Searched refs:authenticated (Results 1 - 25 of 41) sorted by relevance

12

/freebsd-10.0-release/crypto/openssh/
H A Dauth2-kbdint.c47 int authenticated = 0; local
57 authenticated = auth2_challenge(authctxt, devs);
61 return authenticated;
H A Dauth2-passwd.c53 int authenticated = 0; local
70 authenticated = 1;
73 return authenticated;
H A Dauth1.c117 int authenticated = 0; local
130 authenticated = PRIVSEP(auth_password(authctxt, password));
135 return (authenticated);
142 int authenticated = 0; local
150 authenticated = auth_rsa(authctxt, n);
153 return (authenticated);
160 int keybits, authenticated = 0; local
186 authenticated = auth_rhosts_rsa(authctxt, client_user,
192 return (authenticated);
218 int authenticated local
238 int authenticated = 0; local
[all...]
H A Dauth-chall.c85 int authenticated = 0; local
94 authenticated = 1;
102 authenticated = 1;
114 return authenticated;
H A Dauth2.c226 int authenticated = 0; local
320 authenticated = m->userauth(authctxt);
322 userauth_finish(authctxt, authenticated, method, NULL);
330 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, argument
336 if (!authctxt->valid && authenticated)
337 fatal("INTERNAL ERROR: authenticated invalid user %s",
339 if (authenticated && authctxt->postponed)
340 fatal("INTERNAL ERROR: authenticated and postponed");
343 if (authenticated && authctxt->pw->pw_uid == 0 &&
345 authenticated
[all...]
H A Dauth2-hostbased.c65 int authenticated = 0; local
124 authenticated = 0;
128 authenticated = 1;
132 debug2("userauth_hostbased: authenticated %d", authenticated);
140 return authenticated;
H A Dauth2-gss.c231 int authenticated; local
243 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
250 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
258 int authenticated = 0; local
278 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
290 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
H A Dauth2-chall.c286 int authenticated = 0, res; local
323 authenticated = authctxt->valid ? 1 : 0;
336 if (authenticated) {
344 userauth_finish(authctxt, authenticated, "keyboard-interactive",
H A Dauth2-jpake.c84 int authenticated = 0; local
94 authenticated = auth2_jpake_start(authctxt);
97 return authenticated;
535 int authenticated = 0; local
551 authenticated = authctxt->valid ? 1 : 0;
559 userauth_finish(authctxt, authenticated, method_jpake.name, NULL);
H A Dmonitor.c357 int authenticated = 0, partial = 0; local
383 while (!authenticated) {
387 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1);
394 if (authenticated &&
399 authenticated = 0;
404 if (authenticated) {
410 authenticated = 0;
413 if (options.use_pam && authenticated) {
419 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m);
425 auth_log(authctxt, authenticated, partia
876 int authenticated; local
2144 int authenticated; local
2330 int authenticated = 0; local
[all...]
H A Dauth.c274 auth_log(Authctxt *authctxt, int authenticated, int partial, argument
284 if (authenticated == 1 ||
295 authmsg = authenticated ? "Accepted" : "Failed";
312 if (authenticated == 0 && !authctxt->postponed &&
319 if (authenticated)
325 if (authenticated == 0 && !authctxt->postponed)
H A Dauth2-pubkey.c82 int authenticated = 0; local
153 authenticated = 0;
157 authenticated = 1;
181 if (authenticated != 1)
184 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg);
189 return authenticated;
H A Dauth.h51 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/mech/
H A Dgss_get_name_attribute.c39 int *authenticated,
50 if (authenticated != NULL)
51 *authenticated = 0;
69 authenticated,
36 gss_get_name_attribute(OM_uint32 *minor_status, gss_name_t input_name, gss_buffer_t attr, int *authenticated, int *complete, gss_buffer_t value, gss_buffer_t display_value, int *more) argument
H A Dgss_authorize_localname.c85 int authenticated = 0, complete = 0; local
90 &authenticated,
101 if (authenticated &&
H A Dgss_pname_to_uid.c77 int authenticated = 0, complete = 0;
89 &authenticated,
/freebsd-10.0-release/contrib/telnet/libtelnet/
H A Dauth.c103 static Authenticator *authenticated = 0; variable
209 authenticated = 0;
548 if (!(authenticated = ap))
549 authenticated = &NoAuth;
571 while (!authenticated)
580 if (!authenticated || authenticated == &NoAuth)
586 if (authenticated->status)
587 validuser = (*authenticated->status)(authenticated,
[all...]
/freebsd-10.0-release/crypto/heimdal/appl/telnet/libtelnet/
H A Dauth.c98 static Authenticator *authenticated = 0; variable
196 authenticated = 0;
544 if (!(authenticated = ap))
545 authenticated = &NoAuth;
567 while (!authenticated)
576 if (!authenticated || authenticated == &NoAuth)
582 if (authenticated->status)
583 validuser = (*authenticated->status)(authenticated,
[all...]
/freebsd-10.0-release/sys/dev/drm/
H A Ddrm_fops.c66 /* for compatibility root is always authenticated */
67 priv->authenticated = DRM_SUSER(p);
H A Ddrm_vm.c46 * call was succesful and the client is authenticated.
54 if (file_priv && !file_priv->authenticated)
H A Ddrm_auth.c138 * should be authenticated.
169 * Marks the client associated with the given magic number as authenticated.
182 priv->authenticated = 1;
/freebsd-10.0-release/sys/dev/drm2/
H A Ddrm_vm.c47 * call was succesful and the client is authenticated.
55 if (file_priv && !file_priv->authenticated)
H A Ddrm_auth.c138 * should be authenticated.
169 * Marks the client associated with the given magic number as authenticated.
182 priv->authenticated = 1;
H A Ddrm_fops.c66 /* for compatibility root is always authenticated */
67 priv->authenticated = DRM_SUSER(p);
/freebsd-10.0-release/libexec/rlogind/
H A Drlogind.c201 int authenticated = 0; local
268 authenticated++;
292 if (authenticated) {

Completed in 118 milliseconds

12