/external/openssh/ |
D | auth2.c | 219 int authenticated = 0; in input_userauth_request() local 285 authenticated = m->userauth(authctxt); in input_userauth_request() 287 userauth_finish(authctxt, authenticated, method, NULL); in input_userauth_request() 296 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, in userauth_finish() argument 303 if (!authctxt->valid && authenticated) in userauth_finish() 306 if (authenticated && authctxt->postponed) in userauth_finish() 310 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish() 312 authenticated = 0; in userauth_finish() 318 if (authenticated && options.num_auth_methods != 0) { in userauth_finish() 320 authenticated = 0; in userauth_finish() [all …]
|
D | auth2-kbdint.c | 48 int authenticated = 0; in userauth_kbdint() local 58 authenticated = auth2_challenge(authctxt, devs); in userauth_kbdint() 62 return authenticated; in userauth_kbdint()
|
D | auth2-passwd.c | 54 int authenticated = 0; in userauth_passwd() local 73 authenticated = 1; in userauth_passwd() 77 return authenticated; in userauth_passwd()
|
D | auth2-gss.c | 229 int authenticated; in input_gssapi_exchange_complete() local 241 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); in input_gssapi_exchange_complete() 248 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete() 257 int authenticated = 0; in input_gssapi_mic() local 277 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); in input_gssapi_mic() 289 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
|
D | auth2-hostbased.c | 67 int authenticated = 0; in userauth_hostbased() local 139 authenticated = 0; in userauth_hostbased() 143 authenticated = 1; in userauth_hostbased() 147 debug2("userauth_hostbased: authenticated %d", authenticated); in userauth_hostbased() 155 return authenticated; in userauth_hostbased()
|
D | monitor.c | 288 int authenticated = 0, partial = 0; in monitor_child_preauth() local 307 while (!authenticated) { in monitor_child_preauth() 311 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1); in monitor_child_preauth() 315 if (authenticated && in monitor_child_preauth() 320 authenticated = 0; in monitor_child_preauth() 325 if (authenticated) { in monitor_child_preauth() 331 authenticated = 0; in monitor_child_preauth() 334 if (options.use_pam && authenticated) { in monitor_child_preauth() 340 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m); in monitor_child_preauth() 346 auth_log(authctxt, authenticated, partial, in monitor_child_preauth() [all …]
|
D | auth2-chall.c | 292 int authenticated = 0, res; in input_userauth_info_response() local 329 authenticated = authctxt->valid ? 1 : 0; in input_userauth_info_response() 342 if (authenticated) { in input_userauth_info_response() 350 userauth_finish(authctxt, authenticated, "keyboard-interactive", in input_userauth_info_response()
|
D | monitor_wrap.c | 353 int authenticated = 0; in mm_auth_password() local 364 authenticated = buffer_get_int(&m); in mm_auth_password() 372 __func__, authenticated ? "" : "not "); in mm_auth_password() 373 return (authenticated); in mm_auth_password() 930 int authenticated = 0; in mm_ssh_gssapi_userok() local 938 authenticated = buffer_get_int(&m); in mm_ssh_gssapi_userok() 941 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not "); in mm_ssh_gssapi_userok() 942 return (authenticated); in mm_ssh_gssapi_userok()
|
D | auth.c | 288 auth_log(Authctxt *authctxt, int authenticated, int partial, in auth_log() argument 299 if (authenticated == 1 || in auth_log() 310 authmsg = authenticated ? "Accepted" : "Failed"; in auth_log() 326 if (authenticated == 0 && !authctxt->postponed && in auth_log() 333 if (authenticated) in auth_log() 340 if (authenticated == 0 && !authctxt->postponed) in auth_log()
|
D | auth2-pubkey.c | 86 int authenticated = 0; in userauth_pubkey() local 177 authenticated = 0; in userauth_pubkey() 181 authenticated = 1; in userauth_pubkey() 210 if (authenticated != 1) in userauth_pubkey() 213 debug2("%s: authenticated %d pkalg %s", __func__, authenticated, pkalg); in userauth_pubkey() 219 return authenticated; in userauth_pubkey()
|
D | PROTOCOL.chacha20poly1305 | 1 This document describes the chacha20-poly1305@openssh.com authenticated 17 authenticated encryption mode. The construction used is based on that
|
D | auth.h | 54 int authenticated; /* authenticated and alarms cancelled */ member
|
/external/ppp/pppd/plugins/ |
D | winbind.c | 260 int authenticated = NOT_AUTHENTICATED; /* not auth */ in run_ntlm_auth() local 406 authenticated = AUTHENTICATED; in run_ntlm_auth() 409 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth() 421 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth() 425 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth() 448 if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key) { in run_ntlm_auth() 452 return authenticated; in run_ntlm_auth()
|
/external/apache-harmony/support/src/test/java/tests/support/ |
D | Support_HttpServer.java | 220 boolean authenticated = false, contentLength = false, chunked = false; in run() 236 authenticated = true; in run() 270 authenticateTest(authenticated); in run() 336 private void authenticateTest(boolean authenticated) { in authenticateTest() argument 346 if (!authenticated) { in authenticateTest()
|
/external/ukey2/ |
D | METADATA | 3 "UKEY2 is a Diffie-Hellman based authenticated key exchange protocol."
|
/external/autotest/client/site_tests/network_RackWiFiConnect/ |
D | control.proxyNonAuth | 13 case a non authenticated proxy network.
|
/external/grpc-grpc/doc/ |
D | server_side_auth.md | 10 … of key-value pairs - the *auth properties*. In addition to that, for authenticated RPCs, the set … 46 …p in mind that as auth interceptors essentially decide which RPCs are authenticated and which are …
|
/external/u-boot/doc/ |
D | README.mxc_hab | 4 To enable the authenticated or encrypted boot mode of U-Boot, it is 104 An authenticated U-Boot image is used as starting point for 116 The DEK blob is generated by an authenticated U-Boot image with
|
D | README.ti-secure | 4 Secure TI devices require a boot image that is authenticated by ROM 161 be authenticated, as described above, as part of the particular 163 process, the authenticated SPL must authenticate the main u-boot 172 authenticated by the SPL as they are loaded from the FIT image, the
|
/external/googletest/googletest/scripts/ |
D | upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True
|
/external/googletest/googlemock/scripts/ |
D | upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True
|
/external/google-breakpad/src/testing/scripts/ |
D | upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True
|
/external/google-breakpad/src/testing/gtest/scripts/ |
D | upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True
|
/external/mesa3d/src/glx/apple/ |
D | appledri.c | 231 rep.authenticated = 0; 232 if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.authenticated) {
|
/external/mesa3d/src/egl/drivers/dri2/ |
D | platform_wayland.c | 1047 dri2_dpy->authenticated = false; in dri2_wl_authenticate() 1053 if (!dri2_dpy->authenticated) in dri2_wl_authenticate() 1057 dri2_dpy->authenticated = true; in dri2_wl_authenticate() 1080 dri2_dpy->authenticated = true; in drm_handle_device() 1124 dri2_dpy->authenticated = true; in drm_handle_authenticated() 1130 .authenticated = drm_handle_authenticated, 1362 if (roundtrip(dri2_dpy) < 0 || !dri2_dpy->authenticated) in dri2_initialize_wayland_drm()
|