenticated) { 368 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1); 375 if (authenticated && 380 authenticated = 0; 385 if (authenticated) { 391 authenticated = 0; 394 if (options.use_pam && authenticated) { 400 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m); 406 auth_log(authctxt, authenticated, partia 912 int authenticated; local 2057 int authenticated; local [all...] |
H A D | auth.c | 278 auth_log(Authctxt *authctxt, int authenticated, int partial, argument 289 if (authenticated == 1 || 300 authmsg = authenticated ? "Accepted" : "Failed"; 317 if (authenticated == 0 && !authctxt->postponed && 324 if (authenticated) 331 if (authenticated == 0 && !authctxt->postponed)
|
H A D | monitor_wrap.c | 354 int authenticated = 0; local 365 authenticated = buffer_get_int(&m); 373 __func__, authenticated ? "" : "not "); 374 return (authenticated); 1079 int authenticated = 0; local 1087 authenticated = buffer_get_int(&m); 1090 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not "); 1091 return (authenticated);
|
H A D | auth.h | 54 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
|
H A D | auth2-pubkey.c | 86 int authenticated = 0; local 177 authenticated = 0; 181 authenticated = 1; 210 if (authenticated != 1) 213 debug2("%s: authenticated %d pkalg %s", __func__, authenticated, pkalg); 219 return authenticated;
|
/freebsd-10-stable/crypto/heimdal/lib/gssapi/mech/ |
H A D | gss_get_name_attribute.c | 39 int *authenticated, 50 if (authenticated != NULL) 51 *authenticated = 0; 69 authenticated, 36 gss_get_name_attribute(OM_uint32 *minor_status, gss_name_t input_name, gss_buffer_t attr, int *authenticated, int *complete, gss_buffer_t value, gss_buffer_t display_value, int *more) argument
|
H A D | gss_authorize_localname.c | 85 int authenticated = 0, complete = 0; local 90 &authenticated, 101 if (authenticated &&
|
H A D | gss_pname_to_uid.c | 77 int authenticated = 0, complete = 0; 89 &authenticated,
|
/freebsd-10-stable/contrib/telnet/libtelnet/ |
H A D | auth.c | 103 static Authenticator *authenticated = 0; variable 209 authenticated = 0; 548 if (!(authenticated = ap)) 549 authenticated = &NoAuth; 571 while (!authenticated) 580 if (!authenticated || authenticated == &NoAuth) 586 if (authenticated->status) 587 validuser = (*authenticated->status)(authenticated, [all...] |
/freebsd-10-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | auth.c | 98 static Authenticator *authenticated = 0; variable 196 authenticated = 0; 544 if (!(authenticated = ap)) 545 authenticated = &NoAuth; 567 while (!authenticated) 576 if (!authenticated || authenticated == &NoAuth) 582 if (authenticated->status) 583 validuser = (*authenticated->status)(authenticated, [all...] |
/freebsd-10-stable/sys/dev/drm/ |
H A D | drm_fops.c | 66 /* for compatibility root is always authenticated */ 67 priv->authenticated = DRM_SUSER(p);
|
H A D | drm_vm.c | 46 * call was succesful and the client is authenticated. 54 if (file_priv && !file_priv->authenticated)
|
H A D | drm_auth.c | 138 * should be authenticated. 169 * Marks the client associated with the given magic number as authenticated. 182 priv->authenticated = 1;
|
/freebsd-10-stable/sys/dev/drm2/ |
H A D | drm_vm.c | 60 * call was succesful and the client is authenticated. 68 if (file_priv && !file_priv->authenticated)
|
H A D | drm_auth.c | 193 file->authenticated = 1;
|
H A D | drm_fops.c | 201 /* for compatibility root is always authenticated */ 202 priv->authenticated = DRM_SUSER(p); 240 priv->authenticated = 1; 411 temp->authenticated = 0;
|
/freebsd-10-stable/libexec/rlogind/ |
H A D | rlogind.c | 197 int authenticated = 0; local 264 authenticated++; 288 if (authenticated) {
|