HomeSort by relevance Sort by last modified time
    Searched refs:authenticated (Results 1 - 25 of 38) sorted by null

1 2

  /external/openssh/
auth2-kbdint.c 47 int authenticated = 0; local
57 authenticated = auth2_challenge(authctxt, devs);
61 return authenticated;
auth2-passwd.c 53 int authenticated = 0; local
72 authenticated = 1;
76 return authenticated;
auth1.c 117 int authenticated = 0; local
131 authenticated = PRIVSEP(auth_password(authctxt, password));
135 authenticated = 0;
141 return (authenticated);
148 int authenticated = 0; local
156 authenticated = auth_rsa(authctxt, n);
159 return (authenticated);
166 int keybits, authenticated = 0; local
192 authenticated = auth_rhosts_rsa(authctxt, client_user,
198 return (authenticated);
224 int authenticated = 0; local
244 int authenticated = 0; local
    [all...]
auth-chall.c 85 int authenticated = 0; local
94 authenticated = 1;
102 authenticated = 1;
114 return authenticated;
auth2.c 219 int authenticated = 0; local
283 authenticated = m->userauth(authctxt);
285 userauth_finish(authctxt, authenticated, method);
293 userauth_finish(Authctxt *authctxt, int authenticated, char *method)
297 if (!authctxt->valid && authenticated)
298 fatal("INTERNAL ERROR: authenticated invalid user %s",
302 if (authenticated && authctxt->pw->pw_uid == 0 &&
304 authenticated = 0;
311 if (options.use_pam && authenticated) {
326 if (authenticated && cray_access_denied(authctxt->user))
    [all...]
auth2-hostbased.c 65 int authenticated = 0; local
120 authenticated = 0;
124 authenticated = 1;
128 debug2("userauth_hostbased: authenticated %d", authenticated);
136 return authenticated;
auth2-gss.c 233 int authenticated; local
247 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
254 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
262 int authenticated = 0; local
282 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
294 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
auth2-pubkey.c 76 int authenticated = 0; local
141 authenticated = 0;
145 authenticated = 1;
169 if (authenticated != 1)
172 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg);
177 return authenticated;
auth2-chall.c 284 int authenticated = 0, res; local
321 authenticated = authctxt->valid ? 1 : 0;
336 if (authenticated) {
344 userauth_finish(authctxt, authenticated, method);
auth.c 254 auth_log(Authctxt *authctxt, int authenticated, char *method, char *info)
263 if (authenticated == 1 ||
272 authmsg = authenticated ? "Accepted" : "Failed";
284 if (authenticated == 0 && !authctxt->postponed &&
291 if (authenticated)
297 if (authenticated == 0 && !authctxt->postponed)
auth2-jpake.c 22 * F. Hao, P. Ryan, "Password Authenticated Key Exchange by Juggling",
84 int authenticated = 0; local
94 authenticated = auth2_jpake_start(authctxt);
97 return authenticated;
535 int authenticated = 0; local
551 authenticated = authctxt->valid ? 1 : 0;
559 userauth_finish(authctxt, authenticated, method_jpake.name);
monitor.c 355 int authenticated = 0; local
381 while (!authenticated) {
383 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1);
384 if (authenticated) {
390 authenticated = 0;
393 if (options.use_pam && authenticated) {
399 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m);
406 auth_log(authctxt, authenticated, auth_method,
408 if (!authenticated)
427 fatal("%s: authenticated invalid user", __func__)
846 int authenticated; local
2097 int authenticated; local
2283 int authenticated = 0; local
    [all...]
auth.h 51 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
monitor_wrap.c 346 int authenticated = 0; local
357 authenticated = buffer_get_int(&m);
362 __func__, authenticated ? "" : "not ");
363 return (authenticated);
1278 int authenticated = 0; local
1286 authenticated = buffer_get_int(&m);
1289 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not ");
1290 return (authenticated);
    [all...]
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
Connection.java 90 private boolean authenticated = false; field in class:Connection
167 * @return whether the connection is now authenticated.
180 if (authenticated)
181 throw new IllegalStateException("Connection is already authenticated!");
195 authenticated = am.authenticatePublicKey(user, pem.toCharArray(), password, getOrCreateSecureRND());
197 return authenticated;
209 * @return whether the connection is now authenticated.
249 * @return whether the connection is now authenticated.
261 if (authenticated)
262 throw new IllegalStateException("Connection is already authenticated!");
    [all...]
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/
AuthenticationManager.java 53 private boolean authenticated = false; field in class:AuthenticationManager
161 authenticated = true;
177 return authenticated;
260 authenticated = true;
290 return authenticated;
315 authenticated = true;
364 authenticated = true;
  /external/chromium/chrome/browser/sync/engine/
all_status.cc 84 const bool online = status_.authenticated &&
128 status_.authenticated = true;
130 status_.authenticated = false;
  /external/smack/src/org/jivesoftware/smack/
BOSHConnection.java 84 private boolean authenticated = false; field in class:BOSHConnection
110 * The full JID of the authenticated user.
287 return authenticated;
309 if (authenticated) {
355 // Indicate that we're now authenticated.
356 authenticated = true;
377 if (authenticated) {
404 // Indicate that we're now authenticated.
405 authenticated = true;
488 setWasAuthenticated(authenticated);
    [all...]
XMPPConnection.java 81 * Flag that indicates if the user is currently authenticated with the server.
83 private boolean authenticated = false; field in class:XMPPConnection
85 * Flag that indicates if the user was authenticated with the server when the connection
209 if (authenticated) {
250 // Indicate that we're now authenticated.
251 authenticated = true;
289 if (authenticated) {
316 // Indicate that we're now authenticated.
317 authenticated = true;
332 // if connection is authenticated the roster is already set by login()
    [all...]
BOSHPacketReader.java 107 connection.getSASLAuthentication().authenticated();
  /external/ppp/pppd/plugins/
winbind.c 60 #define AUTHENTICATED 1
269 int authenticated = NOT_AUTHENTICATED; /* not auth */ local
410 } else if (strcasecmp(message, "Authenticated") == 0) {
412 authenticated = AUTHENTICATED;
415 authenticated = NOT_AUTHENTICATED;
427 authenticated = NOT_AUTHENTICATED;
431 authenticated = NOT_AUTHENTICATED;
454 if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key)
    [all...]
  /external/apache-harmony/support/src/test/java/tests/support/
Support_HttpServer.java 220 boolean authenticated = false, contentLength = false, chunked = false;
236 authenticated = true;
270 authenticateTest(authenticated);
336 private void authenticateTest(boolean authenticated) {
346 if (!authenticated) {
  /frameworks/base/policy/src/com/android/internal/policy/impl/keyguard/
KeyguardViewMediator.java 286 * @param authenticated Whether the user securely got past the keyguard.
291 void keyguardDone(boolean authenticated);
449 public void keyguardDone(boolean authenticated) {
450 KeyguardViewMediator.this.keyguardDone(authenticated, true);
    [all...]
  /external/chromium/chrome/browser/sync/
sync_ui_util.cc 69 // Returns the message that should be displayed when the user is authenticated
70 // and can connect to the sync server. If the user hasn't yet authenticated, an
107 if (status.authenticated && !service->observed_passphrase_required()) {
166 } else if (!status.authenticated) {
341 strings->Set("authenticated",
342 new FundamentalValue(full_status.authenticated));
  /external/webkit/Tools/Scripts/webkitpy/common/net/bugzilla/
bugzilla.py 211 self.authenticated = False
400 if self.authenticated:
405 self.authenticated = True
411 while not self.authenticated:
434 self.authenticated = True
    [all...]

Completed in 474 milliseconds

1 2