Searched refs:authenticated (Results 1 - 25 of 40) sorted by path

12

/freebsd-9.3-release/contrib/openbsm/etc/
H A Daudit_event616 6214:AUE_kadmind_auth:authenticated kadmind request:ua
/freebsd-9.3-release/contrib/sendmail/cf/cf/
H A Dsubmit.cf565 $.$?{auth_type}(authenticated$?{auth_ssf} bits=${auth_ssf}$.)
1014 # authenticated?
1109 # authenticated via TLS?
1110 R$* $: $1 $| $>RelayTLS client authenticated?
1179 R$@ $| $* $#error $@ 5.7.1 $: "550 not authenticated"
1256 # authenticated?
/freebsd-9.3-release/contrib/sendmail/src/
H A Dsrvrsmtp.c1343 authenticated:
1763 goto authenticated;
1764 /* authenticated by the initial response */
2455 ** authenticated, so we'll trust implicitly
4335 ** we shouldn't trust it if not authenticated
/freebsd-9.3-release/contrib/telnet/libtelnet/
H A Dauth.c103 static Authenticator *authenticated = 0; variable
209 authenticated = 0;
548 if (!(authenticated = ap))
549 authenticated = &NoAuth;
571 while (!authenticated)
580 if (!authenticated || authenticated == &NoAuth)
586 if (authenticated->status)
587 validuser = (*authenticated->status)(authenticated,
[all...]
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/
H A Dmlme.c717 wpa_printf(MSG_DEBUG, "MLME: authenticated");
718 wpa_s->mlme.authenticated = 1;
943 if (wpa_s->mlme.authenticated)
955 wpa_s->mlme.authenticated = 0;
H A Dwpa_supplicant_i.h229 unsigned int authenticated:1; member in struct:wpa_client_mlme
/freebsd-9.3-release/crypto/heimdal/appl/telnet/libtelnet/
H A Dauth.c107 static Authenticator *authenticated = 0; variable
230 authenticated = 0;
578 if (!(authenticated = ap))
579 authenticated = &NoAuth;
601 while (!authenticated)
610 if (!authenticated || authenticated == &NoAuth)
616 if (authenticated->status)
617 validuser = (*authenticated->status)(authenticated,
[all...]
/freebsd-9.3-release/crypto/heimdal/kuser/
H A Dklist.c195 PRINT_FLAG2(pre_authent, pre-authenticated);
196 PRINT_FLAG2(hw_authent, hw-authenticated);
/freebsd-9.3-release/crypto/openssh/
H A Dauth-chall.c85 int authenticated = 0; local
94 authenticated = 1;
102 authenticated = 1;
114 return authenticated;
H A Dauth.c275 auth_log(Authctxt *authctxt, int authenticated, int partial, argument
285 if (authenticated == 1 ||
296 authmsg = authenticated ? "Accepted" : "Failed";
313 if (authenticated == 0 && !authctxt->postponed &&
320 if (authenticated)
326 if (authenticated == 0 && !authctxt->postponed)
H A Dauth.h51 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
H A Dauth1.c117 int authenticated = 0; local
130 authenticated = PRIVSEP(auth_password(authctxt, password));
135 return (authenticated);
142 int authenticated = 0; local
150 authenticated = auth_rsa(authctxt, n);
153 return (authenticated);
160 int keybits, authenticated = 0; local
186 authenticated = auth_rhosts_rsa(authctxt, client_user,
192 return (authenticated);
218 int authenticated local
238 int authenticated = 0; local
[all...]
H A Dauth2-chall.c291 int authenticated = 0, res; local
328 authenticated = authctxt->valid ? 1 : 0;
341 if (authenticated) {
349 userauth_finish(authctxt, authenticated, "keyboard-interactive",
H A Dauth2-gss.c226 int authenticated; local
238 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
245 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
253 int authenticated = 0; local
273 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
285 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
H A Dauth2-hostbased.c65 int authenticated = 0; local
130 authenticated = 0;
134 authenticated = 1;
138 debug2("userauth_hostbased: authenticated %d", authenticated);
146 return authenticated;
H A Dauth2-kbdint.c47 int authenticated = 0; local
57 authenticated = auth2_challenge(authctxt, devs);
61 return authenticated;
H A Dauth2-passwd.c53 int authenticated = 0; local
70 authenticated = 1;
73 return authenticated;
H A Dauth2-pubkey.c82 int authenticated = 0; local
159 authenticated = 0;
163 authenticated = 1;
187 if (authenticated != 1)
190 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg);
195 return authenticated;
H A Dauth2.c221 int authenticated = 0; local
312 authenticated = m->userauth(authctxt);
314 userauth_finish(authctxt, authenticated, method, NULL);
322 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, argument
328 if (!authctxt->valid && authenticated)
329 fatal("INTERNAL ERROR: authenticated invalid user %s",
331 if (authenticated && authctxt->postponed)
332 fatal("INTERNAL ERROR: authenticated and postponed");
335 if (authenticated && authctxt->pw->pw_uid == 0 &&
337 authenticated
[all...]
H A Dmonitor.c344 int authenticated = 0, partial = 0; local
370 while (!authenticated) {
374 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1);
381 if (authenticated &&
386 authenticated = 0;
391 if (authenticated) {
397 authenticated = 0;
400 if (options.use_pam && authenticated) {
406 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m);
412 auth_log(authctxt, authenticated, partia
854 int authenticated; local
2123 int authenticated; local
[all...]
H A Dmonitor_wrap.c344 int authenticated = 0; local
355 authenticated = buffer_get_int(&m);
360 __func__, authenticated ? "" : "not ");
361 return (authenticated);
1276 int authenticated = 0; local
1284 authenticated = buffer_get_int(&m);
1287 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not ");
1288 return (authenticated);
H A Dsession.c315 * been successfully authenticated. During this message exchange, pseudo
2799 if (!authctxt->authenticated)
H A Dsshd.c2155 goto authenticated;
2177 authenticated:
2184 authctxt->authenticated = 1;
/freebsd-9.3-release/libexec/rlogind/
H A Drlogind.c201 int authenticated = 0; local
268 authenticated++;
292 if (authenticated) {
/freebsd-9.3-release/sys/dev/drm/
H A DdrmP.h422 int authenticated; member in struct:drm_file

Completed in 218 milliseconds

12