Home
last modified time | relevance | path

Searched refs:authenticated (Results 1 – 25 of 157) sorted by relevance

1234567

/netbsd-src/lib/libtelnet/
H A Dauth.c86 static Authenticator *authenticated = 0; variable
155 authenticated = 0; in auth_init()
502 if (!(authenticated = ap)) in auth_finished()
503 authenticated = &NoAuth; in auth_finished()
525 while (!authenticated) in auth_wait()
534 if (!authenticated || authenticated == &NoAuth) in auth_wait()
540 if (authenticated->status) in auth_wait()
541 validuser = (*authenticated->status)(authenticated, in auth_wait()
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/gssapi/mech/
H A Dgss_get_name_attribute.c41 int *authenticated, in gss_get_name_attribute() argument
52 if (authenticated != NULL) in gss_get_name_attribute()
53 *authenticated = 0; in gss_get_name_attribute()
71 authenticated, in gss_get_name_attribute()
H A Dgss_authorize_localname.c87 int authenticated = 0, complete = 0; in attr_authorize_localname() local
92 &authenticated, in attr_authorize_localname()
103 if (authenticated && in attr_authorize_localname()
H A Dgss_pname_to_uid.c68 int authenticated = 0, complete = 0; in attr_localname() local
82 &authenticated, in attr_localname()
92 if (authenticated) { in attr_localname()
/netbsd-src/crypto/external/bsd/openssh/dist/
H A Dauth2-hostbased.c70 int r, pktype, authenticated = 0; in userauth_hostbased() local
150 authenticated = 0; in userauth_hostbased()
155 authenticated = 1; in userauth_hostbased()
157 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased()
160 debug2_f("authenticated %d", authenticated); in userauth_hostbased()
167 return authenticated; in userauth_hostbased()
H A Dauth2-kbdint.c52 int r, authenticated = 0; in userauth_kbdint() local
63 authenticated = auth2_challenge(ssh, devs); in userauth_kbdint()
67 return authenticated; in userauth_kbdint()
H A Dauth2-passwd.c58 int authenticated = 0, r; in userauth_passwd() local
73 authenticated = 1; in userauth_passwd()
75 return authenticated; in userauth_passwd()
H A Dauth2-krb5.c57 int authenticated = 0, r; in userauth_kerberos() local
66 authenticated = 1; in userauth_kerberos()
73 return (authenticated); in userauth_kerberos()
H A Dauth2-gss.c258 int r, authenticated; in input_gssapi_exchange_complete() local
271 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_exchange_complete()
278 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete()
287 int r, authenticated = 0; in input_gssapi_mic() local
312 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_mic()
324 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
H A Dauth2-pubkey.c105 int req_presence = 0, req_verify = 0, authenticated = 0; in userauth_pubkey() local
228 authenticated = 0; in userauth_pubkey()
234 authenticated = 1; in userauth_pubkey()
236 if (authenticated == 1 && sig_details != NULL) { in userauth_pubkey()
253 authenticated = 0; in userauth_pubkey()
267 authenticated = 0; in userauth_pubkey()
271 auth2_record_key(authctxt, authenticated, key); in userauth_pubkey()
303 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) { in userauth_pubkey()
305 authenticated = 0; in userauth_pubkey()
307 debug2_f("authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey()
[all …]
H A Dauth2-chall.c304 int authenticated = 0, res; in input_userauth_info_response() local
346 authenticated = authctxt->valid ? 1 : 0; in input_userauth_info_response()
359 if (authenticated) { in input_userauth_info_response()
367 userauth_finish(ssh, authenticated, "keyboard-interactive", in input_userauth_info_response()
H A Dmonitor_wrap.c457 u_int authenticated = 0; in mm_auth_password() local
474 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_auth_password()
487 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_auth_password()
488 return (authenticated); in mm_auth_password()
1091 u_int authenticated = 0; in mm_ssh_gssapi_userok() local
1100 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_ssh_gssapi_userok()
1104 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_ssh_gssapi_userok()
1105 return (authenticated); in mm_ssh_gssapi_userok()
/netbsd-src/external/mpl/dhcp/dist/keama/tests/
H A Dpermitauth4.out2 # DHCPv4 permit authenticated client config
19 /// allow authenticated clients
20 /// [un]authenticated-clients is not supported by ISC DHCP and Kea
H A Dpermitauth4.in41 # DHCPv4 permit authenticated client config
13 allow authenticated clients;
H A Dpermitauth6.out2 # DHCPv6 permit authenticated client config
20 /// [un]authenticated-clients is not supported by ISC DHCP and Kea
H A Dpermitauth6.in61 # DHCPv6 permit authenticated client config
/netbsd-src/external/bsd/openldap/dist/contrib/slapd-modules/acl/
H A Dgssacl.c155 int authenticated, complete; in gssattr_dynacl_mask() local
177 &authenticated, &complete, in gssattr_dynacl_mask()
181 } else if ( authenticated == 0 ) { in gssattr_dynacl_mask()
/netbsd-src/sys/external/bsd/drm/dist/bsd-core/
H A Ddrm_fops.c86 priv->authenticated = DRM_SUSER(p); in drm_open_helper()
143 priv->authenticated = DRM_SUSER(p); in drm_open_helper()
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DCMS_add0_cert.pod23 I<cms> must be of type signed data or (authenticated) enveloped data.
31 I<cms> must be of type signed data or (authenticated) enveloped data.
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DCMS_add0_cert.pod25 I<cms> must be of type signed data or (authenticated) enveloped data.
33 I<cms> must be of type signed data or (authenticated) enveloped data.
/netbsd-src/etc/pam.d/
H A Dtelnetd6 # authenticator such as SRA. For non-authenticated telnet sessions,
/netbsd-src/sys/external/bsd/drm2/dist/drm/
H A Ddrm_auth.c102 file->authenticated = 1; in drm_authmagic()
169 fpriv->authenticated = 1; in drm_new_set_master()
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/rfc/
H A Ddraft-beaulieu-ike-xauth-02.txt190 [ISAKMP]. The vendor id payload SHOULD be authenticated whenever
261 that only one device is authenticated using both IKE authentication
378 authenticated the host and no new authentication is required. This
383 previously authenticated using XAUTH. There is currently no way
450 authenticated, but must do so in the same ISAKMP-Config transaction,
451 and MUST NOT send the SET message until the user is authenticated,
456 servers may specify that a user only be authenticated for a certain
567 XAUTH-DOMAIN - The domain to be authenticated in. This value will
707 which should be authenticated using XAUTH. For example
709 authenticated.
[all …]
/netbsd-src/libexec/rlogind/
H A Drlogind.c243 int authenticated = 0; in doit() local
380 authenticated++; in doit()
400 if (authenticated) in doit()
/netbsd-src/crypto/external/bsd/heimdal/dist/etc/
H A Dservices.append10 klogin 543/tcp # Kerberos authenticated rlogin

1234567