/freebsd/crypto/heimdal/lib/gssapi/mech/ |
H A D | gss_get_name_attribute.c | 39 int *authenticated, in gss_get_name_attribute() argument 50 if (authenticated != NULL) in gss_get_name_attribute() 51 *authenticated = 0; in gss_get_name_attribute() 69 authenticated, in gss_get_name_attribute()
|
H A D | gss_authorize_localname.c | 85 int authenticated = 0, complete = 0; in attr_authorize_localname() local 90 &authenticated, in attr_authorize_localname() 101 if (authenticated && in attr_authorize_localname()
|
H A D | gss_pname_to_uid.c | 77 int authenticated = 0, complete = 0; in attr_pname_to_uid() 89 &authenticated, in attr_pname_to_uid()
|
/freebsd/contrib/telnet/libtelnet/ |
H A D | auth.c | 96 static Authenticator *authenticated = 0; variable 202 authenticated = 0; in auth_init() 541 if (!(authenticated = ap)) in auth_finished() 542 authenticated = &NoAuth; in auth_finished() 564 while (!authenticated) in auth_wait() 573 if (!authenticated || authenticated == &NoAuth) in auth_wait() 579 if (authenticated->status) in auth_wait() 580 validuser = (*authenticated->status)(authenticated, in auth_wait()
|
/freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | auth.c | 98 static Authenticator *authenticated = 0; variable 196 authenticated = 0; in auth_init() 544 if (!(authenticated = ap)) in auth_finished() 545 authenticated = &NoAuth; in auth_finished() 567 while (!authenticated) in auth_wait() 576 if (!authenticated || authenticated == &NoAuth) in auth_wait() 582 if (authenticated->status) in auth_wait() 583 validuser = (*authenticated->status)(authenticated, in auth_wait()
|
/freebsd/crypto/openssh/ |
H A D | auth2.c | 275 int r, authenticated = 0; in input_userauth_request() local 349 authenticated = m->userauth(ssh, method); in input_userauth_request() 351 if (!authctxt->authenticated && strcmp(method, "none") != 0) in input_userauth_request() 354 userauth_finish(ssh, authenticated, method, NULL); in input_userauth_request() 364 userauth_finish(struct ssh *ssh, int authenticated, const char *packet_method, in userauth_finish() argument 373 if (authenticated) { in userauth_finish() 387 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish() 389 authenticated = 0; in userauth_finish() 395 if (authenticated && options.num_auth_methods != 0) { in userauth_finish() 397 authenticated = 0; in userauth_finish() [all …]
|
H A D | auth2-kbdint.c | 49 int r, authenticated = 0; in userauth_kbdint() local 60 authenticated = auth2_challenge(ssh, devs); in userauth_kbdint() 64 return authenticated; in userauth_kbdint()
|
H A D | auth2-passwd.c | 55 int authenticated = 0, r; in userauth_passwd() local 70 authenticated = 1; in userauth_passwd() 72 return authenticated; in userauth_passwd()
|
H A D | auth2-hostbased.c | 67 int r, pktype, authenticated = 0; in userauth_hostbased() local 147 authenticated = 0; in userauth_hostbased() 152 authenticated = 1; in userauth_hostbased() 154 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased() 157 debug2_f("authenticated %d", authenticated); in userauth_hostbased() 164 return authenticated; in userauth_hostbased()
|
H A D | auth2-gss.c | 256 int r, authenticated; in input_gssapi_exchange_complete() local 270 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); in input_gssapi_exchange_complete() 281 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete() 290 int r, authenticated = 0; in input_gssapi_mic() local 316 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); in input_gssapi_mic() 332 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
|
H A D | auth2-pubkey.c | 98 int req_presence = 0, req_verify = 0, authenticated = 0; in userauth_pubkey() local 221 authenticated = 0; in userauth_pubkey() 227 authenticated = 1; in userauth_pubkey() 229 if (authenticated == 1 && sig_details != NULL) { in userauth_pubkey() 246 authenticated = 0; in userauth_pubkey() 260 authenticated = 0; in userauth_pubkey() 264 auth2_record_key(authctxt, authenticated, key); in userauth_pubkey() 296 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) { in userauth_pubkey() 298 authenticated = 0; in userauth_pubkey() 300 debug2_f("authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey() [all …]
|
H A D | monitor.c | 270 int authenticated = 0, partial = 0; in monitor_child_preauth() local 292 while (!authenticated) { in monitor_child_preauth() 298 authenticated = (monitor_read(ssh, pmonitor, in monitor_child_preauth() 303 if (authenticated && in monitor_child_preauth() 307 authenticated = 0; in monitor_child_preauth() 312 if (authenticated) { in monitor_child_preauth() 318 authenticated = 0; in monitor_child_preauth() 321 if (options.use_pam && authenticated) { in monitor_child_preauth() 329 authenticated = mm_answer_pam_account( in monitor_child_preauth() 336 auth_log(ssh, authenticated, partial, in monitor_child_preauth() [all …]
|
H A D | auth2-chall.c | 294 int authenticated = 0, res; in input_userauth_info_response() local 336 authenticated = authctxt->valid ? 1 : 0; in input_userauth_info_response() 349 if (authenticated) { in input_userauth_info_response() 357 userauth_finish(ssh, authenticated, "keyboard-interactive", in input_userauth_info_response()
|
H A D | auth.c | 268 auth_log(struct ssh *ssh, int authenticated, int partial, in auth_log() argument 280 if (authenticated == 1 || in auth_log() 291 authmsg = authenticated ? "Accepted" : "Failed"; in auth_log() 292 if (authenticated) in auth_log() 315 if (authenticated == 0 && !(authctxt->postponed || partial)) { in auth_log() 330 if (authenticated) in auth_log()
|
H A D | monitor_wrap.c | 404 int r, authenticated = 0; in mm_auth_password() local 421 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_auth_password() 433 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_auth_password() 434 return (authenticated); in mm_auth_password() 1004 int r, authenticated = 0; in mm_ssh_gssapi_userok() local 1013 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_ssh_gssapi_userok() 1017 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_ssh_gssapi_userok() 1018 return (authenticated); in mm_ssh_gssapi_userok()
|
H A D | PROTOCOL.chacha20poly1305 | 1 This document describes the chacha20-poly1305@openssh.com authenticated 17 authenticated encryption mode. The construction used is based on that
|
H A D | auth.h | 57 int authenticated; /* authenticated and alarms cancelled */ member
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | CMS_add0_cert.pod | 25 I<cms> must be of type signed data or (authenticated) enveloped data. 33 I<cms> must be of type signed data or (authenticated) enveloped data.
|
H A D | EVP_chacha20.pod | 37 is 256 bits and the IV is 96 bits. This supports additional authenticated data
|
/freebsd/sys/dev/drm2/ |
H A D | drm_fops.c | 198 priv->authenticated = DRM_SUSER(p); in drm_open_helper() 236 priv->authenticated = 1; in drm_open_helper() 405 temp->authenticated = 0; in drm_release()
|
H A D | drm_vm.c | 66 if (file_priv && !file_priv->authenticated) in drm_mmap()
|
H A D | drm_drv.c | 382 file_priv->authenticated); in drm_ioctl() 459 ((ioctl->flags & DRM_AUTH) && !file_priv->authenticated) || in drm_ioctl() 490 file_priv->authenticated, -retcode); in drm_ioctl()
|
H A D | drm_auth.c | 191 file->authenticated = 1; in drm_authmagic()
|
/freebsd/crypto/heimdal/etc/ |
H A D | services.append | 10 klogin 543/tcp # Kerberos authenticated rlogin
|
/freebsd/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 175 unsigned int authenticated; /* The number of times authentication has member
|