| /netbsd-src/lib/libtelnet/ |
| H A D | auth.c | 86 static Authenticator *authenticated = 0; variable 155 authenticated = 0; in auth_init() 502 if (!(authenticated = ap)) in auth_finished() 503 authenticated = &NoAuth; in auth_finished() 525 while (!authenticated) in auth_wait() 534 if (!authenticated || authenticated == &NoAuth) in auth_wait() 540 if (authenticated->status) in auth_wait() 541 validuser = (*authenticated->status)(authenticated, in auth_wait()
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/gssapi/mech/ |
| H A D | gss_get_name_attribute.c | 41 int *authenticated, in gss_get_name_attribute() argument 52 if (authenticated != NULL) in gss_get_name_attribute() 53 *authenticated = 0; in gss_get_name_attribute() 71 authenticated, in gss_get_name_attribute()
|
| H A D | gss_authorize_localname.c | 87 int authenticated = 0, complete = 0; in attr_authorize_localname() local 92 &authenticated, in attr_authorize_localname() 103 if (authenticated && in attr_authorize_localname()
|
| H A D | gss_pname_to_uid.c | 68 int authenticated = 0, complete = 0; in attr_localname() local 82 &authenticated, in attr_localname() 92 if (authenticated) { in attr_localname()
|
| /netbsd-src/crypto/external/bsd/openssh/dist/ |
| H A D | auth2-hostbased.c | 70 int r, pktype, authenticated = 0; in userauth_hostbased() local 150 authenticated = 0; in userauth_hostbased() 155 authenticated = 1; in userauth_hostbased() 157 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased() 160 debug2_f("authenticated %d", authenticated); in userauth_hostbased() 167 return authenticated; in userauth_hostbased()
|
| H A D | auth2-kbdint.c | 52 int r, authenticated = 0; in userauth_kbdint() local 63 authenticated = auth2_challenge(ssh, devs); in userauth_kbdint() 67 return authenticated; in userauth_kbdint()
|
| H A D | auth2-passwd.c | 58 int authenticated = 0, r; in userauth_passwd() local 73 authenticated = 1; in userauth_passwd() 75 return authenticated; in userauth_passwd()
|
| H A D | auth2-krb5.c | 57 int authenticated = 0, r; in userauth_kerberos() local 66 authenticated = 1; in userauth_kerberos() 73 return (authenticated); in userauth_kerberos()
|
| H A D | auth2-gss.c | 258 int r, authenticated; in input_gssapi_exchange_complete() local 271 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_exchange_complete() 278 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_exchange_complete() 287 int r, authenticated = 0; in input_gssapi_mic() local 312 authenticated = mm_ssh_gssapi_userok(authctxt->user); in input_gssapi_mic() 324 userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL); in input_gssapi_mic()
|
| H A D | auth2-pubkey.c | 105 int req_presence = 0, req_verify = 0, authenticated = 0; in userauth_pubkey() local 228 authenticated = 0; in userauth_pubkey() 234 authenticated = 1; in userauth_pubkey() 236 if (authenticated == 1 && sig_details != NULL) { in userauth_pubkey() 253 authenticated = 0; in userauth_pubkey() 267 authenticated = 0; in userauth_pubkey() 271 auth2_record_key(authctxt, authenticated, key); in userauth_pubkey() 303 if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) { in userauth_pubkey() 305 authenticated = 0; in userauth_pubkey() 307 debug2_f("authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey() [all …]
|
| H A D | auth2-chall.c | 304 int authenticated = 0, res; in input_userauth_info_response() local 346 authenticated = authctxt->valid ? 1 : 0; in input_userauth_info_response() 359 if (authenticated) { in input_userauth_info_response() 367 userauth_finish(ssh, authenticated, "keyboard-interactive", in input_userauth_info_response()
|
| H A D | monitor_wrap.c | 457 u_int authenticated = 0; in mm_auth_password() local 474 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_auth_password() 487 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_auth_password() 488 return (authenticated); in mm_auth_password() 1091 u_int authenticated = 0; in mm_ssh_gssapi_userok() local 1100 if ((r = sshbuf_get_u32(m, &authenticated)) != 0) in mm_ssh_gssapi_userok() 1104 debug3_f("user %sauthenticated", authenticated ? "" : "not "); in mm_ssh_gssapi_userok() 1105 return (authenticated); in mm_ssh_gssapi_userok()
|
| /netbsd-src/external/mpl/dhcp/dist/keama/tests/ |
| H A D | permitauth4.out | 2 # DHCPv4 permit authenticated client config 19 /// allow authenticated clients 20 /// [un]authenticated-clients is not supported by ISC DHCP and Kea
|
| H A D | permitauth4.in4 | 1 # DHCPv4 permit authenticated client config 13 allow authenticated clients;
|
| H A D | permitauth6.out | 2 # DHCPv6 permit authenticated client config 20 /// [un]authenticated-clients is not supported by ISC DHCP and Kea
|
| H A D | permitauth6.in6 | 1 # DHCPv6 permit authenticated client config
|
| /netbsd-src/external/bsd/openldap/dist/contrib/slapd-modules/acl/ |
| H A D | gssacl.c | 155 int authenticated, complete; in gssattr_dynacl_mask() local 177 &authenticated, &complete, in gssattr_dynacl_mask() 181 } else if ( authenticated == 0 ) { in gssattr_dynacl_mask()
|
| /netbsd-src/sys/external/bsd/drm/dist/bsd-core/ |
| H A D | drm_fops.c | 86 priv->authenticated = DRM_SUSER(p); in drm_open_helper() 143 priv->authenticated = DRM_SUSER(p); in drm_open_helper()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
| H A D | CMS_add0_cert.pod | 23 I<cms> must be of type signed data or (authenticated) enveloped data. 31 I<cms> must be of type signed data or (authenticated) enveloped data.
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
| H A D | CMS_add0_cert.pod | 25 I<cms> must be of type signed data or (authenticated) enveloped data. 33 I<cms> must be of type signed data or (authenticated) enveloped data.
|
| /netbsd-src/etc/pam.d/ |
| H A D | telnetd | 6 # authenticator such as SRA. For non-authenticated telnet sessions,
|
| /netbsd-src/sys/external/bsd/drm2/dist/drm/ |
| H A D | drm_auth.c | 102 file->authenticated = 1; in drm_authmagic() 169 fpriv->authenticated = 1; in drm_new_set_master()
|
| /netbsd-src/crypto/dist/ipsec-tools/src/racoon/rfc/ |
| H A D | draft-beaulieu-ike-xauth-02.txt | 190 [ISAKMP]. The vendor id payload SHOULD be authenticated whenever 261 that only one device is authenticated using both IKE authentication 378 authenticated the host and no new authentication is required. This 383 previously authenticated using XAUTH. There is currently no way 450 authenticated, but must do so in the same ISAKMP-Config transaction, 451 and MUST NOT send the SET message until the user is authenticated, 456 servers may specify that a user only be authenticated for a certain 567 XAUTH-DOMAIN - The domain to be authenticated in. This value will 707 which should be authenticated using XAUTH. For example 709 authenticated. [all …]
|
| /netbsd-src/libexec/rlogind/ |
| H A D | rlogind.c | 243 int authenticated = 0; in doit() local 380 authenticated++; in doit() 400 if (authenticated) in doit()
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/etc/ |
| H A D | services.append | 10 klogin 543/tcp # Kerberos authenticated rlogin
|