Home
last modified time | relevance | path

Searched refs:authenticated (Results 1 – 25 of 30) sorted by relevance

12

/dragonfly/lib/libtelnet/
H A Dauth.c94 static Authenticator *authenticated = NULL; variable
200 authenticated = NULL; in auth_init()
539 if (!(authenticated = ap)) in auth_finished()
540 authenticated = &NoAuth; in auth_finished()
562 while (!authenticated) in auth_wait()
571 if (!authenticated || authenticated == &NoAuth) in auth_wait()
577 if (authenticated->status) in auth_wait()
578 validuser = (*authenticated->status)(authenticated, in auth_wait()
/dragonfly/crypto/openssh/
H A Dauth2.c274 int r, authenticated = 0; in input_userauth_request() local
346 authenticated = m->userauth(ssh, method); in input_userauth_request()
351 userauth_finish(ssh, authenticated, method, NULL); in input_userauth_request()
370 if (authenticated) { in userauth_finish()
384 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish()
386 authenticated = 0; in userauth_finish()
394 authenticated = 0; in userauth_finish()
403 if (authenticated || partial) in userauth_finish()
410 if (options.use_pam && authenticated) { in userauth_finish()
431 if (authenticated == 1) { in userauth_finish()
[all …]
H A Dauth2-hostbased.c68 int r, pktype, authenticated = 0; in userauth_hostbased() local
148 authenticated = 0; in userauth_hostbased()
153 authenticated = 1; in userauth_hostbased()
155 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased()
158 debug2_f("authenticated %d", authenticated); in userauth_hostbased()
165 return authenticated; in userauth_hostbased()
H A Dauth2-kbdint.c50 int r, authenticated = 0; in userauth_kbdint() local
61 authenticated = auth2_challenge(ssh, devs); in userauth_kbdint()
65 return authenticated; in userauth_kbdint()
H A Dauth2-passwd.c56 int authenticated = 0, r; in userauth_passwd() local
71 authenticated = 1; in userauth_passwd()
73 return authenticated; in userauth_passwd()
H A Dauth2-gss.c257 int r, authenticated; in input_gssapi_exchange_complete() local
270 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_exchange_complete()
277 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete()
286 int r, authenticated = 0; in input_gssapi_mic() local
311 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_mic()
323 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
H A Dauth2-pubkey.c99 int req_presence = 0, req_verify = 0, authenticated = 0; in userauth_pubkey() local
222 authenticated = 0; in userauth_pubkey()
228 authenticated = 1; in userauth_pubkey()
230 if (authenticated == 1 && sig_details != NULL) { in userauth_pubkey()
247 authenticated = 0; in userauth_pubkey()
261 authenticated = 0; in userauth_pubkey()
265 auth2_record_key(authctxt, authenticated, key); in userauth_pubkey()
297 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) { in userauth_pubkey()
299 authenticated = 0; in userauth_pubkey()
301 debug2_f("authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey()
[all …]
H A Dmonitor.c291 while (!authenticated) { in monitor_child_preauth()
306 if (authenticated && in monitor_child_preauth()
310 authenticated = 0; in monitor_child_preauth()
315 if (authenticated) { in monitor_child_preauth()
321 authenticated = 0; in monitor_child_preauth()
341 if (!partial && !authenticated) in monitor_child_preauth()
343 if (authenticated || partial) { in monitor_child_preauth()
897 int r, authenticated; in mm_answer_authpassword() local
928 return (authenticated); in mm_answer_authpassword()
1947 int r, authenticated; in mm_answer_gss_userok() local
[all …]
H A Dauth2-chall.c294 int authenticated = 0, res; in input_userauth_info_response() local
336 authenticated = authctxt->valid ? 1 : 0; in input_userauth_info_response()
349 if (authenticated) { in input_userauth_info_response()
357 userauth_finish(ssh, authenticated, "keyboard-interactive", in input_userauth_info_response()
H A Dauth.c266 auth_log(struct ssh *ssh, int authenticated, int partial, in auth_log() argument
278 if (authenticated == 1 || in auth_log()
289 authmsg = authenticated ? "Accepted" : "Failed"; in auth_log()
310 if (authenticated == 0 && !(authctxt->postponed || partial)) { in auth_log()
325 if (authenticated) in auth_log()
H A Dmonitor_wrap.c460 int r, authenticated = 0; in mm_auth_password() local
477 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_auth_password()
489 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_auth_password()
490 return (authenticated); in mm_auth_password()
1060 int r, authenticated = 0; in mm_ssh_gssapi_userok() local
1069 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_ssh_gssapi_userok()
1073 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_ssh_gssapi_userok()
1074 return (authenticated); in mm_ssh_gssapi_userok()
H A DPROTOCOL.chacha20poly13051 This document describes the chacha20-poly1305@openssh.com authenticated
17 authenticated encryption mode. The construction used is based on that
H A Dauth.h57 int authenticated; /* authenticated and alarms cancelled */ member
H A Dsshd-session.c1304 goto authenticated; in main()
1318 authenticated: in main()
1325 authctxt->authenticated = 1; in main()
H A DPROTOCOL94 1.7 transport: chacha20-poly1305@openssh.com authenticated encryption
96 OpenSSH supports authenticated encryption using ChaCha20 and Poly1305
/dragonfly/sys/dev/drm/
H A Ddrm_ioctl.c192 client->auth = file_priv->authenticated; in drm_getclient()
521 !file_priv->authenticated)) in drm_ioctl_permit()
820 file_priv->authenticated, ioctl->name); in drm_ioctl()
853 file_priv->authenticated, cmd, nr); in drm_ioctl()
H A Ddrm_auth.c89 file->authenticated = 1; in drm_authmagic()
160 fpriv->authenticated = 1; in drm_new_set_master()
H A Ddrm_vm.c62 if (!priv->authenticated) in drm_mmap()
H A Ddrm_sysctl.c288 priv->authenticated ? 'y' : 'n',
H A Ddrm_file.c332 priv->authenticated = capable(CAP_SYS_ADMIN); in drm_open_helper()
/dragonfly/sys/dev/drm/include/drm/
H A Ddrm_file.h165 unsigned authenticated :1; member
/dragonfly/contrib/wpa_supplicant/src/pae/
H A Dieee802_1x_kay.h175 Boolean authenticated; member
H A Dieee802_1x_kay.c1696 kay->authenticated = TRUE; in ieee802_1x_mka_decode_dist_sak_body()
1708 kay->authenticated = FALSE; in ieee802_1x_mka_decode_dist_sak_body()
2370 kay->authenticated = FALSE; in ieee802_1x_kay_decide_macsec_use()
2379 kay->authenticated = TRUE; in ieee802_1x_kay_decide_macsec_use()
2565 kay->authenticated = FALSE; in ieee802_1x_participant_timer()
2622 kay->authenticated = FALSE; in ieee802_1x_participant_timer()
3441 kay->authenticated = FALSE; in ieee802_1x_kay_init()
3942 kay->authenticated ? "Yes" : "No", in ieee802_1x_kay_get_status()
/dragonfly/gnu/usr.bin/rcs/
H A DREFS71 reliable, and authenticated repository access via TCP/IP.
/dragonfly/share/examples/ppp/
H A Dppp.conf.sample616 # we've authenticated ourselves. When this has happened, we wait
658 # Or if we want to allow authenticated clients to specify their own

12