Home
last modified time | relevance | path

Searched refs:authenticated (Results 1 – 25 of 80) sorted by relevance

1234

/external/openssh/
Dauth2.c219 int authenticated = 0; in input_userauth_request() local
285 authenticated = m->userauth(authctxt); in input_userauth_request()
287 userauth_finish(authctxt, authenticated, method, NULL); in input_userauth_request()
296 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, in userauth_finish() argument
303 if (!authctxt->valid && authenticated) in userauth_finish()
306 if (authenticated && authctxt->postponed) in userauth_finish()
310 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish()
312 authenticated = 0; in userauth_finish()
318 if (authenticated && options.num_auth_methods != 0) { in userauth_finish()
320 authenticated = 0; in userauth_finish()
[all …]
Dauth2-kbdint.c48 int authenticated = 0; in userauth_kbdint() local
58 authenticated = auth2_challenge(authctxt, devs); in userauth_kbdint()
62 return authenticated; in userauth_kbdint()
Dauth2-passwd.c54 int authenticated = 0; in userauth_passwd() local
73 authenticated = 1; in userauth_passwd()
77 return authenticated; in userauth_passwd()
Dauth2-gss.c229 int authenticated; in input_gssapi_exchange_complete() local
241 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); in input_gssapi_exchange_complete()
248 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete()
257 int authenticated = 0; in input_gssapi_mic() local
277 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); in input_gssapi_mic()
289 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
Dauth2-hostbased.c67 int authenticated = 0; in userauth_hostbased() local
139 authenticated = 0; in userauth_hostbased()
143 authenticated = 1; in userauth_hostbased()
147 debug2("userauth_hostbased: authenticated %d", authenticated); in userauth_hostbased()
155 return authenticated; in userauth_hostbased()
Dmonitor.c288 int authenticated = 0, partial = 0; in monitor_child_preauth() local
307 while (!authenticated) { in monitor_child_preauth()
311 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1); in monitor_child_preauth()
315 if (authenticated && in monitor_child_preauth()
320 authenticated = 0; in monitor_child_preauth()
325 if (authenticated) { in monitor_child_preauth()
331 authenticated = 0; in monitor_child_preauth()
334 if (options.use_pam && authenticated) { in monitor_child_preauth()
340 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m); in monitor_child_preauth()
346 auth_log(authctxt, authenticated, partial, in monitor_child_preauth()
[all …]
Dauth2-chall.c292 int authenticated = 0, res; in input_userauth_info_response() local
329 authenticated = authctxt->valid ? 1 : 0; in input_userauth_info_response()
342 if (authenticated) { in input_userauth_info_response()
350 userauth_finish(authctxt, authenticated, "keyboard-interactive", in input_userauth_info_response()
Dmonitor_wrap.c353 int authenticated = 0; in mm_auth_password() local
364 authenticated = buffer_get_int(&m); in mm_auth_password()
372 __func__, authenticated ? "" : "not "); in mm_auth_password()
373 return (authenticated); in mm_auth_password()
930 int authenticated = 0; in mm_ssh_gssapi_userok() local
938 authenticated = buffer_get_int(&m); in mm_ssh_gssapi_userok()
941 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not "); in mm_ssh_gssapi_userok()
942 return (authenticated); in mm_ssh_gssapi_userok()
Dauth.c288 auth_log(Authctxt *authctxt, int authenticated, int partial, in auth_log() argument
299 if (authenticated == 1 || in auth_log()
310 authmsg = authenticated ? "Accepted" : "Failed"; in auth_log()
326 if (authenticated == 0 && !authctxt->postponed && in auth_log()
333 if (authenticated) in auth_log()
340 if (authenticated == 0 && !authctxt->postponed) in auth_log()
Dauth2-pubkey.c86 int authenticated = 0; in userauth_pubkey() local
177 authenticated = 0; in userauth_pubkey()
181 authenticated = 1; in userauth_pubkey()
210 if (authenticated != 1) in userauth_pubkey()
213 debug2("%s: authenticated %d pkalg %s", __func__, authenticated, pkalg); in userauth_pubkey()
219 return authenticated; in userauth_pubkey()
DPROTOCOL.chacha20poly13051 This document describes the chacha20-poly1305@openssh.com authenticated
17 authenticated encryption mode. The construction used is based on that
Dauth.h54 int authenticated; /* authenticated and alarms cancelled */ member
/external/ppp/pppd/plugins/
Dwinbind.c260 int authenticated = NOT_AUTHENTICATED; /* not auth */ in run_ntlm_auth() local
406 authenticated = AUTHENTICATED; in run_ntlm_auth()
409 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth()
421 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth()
425 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth()
448 if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key) { in run_ntlm_auth()
452 return authenticated; in run_ntlm_auth()
/external/apache-harmony/support/src/test/java/tests/support/
DSupport_HttpServer.java220 boolean authenticated = false, contentLength = false, chunked = false; in run()
236 authenticated = true; in run()
270 authenticateTest(authenticated); in run()
336 private void authenticateTest(boolean authenticated) { in authenticateTest() argument
346 if (!authenticated) { in authenticateTest()
/external/ukey2/
DMETADATA3 "UKEY2 is a Diffie-Hellman based authenticated key exchange protocol."
/external/autotest/client/site_tests/network_RackWiFiConnect/
Dcontrol.proxyNonAuth13 case a non authenticated proxy network.
/external/grpc-grpc/doc/
Dserver_side_auth.md10 … of key-value pairs - the *auth properties*. In addition to that, for authenticated RPCs, the set …
46 …p in mind that as auth interceptors essentially decide which RPCs are authenticated and which are …
/external/u-boot/doc/
DREADME.mxc_hab4 To enable the authenticated or encrypted boot mode of U-Boot, it is
104 An authenticated U-Boot image is used as starting point for
116 The DEK blob is generated by an authenticated U-Boot image with
DREADME.ti-secure4 Secure TI devices require a boot image that is authenticated by ROM
161 be authenticated, as described above, as part of the particular
163 process, the authenticated SPL must authenticate the main u-boot
172 authenticated by the SPL as they are loaded from the FIT image, the
/external/googletest/googletest/scripts/
Dupload.py145 self.authenticated = False
237 self.authenticated = True
310 if not self.authenticated:
373 self.authenticated = True
490 server.authenticated = True
/external/googletest/googlemock/scripts/
Dupload.py145 self.authenticated = False
237 self.authenticated = True
310 if not self.authenticated:
373 self.authenticated = True
490 server.authenticated = True
/external/google-breakpad/src/testing/scripts/
Dupload.py145 self.authenticated = False
237 self.authenticated = True
310 if not self.authenticated:
373 self.authenticated = True
490 server.authenticated = True
/external/google-breakpad/src/testing/gtest/scripts/
Dupload.py145 self.authenticated = False
237 self.authenticated = True
310 if not self.authenticated:
373 self.authenticated = True
490 server.authenticated = True
/external/mesa3d/src/glx/apple/
Dappledri.c231 rep.authenticated = 0;
232 if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.authenticated) {
/external/mesa3d/src/egl/drivers/dri2/
Dplatform_wayland.c1047 dri2_dpy->authenticated = false; in dri2_wl_authenticate()
1053 if (!dri2_dpy->authenticated) in dri2_wl_authenticate()
1057 dri2_dpy->authenticated = true; in dri2_wl_authenticate()
1080 dri2_dpy->authenticated = true; in drm_handle_device()
1124 dri2_dpy->authenticated = true; in drm_handle_authenticated()
1130 .authenticated = drm_handle_authenticated,
1362 if (roundtrip(dri2_dpy) < 0 || !dri2_dpy->authenticated) in dri2_initialize_wayland_drm()

1234