/freebsd-9.3-release/contrib/openbsm/etc/ |
H A D | audit_event | 616 6214:AUE_kadmind_auth:authenticated kadmind request:ua
|
/freebsd-9.3-release/contrib/sendmail/cf/cf/ |
H A D | submit.cf | 565 $.$?{auth_type}(authenticated$?{auth_ssf} bits=${auth_ssf}$.) 1014 # authenticated? 1109 # authenticated via TLS? 1110 R$* $: $1 $| $>RelayTLS client authenticated? 1179 R$@ $| $* $#error $@ 5.7.1 $: "550 not authenticated" 1256 # authenticated?
|
/freebsd-9.3-release/contrib/sendmail/src/ |
H A D | srvrsmtp.c | 1343 authenticated: 1763 goto authenticated; 1764 /* authenticated by the initial response */ 2455 ** authenticated, so we'll trust implicitly 4335 ** we shouldn't trust it if not authenticated
|
/freebsd-9.3-release/contrib/telnet/libtelnet/ |
H A D | auth.c | 103 static Authenticator *authenticated = 0; variable 209 authenticated = 0; 548 if (!(authenticated = ap)) 549 authenticated = &NoAuth; 571 while (!authenticated) 580 if (!authenticated || authenticated == &NoAuth) 586 if (authenticated->status) 587 validuser = (*authenticated->status)(authenticated, [all...] |
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | mlme.c | 717 wpa_printf(MSG_DEBUG, "MLME: authenticated"); 718 wpa_s->mlme.authenticated = 1; 943 if (wpa_s->mlme.authenticated) 955 wpa_s->mlme.authenticated = 0;
|
H A D | wpa_supplicant_i.h | 229 unsigned int authenticated:1; member in struct:wpa_client_mlme
|
/freebsd-9.3-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | auth.c | 107 static Authenticator *authenticated = 0; variable 230 authenticated = 0; 578 if (!(authenticated = ap)) 579 authenticated = &NoAuth; 601 while (!authenticated) 610 if (!authenticated || authenticated == &NoAuth) 616 if (authenticated->status) 617 validuser = (*authenticated->status)(authenticated, [all...] |
/freebsd-9.3-release/crypto/heimdal/kuser/ |
H A D | klist.c | 195 PRINT_FLAG2(pre_authent, pre-authenticated); 196 PRINT_FLAG2(hw_authent, hw-authenticated);
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | auth-chall.c | 85 int authenticated = 0; local 94 authenticated = 1; 102 authenticated = 1; 114 return authenticated;
|
H A D | auth.c | 275 auth_log(Authctxt *authctxt, int authenticated, int partial, argument 285 if (authenticated == 1 || 296 authmsg = authenticated ? "Accepted" : "Failed"; 313 if (authenticated == 0 && !authctxt->postponed && 320 if (authenticated) 326 if (authenticated == 0 && !authctxt->postponed)
|
H A D | auth.h | 51 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
|
H A D | auth1.c | 117 int authenticated = 0; local 130 authenticated = PRIVSEP(auth_password(authctxt, password)); 135 return (authenticated); 142 int authenticated = 0; local 150 authenticated = auth_rsa(authctxt, n); 153 return (authenticated); 160 int keybits, authenticated = 0; local 186 authenticated = auth_rhosts_rsa(authctxt, client_user, 192 return (authenticated); 218 int authenticated local 238 int authenticated = 0; local [all...] |
H A D | auth2-chall.c | 291 int authenticated = 0, res; local 328 authenticated = authctxt->valid ? 1 : 0; 341 if (authenticated) { 349 userauth_finish(authctxt, authenticated, "keyboard-interactive",
|
H A D | auth2-gss.c | 226 int authenticated; local 238 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 245 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 253 int authenticated = 0; local 273 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 285 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
|
H A D | auth2-hostbased.c | 65 int authenticated = 0; local 130 authenticated = 0; 134 authenticated = 1; 138 debug2("userauth_hostbased: authenticated %d", authenticated); 146 return authenticated;
|
H A D | auth2-kbdint.c | 47 int authenticated = 0; local 57 authenticated = auth2_challenge(authctxt, devs); 61 return authenticated;
|
H A D | auth2-passwd.c | 53 int authenticated = 0; local 70 authenticated = 1; 73 return authenticated;
|
H A D | auth2-pubkey.c | 82 int authenticated = 0; local 159 authenticated = 0; 163 authenticated = 1; 187 if (authenticated != 1) 190 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); 195 return authenticated;
|
H A D | auth2.c | 221 int authenticated = 0; local 312 authenticated = m->userauth(authctxt); 314 userauth_finish(authctxt, authenticated, method, NULL); 322 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, argument 328 if (!authctxt->valid && authenticated) 329 fatal("INTERNAL ERROR: authenticated invalid user %s", 331 if (authenticated && authctxt->postponed) 332 fatal("INTERNAL ERROR: authenticated and postponed"); 335 if (authenticated && authctxt->pw->pw_uid == 0 && 337 authenticated [all...] |
H A D | monitor.c | 344 int authenticated = 0, partial = 0; local 370 while (!authenticated) { 374 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1); 381 if (authenticated && 386 authenticated = 0; 391 if (authenticated) { 397 authenticated = 0; 400 if (options.use_pam && authenticated) { 406 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m); 412 auth_log(authctxt, authenticated, partia 854 int authenticated; local 2123 int authenticated; local [all...] |
H A D | monitor_wrap.c | 344 int authenticated = 0; local 355 authenticated = buffer_get_int(&m); 360 __func__, authenticated ? "" : "not "); 361 return (authenticated); 1276 int authenticated = 0; local 1284 authenticated = buffer_get_int(&m); 1287 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not "); 1288 return (authenticated);
|
H A D | session.c | 315 * been successfully authenticated. During this message exchange, pseudo 2799 if (!authctxt->authenticated)
|
H A D | sshd.c | 2155 goto authenticated; 2177 authenticated: 2184 authctxt->authenticated = 1;
|
/freebsd-9.3-release/libexec/rlogind/ |
H A D | rlogind.c | 201 int authenticated = 0; local 268 authenticated++; 292 if (authenticated) {
|
/freebsd-9.3-release/sys/dev/drm/ |
H A D | drmP.h | 422 int authenticated; member in struct:drm_file
|