/external/openssh/ |
D | auth2.c | 267 int r, authenticated = 0; in input_userauth_request() local 337 authenticated = m->userauth(ssh); in input_userauth_request() 339 if (!authctxt->authenticated) in input_userauth_request() 342 userauth_finish(ssh, authenticated, method, NULL); in input_userauth_request() 352 userauth_finish(struct ssh *ssh, int authenticated, const char *method, in userauth_finish() argument 359 if (!authctxt->valid && authenticated) in userauth_finish() 362 if (authenticated && authctxt->postponed) in userauth_finish() 366 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish() 368 authenticated = 0; in userauth_finish() 374 if (authenticated && options.num_auth_methods != 0) { in userauth_finish() [all …]
|
D | auth2-kbdint.c | 49 int r, authenticated = 0; in userauth_kbdint() local 60 authenticated = auth2_challenge(ssh, devs); in userauth_kbdint() 64 return authenticated; in userauth_kbdint()
|
D | auth2-passwd.c | 55 int authenticated = 0, r; in userauth_passwd() local 70 authenticated = 1; in userauth_passwd() 73 return authenticated; in userauth_passwd()
|
D | auth2-hostbased.c | 69 int r, pktype, authenticated = 0; in userauth_hostbased() local 150 authenticated = 0; in userauth_hostbased() 155 authenticated = 1; in userauth_hostbased() 157 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased() 160 debug2("%s: authenticated %d", __func__, authenticated); in userauth_hostbased() 167 return authenticated; in userauth_hostbased()
|
D | auth2-gss.c | 249 int r, authenticated; in input_gssapi_exchange_complete() local 263 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); in input_gssapi_exchange_complete() 274 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete() 283 int r, authenticated = 0; in input_gssapi_mic() local 309 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); in input_gssapi_mic() 325 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
|
D | monitor.c | 276 int authenticated = 0, partial = 0; in monitor_child_preauth() local 298 while (!authenticated) { in monitor_child_preauth() 304 authenticated = (monitor_read(ssh, pmonitor, in monitor_child_preauth() 309 if (authenticated && in monitor_child_preauth() 314 authenticated = 0; in monitor_child_preauth() 319 if (authenticated) { in monitor_child_preauth() 325 authenticated = 0; in monitor_child_preauth() 328 if (options.use_pam && authenticated) { in monitor_child_preauth() 336 authenticated = mm_answer_pam_account( in monitor_child_preauth() 343 auth_log(ssh, authenticated, partial, in monitor_child_preauth() [all …]
|
D | auth2-chall.c | 295 int authenticated = 0, res; in input_userauth_info_response() local 337 authenticated = authctxt->valid ? 1 : 0; in input_userauth_info_response() 350 if (authenticated) { in input_userauth_info_response() 358 userauth_finish(ssh, authenticated, "keyboard-interactive", in input_userauth_info_response()
|
D | auth2-pubkey.c | 100 int req_presence = 0, authenticated = 0; in userauth_pubkey() local 213 authenticated = 0; in userauth_pubkey() 219 authenticated = 1; in userauth_pubkey() 221 if (authenticated == 1 && sig_details != NULL) { in userauth_pubkey() 239 authenticated = 0; in userauth_pubkey() 243 auth2_record_key(authctxt, authenticated, key); in userauth_pubkey() 278 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) { in userauth_pubkey() 280 authenticated = 0; in userauth_pubkey() 282 debug2("%s: authenticated %d pkalg %s", __func__, authenticated, pkalg); in userauth_pubkey() 294 return authenticated; in userauth_pubkey()
|
D | monitor_wrap.c | 393 int r, authenticated = 0; in mm_auth_password() local 410 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_auth_password() 423 __func__, authenticated ? "" : "not "); in mm_auth_password() 424 return (authenticated); in mm_auth_password() 999 int r, authenticated = 0; in mm_ssh_gssapi_userok() local 1008 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_ssh_gssapi_userok() 1012 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not "); in mm_ssh_gssapi_userok() 1013 return (authenticated); in mm_ssh_gssapi_userok()
|
D | auth.c | 312 auth_log(struct ssh *ssh, int authenticated, int partial, in auth_log() argument 324 if (authenticated == 1 || in auth_log() 335 authmsg = authenticated ? "Accepted" : "Failed"; in auth_log() 356 if (authenticated == 0 && !authctxt->postponed && in auth_log() 363 if (authenticated) in auth_log() 370 if (authenticated == 0 && !authctxt->postponed) in auth_log()
|
D | PROTOCOL.chacha20poly1305 | 1 This document describes the chacha20-poly1305@openssh.com authenticated 17 authenticated encryption mode. The construction used is based on that
|
/external/ppp/pppd/plugins/ |
D | winbind.c | 260 int authenticated = NOT_AUTHENTICATED; /* not auth */ in run_ntlm_auth() local 406 authenticated = AUTHENTICATED; in run_ntlm_auth() 409 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth() 421 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth() 425 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth() 448 if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key) { in run_ntlm_auth() 452 return authenticated; in run_ntlm_auth()
|
/external/apache-harmony/support/src/test/java/tests/support/ |
D | Support_HttpServer.java | 220 boolean authenticated = false, contentLength = false, chunked = false; in run() 236 authenticated = true; in run() 270 authenticateTest(authenticated); in run() 336 private void authenticateTest(boolean authenticated) { in authenticateTest() argument 346 if (!authenticated) { in authenticateTest()
|
/external/libwebsockets/minimal-examples/http-server/minimal-http-server-basicauth/ |
D | README.md | 12 ## Discovering the authenticated user 15 contains the authenticated username.
|
/external/python/cryptography/docs/hazmat/primitives/ |
D | aead.rst | 32 >>> aad = b"authenticated but unencrypted data" 61 authenticated with the key, but does not need to be encrypted. Can 101 >>> aad = b"authenticated but unencrypted data" 135 authenticated with the key, but is not encrypted. Can be ``None``. 188 >>> aad = b"authenticated but unencrypted data" 224 authenticated with the key, but is not encrypted. Can be ``None``.
|
D | symmetric-encryption.rst | 378 AEAD (authenticated encryption with additional data) mode is a type of 380 authenticating it. Additional unencrypted data may also be authenticated. 448 # associated_data will be authenticated but not encrypted, 471 # Decryption gets us the authenticated plaintext. 478 b"authenticated but not encrypted payload" 483 b"authenticated but not encrypted payload", 637 :meth:`authenticate_additional_data` for adding additional authenticated 644 and authenticated. Do not pass encrypted data to the 820 This is raised if an authenticated encryption tag fails to verify during
|
/external/ukey2/ |
D | METADATA | 3 "UKEY2 is a Diffie-Hellman based authenticated key exchange protocol."
|
/external/python/google-api-python-client/docs/ |
D | auth.md | 3 …ing are accomplished. For all API calls, your application needs to be authenticated. When an API a… 19 …, your application must be authenticated, the user must grant access for your application, and the…
|
/external/autotest/client/site_tests/network_RackWiFiConnect/ |
D | control.proxyNonAuth | 13 case a non authenticated proxy network.
|
/external/grpc-grpc/doc/ |
D | server_side_auth.md | 10 … of key-value pairs - the *auth properties*. In addition to that, for authenticated RPCs, the set … 46 …p in mind that as auth interceptors essentially decide which RPCs are authenticated and which are …
|
/external/arm-trusted-firmware/docs/design/ |
D | auth-framework.rst | 156 image until either an authenticated image or the ROT is reached. Then the 165 #. Specifying the CoT for each image that needs to be authenticated. Details of 609 authenticated using the ROTPK stored in the platform. 675 authenticated. Each method consists of a type and a list of parameter 702 parameters must be extracted from an image once it has been authenticated. 853 The Trusted Key certificate is authenticated by checking its digital signature 871 Once the signature has been checked and the certificate authenticated, the 881 The **BL31 Key certificate** is authenticated by checking its digital signature 885 has been authenticated, we have to extract the BL31 public key, stored in the 889 The **BL31 certificate** is authenticated by checking its digital signature [all …]
|
/external/mesa3d/src/vulkan/device-select-layer/ |
D | device_select_wayland.c | 77 .authenticated = device_select_drm_handle_authenticated,
|
/external/igt-gpu-tools/overlay/x11/ |
D | dri2.c | 147 return rep.authenticated; in DRI2Authenticate()
|
/external/mesa3d/src/glx/apple/ |
D | appledri.c | 231 rep.authenticated = 0; 232 if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.authenticated) {
|
/external/googletest/googletest/scripts/ |
D | upload.py | 160 self.authenticated = False 252 self.authenticated = True 325 if not self.authenticated: 388 self.authenticated = True 505 server.authenticated = True
|