/titanic_41/usr/src/cmd/ssh/sshd/ |
H A D | auth1.c | 76 int authenticated = 0; in do_authloop() local 109 authenticated = 0; in do_authloop() 139 authenticated = 1; in do_authloop() 160 authenticated = 1; in do_authloop() 210 authenticated = auth_rhosts(pw, client_user); in do_authloop() 239 authenticated = auth_rhosts_rsa(pw, client_user, in do_authloop() 256 authenticated = auth_rsa(pw, n); in do_authloop() 278 authenticated = in do_authloop() 306 authenticated = verify_response(authctxt, response); in do_authloop() 326 if (!authctxt->valid && authenticated) { in do_authloop() [all …]
|
H A D | auth2.c | 238 m->authenticated = 0; in input_userauth_request() 277 int authenticated, partial; in userauth_finish() local 284 authenticated = 0; in userauth_finish() 291 if (authctxt->method->authenticated && in userauth_finish() 294 authctxt->method->authenticated = 0; in userauth_finish() 298 if (authctxt->method->authenticated && in userauth_finish() 300 authctxt->method->authenticated = 0; in userauth_finish() 306 authenticated = authctxt->method->authenticated; in userauth_finish() 313 if (authenticated && !AUTHPAM_DONE(authctxt)) in userauth_finish() 327 if (!authctxt->valid && authenticated) { in userauth_finish() [all …]
|
H A D | auth2-hostbased.c | 66 int authenticated = 0; in userauth_hostbased() local 120 authenticated = 0; in userauth_hostbased() 123 authenticated = 1; in userauth_hostbased() 136 if (authenticated) { in userauth_hostbased() 139 authenticated = 0; in userauth_hostbased() 146 if (authenticated) in userauth_hostbased() 147 authctxt->method->authenticated = 1; in userauth_hostbased() 149 debug2("userauth_hostbased: authenticated %d", authenticated); in userauth_hostbased()
|
H A D | auth2-pubkey.c | 66 int authenticated = 0; in userauth_pubkey() local 158 authenticated = 1; in userauth_pubkey() 190 if (authenticated != 1) in userauth_pubkey() 200 if (authenticated) { in userauth_pubkey() 202 authenticated = 0; in userauth_pubkey() 206 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey() 215 if (authenticated) in userauth_pubkey() 216 authctxt->method->authenticated = 1; in userauth_pubkey()
|
H A D | auth.c | 245 auth_log(Authctxt *authctxt, int authenticated, char *method, char *info) in auth_log() argument 254 if (authenticated == 1 || !authctxt->valid) in auth_log() 267 if (authctxt->method->authenticated) { in auth_log() 277 authmsg = authenticated ? "Accepted" : "Failed"; in auth_log() 296 if (authenticated == 0 && strcmp(method, "password") == 0) in auth_log()
|
H A D | auth2-gss.c | 385 authctxt->method->authenticated = ssh_gssapi_userok(gssctxt, in input_gssapi_exchange_complete() 444 authctxt->method->authenticated = in userauth_gssapi_finish() 457 authctxt->method->authenticated = in userauth_gssapi_finish() 464 if (*authctxt->user != '\0' && authctxt->method->authenticated != 0) { in userauth_gssapi_finish()
|
H A D | auth2-chall.c | 192 authctxt->method->authenticated = 0; in auth2_challenge_abandon() 309 authctxt->method->authenticated = 1; in input_userauth_info_response() 329 if (authctxt->method->authenticated || authctxt->method->abandoned) { in input_userauth_info_response()
|
H A D | auth2-passwd.c | 63 authctxt->method->authenticated = 1; in userauth_passwd()
|
H A D | auth2-kbdint.c | 65 authctxt->method->authenticated = 0; in userauth_kbdint()
|
H A D | auth2-none.c | 127 authctxt->method->authenticated = auth_password(authctxt, ""); in userauth_none()
|
H A D | auth2-pam.c | 172 authctxt->method->authenticated = 1; in do_pam_kbdint()
|
H A D | auth-pam.c | 518 authctxt->method->authenticated = 1; /* SSHv2 */ in auth_pam_password()
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSession.c | 129 soft_slot.authenticated = 0; in C_CloseSession() 169 soft_slot.authenticated = 0; in C_CloseAllSessions() 345 if (soft_slot.authenticated) { in C_Login() 364 soft_slot.authenticated = 1; in C_Login() 425 if (!soft_slot.authenticated) { in C_Logout() 442 soft_slot.authenticated = 0; in C_Logout()
|
H A D | softSession.h | 108 boolean_t authenticated; /* Has C_Login called */ member
|
H A D | softGeneral.c | 223 soft_slot.authenticated = 0; in C_Initialize()
|
H A D | softObjectUtil.c | 978 if (!soft_slot.authenticated) { in soft_object_write_access_check() 1295 if (soft_slot.authenticated) { in refresh_token_objects()
|
H A D | softSessionUtil.c | 128 if (soft_slot.authenticated) { in soft_add_session()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | auth.c | 98 static Authenticator *authenticated = NULL; variable 165 authenticated = NULL; in auth_init() 450 authenticated = ap; in auth_finished() 451 if (authenticated == NULL) in auth_finished() 452 authenticated = &NoAuth; in auth_finished()
|
/titanic_41/usr/src/uts/common/io/drm/ |
H A D | drm_fops.c | 110 priv->authenticated = DRM_SUSER(credp); in drm_open_helper()
|
H A D | drm_auth.c | 168 file->authenticated = 1; in drm_authmagic()
|
H A D | drm_ioctl.c | 231 client.auth = pt->authenticated; in drm_getclient()
|
/titanic_41/usr/src/cmd/ssh/include/ |
H A D | auth.h | 179 unsigned int authenticated:1; member
|
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 200 static AuthInfo *authenticated = NULL; variable 361 if ((authenticated = ap) == NULL) { in auth_finished() 362 authenticated = &NoAuth; in auth_finished() 1738 authenticated != NULL && authenticated != &NoAuth && in encrypt_support() 2535 if (authenticated == NULL || authenticated == &NoAuth) in getauthtype() 2545 if (authenticated->AuthName == in getauthtype() 2656 authenticated != &NoAuth && authenticated != NULL && in getterminaltype()
|
/titanic_41/usr/src/cmd/cmd-inet/etc/ |
H A D | services | 204 klogin 543/tcp # Kerberos authenticated rlogin 205 kshell 544/tcp cmd # Kerberos authenticated remote shell
|
/titanic_41/usr/src/cmd/sendmail/cf/m4/ |
H A D | proto.m4 | 1827 # authenticated? 2119 # authenticated via TLS? 2120 R$* $: $1 $| $>RelayTLS client authenticated? 2310 # authenticated? 2320 # authenticated? 2387 dnl Bypass the test for users who have authenticated. 2600 R$@ $| $* $#error $@ 5.7.1 $: "550 not authenticated" 2725 dnl i.e. has the server been authenticated and is encryption active? 2811 R<$-:$+><VERIFY $*> <$*> NO $#error $@ $2 $: $1 " not authenticated" 2899 # authenticated? [all …]
|