/dports/security/duo/duo_unix-1.11.4/tests/ |
H A D | pam_duo-4.t | 42 …$ for user in preauth-ok-missing_response preauth-fail-missing_response preauth-bad-stat preauth-f… 49 [4] Aborted Duo login for 'preauth-deny': preauth-denied 50 preauth-denied 51 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 53 …$ for user in preauth-ok-missing_response preauth-fail-missing_response preauth-bad-stat preauth-f… 60 [4] Aborted Duo login for 'preauth-deny': preauth-denied 61 preauth-denied 62 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 71 [4] Skipped Duo login for 'preauth-allow' from %s: preauth-allowed 84 [4] Skipped Duo login for 'preauth-allow': preauth-allowed [all …]
|
H A D | groups-0.t | 11 $ env UID=1001 ./groups.py -d -c confs/mockduo_users.conf -f preauth-allow true 12 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 14 $ env UID=1000 ./groups.py -d -c confs/mockduo_users.conf -f preauth-allow true 15 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 16 $ env UID=1002 ./groups.py -d -c confs/mockduo_users.conf -f preauth-allow true 17 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 22 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 24 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 27 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 29 [4] Skipped Duo login for 'preauth-allow': preauth-allowed [all …]
|
H A D | login_duo-4.t | 54 …$ for user in preauth-ok-missing_response preauth-fail-missing_response preauth-bad-stat preauth-f… 59 [4] Aborted Duo login for 'preauth-deny': preauth-denied 60 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 62 …$ for user in preauth-ok-missing_response preauth-fail-missing_response preauth-bad-stat preauth-f… 67 [4] Aborted Duo login for 'preauth-deny': preauth-denied 68 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 74 [4] Skipped Duo login for 'preauth-allow' from 1.2.3.4: preauth-allowed 76 [4] Skipped Duo login for 'preauth-allow' from nowhere: preauth-allowed 77 [4] Skipped Duo login for 'preauth-allow' from %s: preauth-allowed 78 [4] Skipped Duo login for 'preauth-allow' from !@#$%^&*()_+<>{}|;': preauth-allowed [all …]
|
H A D | groups-1.t | 10 $ env UID=1003 ./groups.py -d -c confs/mockduo_users.conf -f preauth-allow true 11 [6] User preauth-allow bypassed Duo 2FA due to user's UNIX group 12 $ env UID=1004 ./groups.py -d -c confs/mockduo_users.conf -f preauth-allow true 13 [6] User preauth-allow bypassed Duo 2FA due to user's UNIX group 16 $ env UID=1004 ./groups.py -d -c confs/mockduo_users_admins.conf -f preauth-allow true 17 [6] User preauth-allow bypassed Duo 2FA due to user's UNIX group 20 $ env UID=1000 ./groups.py -d -c confs/mockduo_admins_no_users.conf -f preauth-allow true 21 [6] User preauth-allow bypassed Duo 2FA due to user's UNIX group 23 [6] User preauth-allow bypassed Duo 2FA due to user's UNIX group 25 [6] User preauth-allow bypassed Duo 2FA due to user's UNIX group [all …]
|
H A D | groups-2.t | 10 $ env UID=1001 ./groups.py -d -c confs/mockduo_space_users.conf -f preauth-allow true 11 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 14 $ env UID=1004 ./groups.py -d -c confs/mockduo_space_users.conf -f preauth-allow true 15 [4] Skipped Duo login for 'preauth-allow': preauth-allowed 18 $ env UID=1002 ./groups.py -d -c confs/mockduo_space_users.conf -f preauth-allow true 19 [4] Skipped Duo login for 'preauth-allow': preauth-allowed
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/vault/vault-0.6.0/helper/mfa/duo/ |
H A D | duo.go | 74 preauth, err := duoAuthClient.Preauth( 79 if err != nil || preauth == nil { 83 if preauth.StatResult.Stat != "OK" { 85 if preauth.StatResult.Message != nil { 86 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 88 if preauth.StatResult.Message_Detail != nil { 94 switch preauth.Response.Result { 98 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 101 preauth.Response.Status_Msg, 102 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/misc/concourse/vault-bdd38fca2cff/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/security/vault/vault-1.8.2/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/sysutils/helmfile/vault-f6547fa8e820/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/sysutils/istio/vault-sdk-v0.1.12/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/helper/mfa/duo/ |
H A D | duo.go | 75 preauth, err := duoAuthClient.Preauth( 80 if err != nil || preauth == nil { 84 if preauth.StatResult.Stat != "OK" { 86 if preauth.StatResult.Message != nil { 87 errorMsg = errorMsg + ": " + *preauth.StatResult.Message 89 if preauth.StatResult.Message_Detail != nil { 95 switch preauth.Response.Result { 99 return logical.ErrorResponse(preauth.Response.Status_Msg), nil 102 preauth.Response.Status_Msg, 103 preauth.Response.Enroll_Portal_Url)), nil [all …]
|
/dports/security/py-fail2ban/fail2ban-0.11.2/fail2ban/tests/files/logs/ |
H A D | sshd-journal | 31 srv sshd[1643]: ROOT LOGIN REFUSED FROM 1.2.3.4 port 12345 [preauth] 99 srv sshd[3719]: input_userauth_request: invalid user root [preauth] 114 srv sshd[2364]: input_userauth_request: invalid user root [preauth] 173 srv sshd[32310]: Connection closed by 192.0.2.111 [preauth] 175 srv sshd[32310]: Connection closed by 192.0.2.111 [preauth] 180 srv sshd[8148]: Connection closed by 61.0.0.1 [preauth] 214 srv sshd[29116]: input_userauth_request: invalid user root [preauth] 222 srv sshd[2716]: Connection closed by 192.0.2.112 [preauth] 293 srv sshd[28972]: Connection reset by 192.0.2.39 port 14282 [preauth] 305 srv sshd[2717]: Connection closed by 192.0.2.212 [preauth] [all …]
|
H A D | sshd | 27 Jan 5 01:31:41 www sshd[1643]: ROOT LOGIN REFUSED FROM 1.2.3.4 port 12345 [preauth] 98 Apr 24 01:39:19 host sshd[3719]: input_userauth_request: invalid user root [preauth] 113 May 27 00:16:33 host sshd[2364]: input_userauth_request: invalid user root [preauth] 172 Nov 28 09:16:05 srv sshd[32310]: Connection closed by 192.0.2.111 [preauth] 174 Nov 28 09:16:05 srv sshd[32310]: Connection closed by 192.0.2.111 [preauth] 179 Nov 23 21:50:37 sshd[8148]: Connection closed by 61.0.0.1 [preauth] 213 Apr 27 13:02:04 host sshd[29116]: input_userauth_request: invalid user root [preauth] 297 Mar 15 09:20:57 host sshd[28972]: Connection reset by 192.0.2.39 port 14282 [preauth] 319 Mar 15 09:21:01 host sshd[2717]: Connection closed by 192.0.2.212 [preauth] 321 Mar 15 09:21:02 host sshd[2717]: Connection closed by 192.0.2.212 [preauth] [all …]
|
/dports/net/kimap/kimap-21.12.3/autotests/ |
H A D | deletejobtest.cpp | 30 scenario << FakeServer::preauth() << "C: A000001 DELETE \"foo\"" in testDelete_data() 35 scenario << FakeServer::preauth() << "C: A000001 DELETE \"foo-BAD\"" in testDelete_data() 40 scenario << FakeServer::preauth() << "C: A000001 DELETE \"foo\"" in testDelete_data() 45 scenario << FakeServer::preauth() << "C: A000001 DELETE \"foo-IGNOREDCODE\"" in testDelete_data() 50 scenario << FakeServer::preauth() << "C: A000001 DELETE \"foo-NONEXISTENT\"" in testDelete_data() 55 scenario << FakeServer::preauth() << "C: A000001 DELETE \"foo/bar\"" in testDelete_data()
|
H A D | createjobtest.cpp | 30 scenario << FakeServer::preauth() << "C: A000001 CREATE \"INBOX\"" in testCreate_data() 35 scenario << FakeServer::preauth() << "C: A000001 CREATE \"INBOX-FAIL-BAD\"" in testCreate_data() 40 scenario << FakeServer::preauth() << "C: A000001 CREATE \"INBOX-FAIL-NO\"" in testCreate_data() 45 scenario << FakeServer::preauth() << "C: A000001 CREATE \"INBOX-FAIL-IGNOREDCODE\"" in testCreate_data() 50 scenario << FakeServer::preauth() << "C: A000001 CREATE \"INBOX-ALREADYEXISTS\"" in testCreate_data()
|
H A D | searchjobtest.cpp | 41 … scenario << FakeServer::preauth() << "C: A000001 UID SEARCH HEADER Message-Id <12345678@mail.box>" in testSearch_data() 50 …scenario << FakeServer::preauth() << "C: A000001 SEARCH OR (NEW) (HEADER Message-Id <12345678@mail… in testSearch_data() 59 … scenario << FakeServer::preauth() << "C: A000001 SEARCH TO {25}\r\n<testuser@kde.testserver>" in testSearch_data() 67 scenario << FakeServer::preauth() << "C: A000001 UID SEARCH NOT (NEW)" in testSearch_data() 118 …scenario << FakeServer::preauth() << "C: A000001 UID SEARCH HEADER Message-Id \"<12345678@mail.box… in testSearchTerm_data() 127 …scenario << FakeServer::preauth() << "C: A000001 SEARCH OR NEW HEADER Message-Id \"<12345678@mail.… in testSearchTerm_data() 139 … scenario << FakeServer::preauth() << "C: A000001 SEARCH TO \"<testuser@kde.testserver>\"" in testSearchTerm_data() 146 scenario << FakeServer::preauth() << "C: A000001 UID SEARCH NOT NEW" in testSearchTerm_data() 155 << FakeServer::preauth() in testSearchTerm_data()
|
H A D | expungejobtest.cpp | 29 scenario << FakeServer::preauth() << "C: A000001 EXPUNGE" in testDelete_data() 37 scenario << FakeServer::preauth() << "C: A000001 EXPUNGE" in testDelete_data() 43 scenario << FakeServer::preauth() << "C: A000001 EXPUNGE" in testDelete_data() 48 scenario << FakeServer::preauth() << "C: A000001 EXPUNGE" in testDelete_data() 53 scenario << FakeServer::preauth() << "C: A000001 EXPUNGE" in testDelete_data()
|
H A D | listjobtest.cpp | 36 scenario << FakeServer::preauth() << "C: A000001 LIST \"\" *" in testList_data() 61 scenario << FakeServer::preauth() << "C: A000001 LIST \"\" *" in testList_data() 85 scenario << FakeServer::preauth() << "C: A000001 LSUB \"\" *" in testList_data() 113 scenario << FakeServer::preauth() << "C: A000001 LSUB \"\" *" in testList_data() 141 scenario << FakeServer::preauth() << "C: A000001 LIST \"\" *" in testList_data() 152 scenario << FakeServer::preauth() << "C: A000001 LIST \"\" *" in testList_data() 163 scenario << FakeServer::preauth() << "C: A000001 LIST \"\" *" in testList_data() 169 scenario << FakeServer::preauth() << "C: A000001 LIST \"\" *" in testList_data()
|
/dports/net/samba412/samba-4.12.15/source4/heimdal/lib/krb5/ |
H A D | get_in_tkt.c | 151 const krb5_preauthdata *preauth, in init_as_req() argument 248 if(preauth != NULL) { in init_as_req() 258 for(i = 0; i < preauth->len; i++) { in init_as_req() 326 krb5_preauthdata **preauth) in set_ptypes() argument 344 *preauth = &preauth2; in set_ptypes() 345 ALLOC_SEQ(*preauth, 1); in set_ptypes() 349 &(*preauth)->val[0].info, in set_ptypes() 369 const krb5_preauthdata *preauth, in krb5_get_in_cred() argument 406 preauth, in krb5_get_in_cred() 446 if (!ptypes && !preauth in krb5_get_in_cred() [all …]
|