/freebsd-9.3-release/crypto/openssh/ |
H A D | auth2-kbdint.c | 47 int authenticated = 0; local 57 authenticated = auth2_challenge(authctxt, devs); 61 return authenticated;
|
H A D | auth2-passwd.c | 53 int authenticated = 0; local 70 authenticated = 1; 73 return authenticated;
|
H A D | auth1.c | 117 int authenticated = 0; local 130 authenticated = PRIVSEP(auth_password(authctxt, password)); 135 return (authenticated); 142 int authenticated = 0; local 150 authenticated = auth_rsa(authctxt, n); 153 return (authenticated); 160 int keybits, authenticated = 0; local 186 authenticated = auth_rhosts_rsa(authctxt, client_user, 192 return (authenticated); 218 int authenticated local 238 int authenticated = 0; local [all...] |
H A D | auth-chall.c | 85 int authenticated = 0; local 94 authenticated = 1; 102 authenticated = 1; 114 return authenticated;
|
H A D | auth2.c | 221 int authenticated = 0; local 312 authenticated = m->userauth(authctxt); 314 userauth_finish(authctxt, authenticated, method, NULL); 322 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, argument 328 if (!authctxt->valid && authenticated) 329 fatal("INTERNAL ERROR: authenticated invalid user %s", 331 if (authenticated && authctxt->postponed) 332 fatal("INTERNAL ERROR: authenticated and postponed"); 335 if (authenticated && authctxt->pw->pw_uid == 0 && 337 authenticated [all...] |
H A D | auth2-hostbased.c | 65 int authenticated = 0; local 130 authenticated = 0; 134 authenticated = 1; 138 debug2("userauth_hostbased: authenticated %d", authenticated); 146 return authenticated;
|
H A D | auth2-gss.c | 226 int authenticated; local 238 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 245 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 253 int authenticated = 0; local 273 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 285 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
|
H A D | auth2-chall.c | 291 int authenticated = 0, res; local 328 authenticated = authctxt->valid ? 1 : 0; 341 if (authenticated) { 349 userauth_finish(authctxt, authenticated, "keyboard-interactive",
|
H A D | monitor.c | 344 int authenticated = 0, partial = 0; local 370 while (!authenticated) { 374 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1); 381 if (authenticated && 386 authenticated = 0; 391 if (authenticated) { 397 authenticated = 0; 400 if (options.use_pam && authenticated) { 406 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m); 412 auth_log(authctxt, authenticated, partia 854 int authenticated; local 2123 int authenticated; local [all...] |
H A D | auth.c | 275 auth_log(Authctxt *authctxt, int authenticated, int partial, argument 285 if (authenticated == 1 || 296 authmsg = authenticated ? "Accepted" : "Failed"; 313 if (authenticated == 0 && !authctxt->postponed && 320 if (authenticated) 326 if (authenticated == 0 && !authctxt->postponed)
|
H A D | auth2-pubkey.c | 82 int authenticated = 0; local 159 authenticated = 0; 163 authenticated = 1; 187 if (authenticated != 1) 190 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); 195 return authenticated;
|
H A D | auth.h | 51 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
|
H A D | monitor_wrap.c | 344 int authenticated = 0; local 355 authenticated = buffer_get_int(&m); 360 __func__, authenticated ? "" : "not "); 361 return (authenticated); 1276 int authenticated = 0; local 1284 authenticated = buffer_get_int(&m); 1287 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not "); 1288 return (authenticated);
|
/freebsd-9.3-release/contrib/telnet/libtelnet/ |
H A D | auth.c | 103 static Authenticator *authenticated = 0; variable 209 authenticated = 0; 548 if (!(authenticated = ap)) 549 authenticated = &NoAuth; 571 while (!authenticated) 580 if (!authenticated || authenticated == &NoAuth) 586 if (authenticated->status) 587 validuser = (*authenticated->status)(authenticated, [all...] |
/freebsd-9.3-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | auth.c | 107 static Authenticator *authenticated = 0; variable 230 authenticated = 0; 578 if (!(authenticated = ap)) 579 authenticated = &NoAuth; 601 while (!authenticated) 610 if (!authenticated || authenticated == &NoAuth) 616 if (authenticated->status) 617 validuser = (*authenticated->status)(authenticated, [all...] |
/freebsd-9.3-release/sys/dev/drm/ |
H A D | drm_fops.c | 66 /* for compatibility root is always authenticated */ 67 priv->authenticated = DRM_SUSER(p);
|
H A D | drm_vm.c | 46 * call was succesful and the client is authenticated. 54 if (file_priv && !file_priv->authenticated)
|
H A D | drm_auth.c | 138 * should be authenticated. 169 * Marks the client associated with the given magic number as authenticated. 182 priv->authenticated = 1;
|
H A D | drm_ioctl.c | 193 client->auth = pt->authenticated;
|
H A D | drm_sysctl.c | 308 priv->authenticated ? 'y' : 'n',
|
/freebsd-9.3-release/sys/dev/drm2/ |
H A D | drm_vm.c | 47 * call was succesful and the client is authenticated. 55 if (file_priv && !file_priv->authenticated)
|
H A D | drm_auth.c | 138 * should be authenticated. 169 * Marks the client associated with the given magic number as authenticated. 182 priv->authenticated = 1;
|
H A D | drm_fops.c | 66 /* for compatibility root is always authenticated */ 67 priv->authenticated = DRM_SUSER(p);
|
/freebsd-9.3-release/libexec/rlogind/ |
H A D | rlogind.c | 201 int authenticated = 0; local 268 authenticated++; 292 if (authenticated) {
|
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant_i.h | 229 unsigned int authenticated:1; member in struct:wpa_client_mlme
|