/dragonfly/lib/libtelnet/ |
H A D | auth.c | 94 static Authenticator *authenticated = NULL; variable 200 authenticated = NULL; in auth_init() 539 if (!(authenticated = ap)) in auth_finished() 540 authenticated = &NoAuth; in auth_finished() 562 while (!authenticated) in auth_wait() 571 if (!authenticated || authenticated == &NoAuth) in auth_wait() 577 if (authenticated->status) in auth_wait() 578 validuser = (*authenticated->status)(authenticated, in auth_wait()
|
/dragonfly/crypto/openssh/ |
H A D | auth2.c | 274 int r, authenticated = 0; in input_userauth_request() local 346 authenticated = m->userauth(ssh, method); in input_userauth_request() 351 userauth_finish(ssh, authenticated, method, NULL); in input_userauth_request() 370 if (authenticated) { in userauth_finish() 384 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish() 386 authenticated = 0; in userauth_finish() 394 authenticated = 0; in userauth_finish() 403 if (authenticated || partial) in userauth_finish() 410 if (options.use_pam && authenticated) { in userauth_finish() 431 if (authenticated == 1) { in userauth_finish() [all …]
|
H A D | auth2-hostbased.c | 68 int r, pktype, authenticated = 0; in userauth_hostbased() local 148 authenticated = 0; in userauth_hostbased() 153 authenticated = 1; in userauth_hostbased() 155 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased() 158 debug2_f("authenticated %d", authenticated); in userauth_hostbased() 165 return authenticated; in userauth_hostbased()
|
H A D | auth2-kbdint.c | 50 int r, authenticated = 0; in userauth_kbdint() local 61 authenticated = auth2_challenge(ssh, devs); in userauth_kbdint() 65 return authenticated; in userauth_kbdint()
|
H A D | auth2-passwd.c | 56 int authenticated = 0, r; in userauth_passwd() local 71 authenticated = 1; in userauth_passwd() 73 return authenticated; in userauth_passwd()
|
H A D | auth2-gss.c | 257 int r, authenticated; in input_gssapi_exchange_complete() local 270 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_exchange_complete() 277 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete() 286 int r, authenticated = 0; in input_gssapi_mic() local 311 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_mic() 323 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
|
H A D | auth2-pubkey.c | 99 int req_presence = 0, req_verify = 0, authenticated = 0; in userauth_pubkey() local 222 authenticated = 0; in userauth_pubkey() 228 authenticated = 1; in userauth_pubkey() 230 if (authenticated == 1 && sig_details != NULL) { in userauth_pubkey() 247 authenticated = 0; in userauth_pubkey() 261 authenticated = 0; in userauth_pubkey() 265 auth2_record_key(authctxt, authenticated, key); in userauth_pubkey() 297 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) { in userauth_pubkey() 299 authenticated = 0; in userauth_pubkey() 301 debug2_f("authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey() [all …]
|
H A D | monitor.c | 291 while (!authenticated) { in monitor_child_preauth() 306 if (authenticated && in monitor_child_preauth() 310 authenticated = 0; in monitor_child_preauth() 315 if (authenticated) { in monitor_child_preauth() 321 authenticated = 0; in monitor_child_preauth() 341 if (!partial && !authenticated) in monitor_child_preauth() 343 if (authenticated || partial) { in monitor_child_preauth() 897 int r, authenticated; in mm_answer_authpassword() local 928 return (authenticated); in mm_answer_authpassword() 1947 int r, authenticated; in mm_answer_gss_userok() local [all …]
|
H A D | auth2-chall.c | 294 int authenticated = 0, res; in input_userauth_info_response() local 336 authenticated = authctxt->valid ? 1 : 0; in input_userauth_info_response() 349 if (authenticated) { in input_userauth_info_response() 357 userauth_finish(ssh, authenticated, "keyboard-interactive", in input_userauth_info_response()
|
H A D | auth.c | 266 auth_log(struct ssh *ssh, int authenticated, int partial, in auth_log() argument 278 if (authenticated == 1 || in auth_log() 289 authmsg = authenticated ? "Accepted" : "Failed"; in auth_log() 310 if (authenticated == 0 && !(authctxt->postponed || partial)) { in auth_log() 325 if (authenticated) in auth_log()
|
H A D | monitor_wrap.c | 460 int r, authenticated = 0; in mm_auth_password() local 477 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_auth_password() 489 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_auth_password() 490 return (authenticated); in mm_auth_password() 1060 int r, authenticated = 0; in mm_ssh_gssapi_userok() local 1069 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_ssh_gssapi_userok() 1073 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_ssh_gssapi_userok() 1074 return (authenticated); in mm_ssh_gssapi_userok()
|
H A D | PROTOCOL.chacha20poly1305 | 1 This document describes the chacha20-poly1305@openssh.com authenticated 17 authenticated encryption mode. The construction used is based on that
|
H A D | auth.h | 57 int authenticated; /* authenticated and alarms cancelled */ member
|
H A D | sshd-session.c | 1304 goto authenticated; in main() 1318 authenticated: in main() 1325 authctxt->authenticated = 1; in main()
|
H A D | PROTOCOL | 94 1.7 transport: chacha20-poly1305@openssh.com authenticated encryption 96 OpenSSH supports authenticated encryption using ChaCha20 and Poly1305
|
/dragonfly/sys/dev/drm/ |
H A D | drm_ioctl.c | 192 client->auth = file_priv->authenticated; in drm_getclient() 521 !file_priv->authenticated)) in drm_ioctl_permit() 820 file_priv->authenticated, ioctl->name); in drm_ioctl() 853 file_priv->authenticated, cmd, nr); in drm_ioctl()
|
H A D | drm_auth.c | 89 file->authenticated = 1; in drm_authmagic() 160 fpriv->authenticated = 1; in drm_new_set_master()
|
H A D | drm_vm.c | 62 if (!priv->authenticated) in drm_mmap()
|
H A D | drm_sysctl.c | 288 priv->authenticated ? 'y' : 'n',
|
H A D | drm_file.c | 332 priv->authenticated = capable(CAP_SYS_ADMIN); in drm_open_helper()
|
/dragonfly/sys/dev/drm/include/drm/ |
H A D | drm_file.h | 165 unsigned authenticated :1; member
|
/dragonfly/contrib/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.h | 175 Boolean authenticated; member
|
H A D | ieee802_1x_kay.c | 1696 kay->authenticated = TRUE; in ieee802_1x_mka_decode_dist_sak_body() 1708 kay->authenticated = FALSE; in ieee802_1x_mka_decode_dist_sak_body() 2370 kay->authenticated = FALSE; in ieee802_1x_kay_decide_macsec_use() 2379 kay->authenticated = TRUE; in ieee802_1x_kay_decide_macsec_use() 2565 kay->authenticated = FALSE; in ieee802_1x_participant_timer() 2622 kay->authenticated = FALSE; in ieee802_1x_participant_timer() 3441 kay->authenticated = FALSE; in ieee802_1x_kay_init() 3942 kay->authenticated ? "Yes" : "No", in ieee802_1x_kay_get_status()
|
/dragonfly/gnu/usr.bin/rcs/ |
H A D | REFS | 71 reliable, and authenticated repository access via TCP/IP.
|
/dragonfly/share/examples/ppp/ |
H A D | ppp.conf.sample | 616 # we've authenticated ourselves. When this has happened, we wait 658 # Or if we want to allow authenticated clients to specify their own
|