/dports/security/sudo/sudo-1.9.8p2/plugins/sudoers/auth/ |
H A D | passwd.c | 55 debug_return_int(auth->data ? AUTH_SUCCESS : AUTH_FATAL); in sudo_passwd_init() 70 debug_return_int(pw_epasswd[0] ? AUTH_FAILURE : AUTH_SUCCESS); in sudo_passwd_verify() 95 debug_return_int(matched ? AUTH_SUCCESS : AUTH_FAILURE); in sudo_passwd_verify() 108 debug_return_int(matched ? AUTH_SUCCESS : AUTH_FAILURE); in sudo_passwd_verify() 121 debug_return_int(AUTH_SUCCESS); in sudo_passwd_cleanup()
|
H A D | secureware.c | 66 debug_return_int(auth->data ? AUTH_SUCCESS : AUTH_FATAL); in sudo_secureware_init() 78 debug_return_int(pw_epasswd[0] ? AUTH_FAILURE : AUTH_SUCCESS); in sudo_secureware_verify() 94 debug_return_int(AUTH_SUCCESS); in sudo_secureware_verify() 106 debug_return_int(AUTH_SUCCESS); in sudo_secureware_cleanup()
|
H A D | sia.c | 74 debug_return_int(AUTH_SUCCESS); in sudo_sia_setup() 96 debug_return_int(AUTH_SUCCESS); in sudo_sia_verify() 111 debug_return_int(AUTH_SUCCESS); in sudo_sia_cleanup() 145 status = AUTH_SUCCESS; in sudo_sia_begin_session()
|
H A D | aix_auth.c | 139 if (sudo_pam_init_quiet(pw, auth) == AUTH_SUCCESS) { in sudo_aix_init() 145 debug_return_int(AUTH_SUCCESS); in sudo_aix_init() 236 int ret = AUTH_SUCCESS; in sudo_aix_verify() 261 if (ret == AUTH_SUCCESS) { in sudo_aix_verify() 305 debug_return_int(AUTH_SUCCESS); in sudo_aix_cleanup()
|
H A D | bsdauth.c | 99 debug_return_int(AUTH_SUCCESS); in bsdauth_init() 161 debug_return_int(AUTH_SUCCESS); in bsdauth_verify() 184 debug_return_int(AUTH_SUCCESS); in bsdauth_approval() 202 debug_return_int(AUTH_SUCCESS); in bsdauth_cleanup()
|
H A D | securid5.c | 70 debug_return_int(AUTH_SUCCESS); in sudo_securid_init() 108 debug_return_int(AUTH_SUCCESS); in sudo_securid_setup() 188 ret = AUTH_SUCCESS; in sudo_securid_verify()
|
H A D | fwtk.c | 73 debug_return_int(AUTH_SUCCESS); in sudo_fwtk_init() 127 error = AUTH_SUCCESS; in sudo_fwtk_verify() 147 debug_return_int(AUTH_SUCCESS); in sudo_fwtk_cleanup()
|
H A D | kerb5.c | 127 debug_return_int(AUTH_SUCCESS); in sudo_krb5_setup() 177 debug_return_int(error ? AUTH_FAILURE : AUTH_SUCCESS); in sudo_krb5_init() 195 debug_return_int(error ? AUTH_FAILURE : AUTH_SUCCESS); in sudo_krb5_verify() 261 debug_return_int(error ? AUTH_FAILURE : AUTH_SUCCESS); in sudo_krb5_verify() 285 debug_return_int(AUTH_SUCCESS); in sudo_krb5_cleanup()
|
H A D | afs.c | 62 debug_return_int(AUTH_SUCCESS); in sudo_afs_verify() 75 debug_return_int(AUTH_SUCCESS); in sudo_afs_verify()
|
H A D | pam.c | 203 debug_return_int(AUTH_SUCCESS); in sudo_pam_init2() 269 debug_return_int(AUTH_SUCCESS); in sudo_pam_init2() 328 debug_return_int(AUTH_SUCCESS); in sudo_pam_verify() 347 int rc, status = AUTH_SUCCESS; in sudo_pam_approval() 423 debug_return_int(*pam_status == PAM_SUCCESS ? AUTH_SUCCESS : AUTH_FAILURE); in sudo_pam_cleanup() 429 int rc, status = AUTH_SUCCESS; in sudo_pam_begin_session() 542 int rc, status = AUTH_SUCCESS; in sudo_pam_end_session()
|
H A D | rfc1938.c | 125 debug_return_int(AUTH_SUCCESS); in sudo_rfc1938_setup() 134 debug_return_int(AUTH_SUCCESS); in sudo_rfc1938_verify()
|
H A D | sudo_auth.c | 104 int status = AUTH_SUCCESS; in sudo_auth_init() 181 if (status != AUTH_SUCCESS) { in sudo_auth_approval() 341 case AUTH_SUCCESS: in verify_user() 374 if (status != AUTH_SUCCESS) { in sudo_auth_begin_session()
|
H A D | dce.c | 165 debug_return_int(AUTH_SUCCESS); in sudo_dce_verify()
|
H A D | sudo_auth.h | 23 #define AUTH_SUCCESS 0 macro
|
/dports/security/openvpn-auth-script/openvpn-auth-script-1.0.0.3/examples/ |
H A D | external_script | 3 AUTH_SUCCESS = "1" 28 respond_with(AUTH_SUCCESS) if challenge_response == "root" 31 respond_with(AUTH_SUCCESS)
|
/dports/net/pichi/pichi-1.4.0/src/net/ |
H A D | socks5.cpp | 33 static auto const AUTH_SUCCESS = array{0x01_u8, 0x00_u8}; 45 static uint8_t const AUTH_SUCCESS[] = {0x01_u8, 0x00_u8}; variable 112 write(stream_, AUTH_SUCCESS, yield); in authenticate()
|
/dports/emulators/mtools/mtools-4.0.26/ |
H A D | floppyd_io.h | 59 AUTH_SUCCESS, enumerator
|
H A D | floppyd_installtest.c | 105 if (errcode != AUTH_SUCCESS) { in authenticate_to_floppyd()
|
H A D | floppyd.c | 448 put_dword(reply, 0, AUTH_SUCCESS); in do_auth() 455 put_dword(reply, 0, AUTH_SUCCESS); in do_auth() 545 put_dword(reply, 0, AUTH_SUCCESS); in do_auth()
|
/dports/comms/conserver-com/conserver-8.2.4/conserver/ |
H A D | group.h | 47 #define AUTH_SUCCESS 0 /* ok */ macro
|
/dports/www/flexget/Flexget-3.2.18/flexget/ |
H A D | ipc.py | 25 AUTH_SUCCESS = b'authentication success' variable 151 channel.send(AUTH_SUCCESS)
|
/dports/devel/hs-git-annex/git-annex-8.20210903/P2P/ |
H A D | Protocol.hs | 72 | AUTH_SUCCESS UUID -- uuid of the remote peer constructor 96 formatMessage (AUTH_SUCCESS uuid) = ["AUTH-SUCCESS", Proto.serialize uuid] 120 parseCommand "AUTH-SUCCESS" = Proto.parse1 AUTH_SUCCESS 308 Just (AUTH_SUCCESS theiruuid) -> do 422 net $ sendMessage (AUTH_SUCCESS myuuid)
|
/dports/devel/hs-git-annex/git-annex-8.20210903/Command/ |
H A D | P2PStdIO.hs | 41 P2P.net $ P2P.sendMessage (P2P.AUTH_SUCCESS myuuid)
|
/dports/net/nss_ldap/nss_ldap-265/ |
H A D | aix_authmeth.c | 226 rc = AUTH_SUCCESS; in _nss_ldap_authenticate() 830 return AUTH_SUCCESS; in _nss_ldap_getentry() 959 return AUTH_SUCCESS; in _nss_ldap_getgrusers() 1026 return AUTH_SUCCESS; in nss_ldap_initialize()
|
/dports/comms/kermit/kermit-9.0.305.04/ |
H A D | ckuath.c | 2044 if (r != AUTH_SUCCESS) { 3338 return AUTH_SUCCESS; 3559 return(AUTH_SUCCESS); 4008 return AUTH_SUCCESS; 4042 return AUTH_SUCCESS; 4363 return(AUTH_SUCCESS); 4988 return AUTH_SUCCESS; 5069 return AUTH_SUCCESS; 5079 return AUTH_SUCCESS; 5101 return AUTH_SUCCESS; [all …]
|