/freebsd-10.0-release/crypto/openssh/ |
H A D | auth2-kbdint.c | 47 int authenticated = 0; local 57 authenticated = auth2_challenge(authctxt, devs); 61 return authenticated;
|
H A D | auth2-passwd.c | 53 int authenticated = 0; local 70 authenticated = 1; 73 return authenticated;
|
H A D | auth1.c | 117 int authenticated = 0; local 130 authenticated = PRIVSEP(auth_password(authctxt, password)); 135 return (authenticated); 142 int authenticated = 0; local 150 authenticated = auth_rsa(authctxt, n); 153 return (authenticated); 160 int keybits, authenticated = 0; local 186 authenticated = auth_rhosts_rsa(authctxt, client_user, 192 return (authenticated); 218 int authenticated local 238 int authenticated = 0; local [all...] |
H A D | auth-chall.c | 85 int authenticated = 0; local 94 authenticated = 1; 102 authenticated = 1; 114 return authenticated;
|
H A D | auth2.c | 226 int authenticated = 0; local 320 authenticated = m->userauth(authctxt); 322 userauth_finish(authctxt, authenticated, method, NULL); 330 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, argument 336 if (!authctxt->valid && authenticated) 337 fatal("INTERNAL ERROR: authenticated invalid user %s", 339 if (authenticated && authctxt->postponed) 340 fatal("INTERNAL ERROR: authenticated and postponed"); 343 if (authenticated && authctxt->pw->pw_uid == 0 && 345 authenticated [all...] |
H A D | auth2-hostbased.c | 65 int authenticated = 0; local 124 authenticated = 0; 128 authenticated = 1; 132 debug2("userauth_hostbased: authenticated %d", authenticated); 140 return authenticated;
|
H A D | auth2-gss.c | 231 int authenticated; local 243 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 250 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 258 int authenticated = 0; local 278 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 290 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
|
H A D | auth2-chall.c | 286 int authenticated = 0, res; local 323 authenticated = authctxt->valid ? 1 : 0; 336 if (authenticated) { 344 userauth_finish(authctxt, authenticated, "keyboard-interactive",
|
H A D | auth2-jpake.c | 84 int authenticated = 0; local 94 authenticated = auth2_jpake_start(authctxt); 97 return authenticated; 535 int authenticated = 0; local 551 authenticated = authctxt->valid ? 1 : 0; 559 userauth_finish(authctxt, authenticated, method_jpake.name, NULL);
|
H A D | monitor.c | 357 int authenticated = 0, partial = 0; local 383 while (!authenticated) { 387 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1); 394 if (authenticated && 399 authenticated = 0; 404 if (authenticated) { 410 authenticated = 0; 413 if (options.use_pam && authenticated) { 419 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m); 425 auth_log(authctxt, authenticated, partia 876 int authenticated; local 2144 int authenticated; local 2330 int authenticated = 0; local [all...] |
H A D | auth.c | 274 auth_log(Authctxt *authctxt, int authenticated, int partial, argument 284 if (authenticated == 1 || 295 authmsg = authenticated ? "Accepted" : "Failed"; 312 if (authenticated == 0 && !authctxt->postponed && 319 if (authenticated) 325 if (authenticated == 0 && !authctxt->postponed)
|
H A D | auth2-pubkey.c | 82 int authenticated = 0; local 153 authenticated = 0; 157 authenticated = 1; 181 if (authenticated != 1) 184 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); 189 return authenticated;
|
H A D | auth.h | 51 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
|
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/mech/ |
H A D | gss_get_name_attribute.c | 39 int *authenticated, 50 if (authenticated != NULL) 51 *authenticated = 0; 69 authenticated, 36 gss_get_name_attribute(OM_uint32 *minor_status, gss_name_t input_name, gss_buffer_t attr, int *authenticated, int *complete, gss_buffer_t value, gss_buffer_t display_value, int *more) argument
|
H A D | gss_authorize_localname.c | 85 int authenticated = 0, complete = 0; local 90 &authenticated, 101 if (authenticated &&
|
H A D | gss_pname_to_uid.c | 77 int authenticated = 0, complete = 0; 89 &authenticated,
|
/freebsd-10.0-release/contrib/telnet/libtelnet/ |
H A D | auth.c | 103 static Authenticator *authenticated = 0; variable 209 authenticated = 0; 548 if (!(authenticated = ap)) 549 authenticated = &NoAuth; 571 while (!authenticated) 580 if (!authenticated || authenticated == &NoAuth) 586 if (authenticated->status) 587 validuser = (*authenticated->status)(authenticated, [all...] |
/freebsd-10.0-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | auth.c | 98 static Authenticator *authenticated = 0; variable 196 authenticated = 0; 544 if (!(authenticated = ap)) 545 authenticated = &NoAuth; 567 while (!authenticated) 576 if (!authenticated || authenticated == &NoAuth) 582 if (authenticated->status) 583 validuser = (*authenticated->status)(authenticated, [all...] |
/freebsd-10.0-release/sys/dev/drm/ |
H A D | drm_fops.c | 66 /* for compatibility root is always authenticated */ 67 priv->authenticated = DRM_SUSER(p);
|
H A D | drm_vm.c | 46 * call was succesful and the client is authenticated. 54 if (file_priv && !file_priv->authenticated)
|
H A D | drm_auth.c | 138 * should be authenticated. 169 * Marks the client associated with the given magic number as authenticated. 182 priv->authenticated = 1;
|
/freebsd-10.0-release/sys/dev/drm2/ |
H A D | drm_vm.c | 47 * call was succesful and the client is authenticated. 55 if (file_priv && !file_priv->authenticated)
|
H A D | drm_auth.c | 138 * should be authenticated. 169 * Marks the client associated with the given magic number as authenticated. 182 priv->authenticated = 1;
|
H A D | drm_fops.c | 66 /* for compatibility root is always authenticated */ 67 priv->authenticated = DRM_SUSER(p);
|
/freebsd-10.0-release/libexec/rlogind/ |
H A D | rlogind.c | 201 int authenticated = 0; local 268 authenticated++; 292 if (authenticated) {
|