Home
last modified time | relevance | path

Searched refs:authenticated (Results 1 – 25 of 115) sorted by relevance

12345

/external/openssh/
Dauth2.c267 int r, authenticated = 0; in input_userauth_request() local
337 authenticated = m->userauth(ssh); in input_userauth_request()
339 if (!authctxt->authenticated) in input_userauth_request()
342 userauth_finish(ssh, authenticated, method, NULL); in input_userauth_request()
352 userauth_finish(struct ssh *ssh, int authenticated, const char *method, in userauth_finish() argument
359 if (!authctxt->valid && authenticated) in userauth_finish()
362 if (authenticated && authctxt->postponed) in userauth_finish()
366 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish()
368 authenticated = 0; in userauth_finish()
374 if (authenticated && options.num_auth_methods != 0) { in userauth_finish()
[all …]
Dauth2-kbdint.c49 int r, authenticated = 0; in userauth_kbdint() local
60 authenticated = auth2_challenge(ssh, devs); in userauth_kbdint()
64 return authenticated; in userauth_kbdint()
Dauth2-passwd.c55 int authenticated = 0, r; in userauth_passwd() local
70 authenticated = 1; in userauth_passwd()
73 return authenticated; in userauth_passwd()
Dauth2-hostbased.c69 int r, pktype, authenticated = 0; in userauth_hostbased() local
150 authenticated = 0; in userauth_hostbased()
155 authenticated = 1; in userauth_hostbased()
157 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased()
160 debug2("%s: authenticated %d", __func__, authenticated); in userauth_hostbased()
167 return authenticated; in userauth_hostbased()
Dauth2-gss.c249 int r, authenticated; in input_gssapi_exchange_complete() local
263 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); in input_gssapi_exchange_complete()
274 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete()
283 int r, authenticated = 0; in input_gssapi_mic() local
309 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); in input_gssapi_mic()
325 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
Dmonitor.c276 int authenticated = 0, partial = 0; in monitor_child_preauth() local
298 while (!authenticated) { in monitor_child_preauth()
304 authenticated = (monitor_read(ssh, pmonitor, in monitor_child_preauth()
309 if (authenticated && in monitor_child_preauth()
314 authenticated = 0; in monitor_child_preauth()
319 if (authenticated) { in monitor_child_preauth()
325 authenticated = 0; in monitor_child_preauth()
328 if (options.use_pam && authenticated) { in monitor_child_preauth()
336 authenticated = mm_answer_pam_account( in monitor_child_preauth()
343 auth_log(ssh, authenticated, partial, in monitor_child_preauth()
[all …]
Dauth2-chall.c295 int authenticated = 0, res; in input_userauth_info_response() local
337 authenticated = authctxt->valid ? 1 : 0; in input_userauth_info_response()
350 if (authenticated) { in input_userauth_info_response()
358 userauth_finish(ssh, authenticated, "keyboard-interactive", in input_userauth_info_response()
Dauth2-pubkey.c100 int req_presence = 0, authenticated = 0; in userauth_pubkey() local
213 authenticated = 0; in userauth_pubkey()
219 authenticated = 1; in userauth_pubkey()
221 if (authenticated == 1 && sig_details != NULL) { in userauth_pubkey()
239 authenticated = 0; in userauth_pubkey()
243 auth2_record_key(authctxt, authenticated, key); in userauth_pubkey()
278 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) { in userauth_pubkey()
280 authenticated = 0; in userauth_pubkey()
282 debug2("%s: authenticated %d pkalg %s", __func__, authenticated, pkalg); in userauth_pubkey()
294 return authenticated; in userauth_pubkey()
Dmonitor_wrap.c393 int r, authenticated = 0; in mm_auth_password() local
410 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_auth_password()
423 __func__, authenticated ? "" : "not "); in mm_auth_password()
424 return (authenticated); in mm_auth_password()
999 int r, authenticated = 0; in mm_ssh_gssapi_userok() local
1008 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_ssh_gssapi_userok()
1012 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not "); in mm_ssh_gssapi_userok()
1013 return (authenticated); in mm_ssh_gssapi_userok()
Dauth.c312 auth_log(struct ssh *ssh, int authenticated, int partial, in auth_log() argument
324 if (authenticated == 1 || in auth_log()
335 authmsg = authenticated ? "Accepted" : "Failed"; in auth_log()
356 if (authenticated == 0 && !authctxt->postponed && in auth_log()
363 if (authenticated) in auth_log()
370 if (authenticated == 0 && !authctxt->postponed) in auth_log()
DPROTOCOL.chacha20poly13051 This document describes the chacha20-poly1305@openssh.com authenticated
17 authenticated encryption mode. The construction used is based on that
/external/ppp/pppd/plugins/
Dwinbind.c260 int authenticated = NOT_AUTHENTICATED; /* not auth */ in run_ntlm_auth() local
406 authenticated = AUTHENTICATED; in run_ntlm_auth()
409 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth()
421 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth()
425 authenticated = NOT_AUTHENTICATED; in run_ntlm_auth()
448 if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key) { in run_ntlm_auth()
452 return authenticated; in run_ntlm_auth()
/external/apache-harmony/support/src/test/java/tests/support/
DSupport_HttpServer.java220 boolean authenticated = false, contentLength = false, chunked = false; in run()
236 authenticated = true; in run()
270 authenticateTest(authenticated); in run()
336 private void authenticateTest(boolean authenticated) { in authenticateTest() argument
346 if (!authenticated) { in authenticateTest()
/external/libwebsockets/minimal-examples/http-server/minimal-http-server-basicauth/
DREADME.md12 ## Discovering the authenticated user
15 contains the authenticated username.
/external/python/cryptography/docs/hazmat/primitives/
Daead.rst32 >>> aad = b"authenticated but unencrypted data"
61 authenticated with the key, but does not need to be encrypted. Can
101 >>> aad = b"authenticated but unencrypted data"
135 authenticated with the key, but is not encrypted. Can be ``None``.
188 >>> aad = b"authenticated but unencrypted data"
224 authenticated with the key, but is not encrypted. Can be ``None``.
Dsymmetric-encryption.rst378 AEAD (authenticated encryption with additional data) mode is a type of
380 authenticating it. Additional unencrypted data may also be authenticated.
448 # associated_data will be authenticated but not encrypted,
471 # Decryption gets us the authenticated plaintext.
478 b"authenticated but not encrypted payload"
483 b"authenticated but not encrypted payload",
637 :meth:`authenticate_additional_data` for adding additional authenticated
644 and authenticated. Do not pass encrypted data to the
820 This is raised if an authenticated encryption tag fails to verify during
/external/ukey2/
DMETADATA3 "UKEY2 is a Diffie-Hellman based authenticated key exchange protocol."
/external/python/google-api-python-client/docs/
Dauth.md3 …ing are accomplished. For all API calls, your application needs to be authenticated. When an API a…
19 …, your application must be authenticated, the user must grant access for your application, and the…
/external/autotest/client/site_tests/network_RackWiFiConnect/
Dcontrol.proxyNonAuth13 case a non authenticated proxy network.
/external/grpc-grpc/doc/
Dserver_side_auth.md10 … of key-value pairs - the *auth properties*. In addition to that, for authenticated RPCs, the set …
46 …p in mind that as auth interceptors essentially decide which RPCs are authenticated and which are …
/external/arm-trusted-firmware/docs/design/
Dauth-framework.rst156 image until either an authenticated image or the ROT is reached. Then the
165 #. Specifying the CoT for each image that needs to be authenticated. Details of
609 authenticated using the ROTPK stored in the platform.
675 authenticated. Each method consists of a type and a list of parameter
702 parameters must be extracted from an image once it has been authenticated.
853 The Trusted Key certificate is authenticated by checking its digital signature
871 Once the signature has been checked and the certificate authenticated, the
881 The **BL31 Key certificate** is authenticated by checking its digital signature
885 has been authenticated, we have to extract the BL31 public key, stored in the
889 The **BL31 certificate** is authenticated by checking its digital signature
[all …]
/external/mesa3d/src/vulkan/device-select-layer/
Ddevice_select_wayland.c77 .authenticated = device_select_drm_handle_authenticated,
/external/igt-gpu-tools/overlay/x11/
Ddri2.c147 return rep.authenticated; in DRI2Authenticate()
/external/mesa3d/src/glx/apple/
Dappledri.c231 rep.authenticated = 0;
232 if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.authenticated) {
/external/googletest/googletest/scripts/
Dupload.py160 self.authenticated = False
252 self.authenticated = True
325 if not self.authenticated:
388 self.authenticated = True
505 server.authenticated = True

12345