/external/openssh/ |
auth2-kbdint.c | 47 int authenticated = 0; local 57 authenticated = auth2_challenge(authctxt, devs); 61 return authenticated;
|
auth2-passwd.c | 53 int authenticated = 0; local 72 authenticated = 1; 76 return authenticated;
|
auth1.c | 117 int authenticated = 0; local 131 authenticated = PRIVSEP(auth_password(authctxt, password)); 135 authenticated = 0; 141 return (authenticated); 148 int authenticated = 0; local 156 authenticated = auth_rsa(authctxt, n); 159 return (authenticated); 166 int keybits, authenticated = 0; local 192 authenticated = auth_rhosts_rsa(authctxt, client_user, 198 return (authenticated); 224 int authenticated = 0; local 244 int authenticated = 0; local [all...] |
auth-chall.c | 85 int authenticated = 0; local 94 authenticated = 1; 102 authenticated = 1; 114 return authenticated;
|
auth2.c | 219 int authenticated = 0; local 283 authenticated = m->userauth(authctxt); 285 userauth_finish(authctxt, authenticated, method); 293 userauth_finish(Authctxt *authctxt, int authenticated, char *method) 297 if (!authctxt->valid && authenticated) 298 fatal("INTERNAL ERROR: authenticated invalid user %s", 302 if (authenticated && authctxt->pw->pw_uid == 0 && 304 authenticated = 0; 311 if (options.use_pam && authenticated) { 326 if (authenticated && cray_access_denied(authctxt->user)) [all...] |
auth2-hostbased.c | 65 int authenticated = 0; local 120 authenticated = 0; 124 authenticated = 1; 128 debug2("userauth_hostbased: authenticated %d", authenticated); 136 return authenticated;
|
auth2-gss.c | 233 int authenticated; local 247 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 254 userauth_finish(authctxt, authenticated, "gssapi-with-mic"); 262 int authenticated = 0; local 282 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 294 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
|
auth2-pubkey.c | 76 int authenticated = 0; local 141 authenticated = 0; 145 authenticated = 1; 169 if (authenticated != 1) 172 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); 177 return authenticated;
|
auth2-chall.c | 284 int authenticated = 0, res; local 321 authenticated = authctxt->valid ? 1 : 0; 336 if (authenticated) { 344 userauth_finish(authctxt, authenticated, method);
|
auth.c | 254 auth_log(Authctxt *authctxt, int authenticated, char *method, char *info) 263 if (authenticated == 1 || 272 authmsg = authenticated ? "Accepted" : "Failed"; 284 if (authenticated == 0 && !authctxt->postponed && 291 if (authenticated) 297 if (authenticated == 0 && !authctxt->postponed)
|
auth2-jpake.c | 22 * F. Hao, P. Ryan, "Password Authenticated Key Exchange by Juggling", 84 int authenticated = 0; local 94 authenticated = auth2_jpake_start(authctxt); 97 return authenticated; 535 int authenticated = 0; local 551 authenticated = authctxt->valid ? 1 : 0; 559 userauth_finish(authctxt, authenticated, method_jpake.name);
|
monitor.c | 355 int authenticated = 0; local 381 while (!authenticated) { 383 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1); 384 if (authenticated) { 390 authenticated = 0; 393 if (options.use_pam && authenticated) { 399 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m); 406 auth_log(authctxt, authenticated, auth_method, 408 if (!authenticated) 427 fatal("%s: authenticated invalid user", __func__) 846 int authenticated; local 2097 int authenticated; local 2283 int authenticated = 0; local [all...] |
auth.h | 51 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
|
monitor_wrap.c | 346 int authenticated = 0; local 357 authenticated = buffer_get_int(&m); 362 __func__, authenticated ? "" : "not "); 363 return (authenticated); 1278 int authenticated = 0; local 1286 authenticated = buffer_get_int(&m); 1289 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not "); 1290 return (authenticated); [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
Connection.java | 90 private boolean authenticated = false; field in class:Connection 167 * @return whether the connection is now authenticated. 180 if (authenticated) 181 throw new IllegalStateException("Connection is already authenticated!"); 195 authenticated = am.authenticatePublicKey(user, pem.toCharArray(), password, getOrCreateSecureRND()); 197 return authenticated; 209 * @return whether the connection is now authenticated. 249 * @return whether the connection is now authenticated. 261 if (authenticated) 262 throw new IllegalStateException("Connection is already authenticated!"); [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/ |
AuthenticationManager.java | 53 private boolean authenticated = false; field in class:AuthenticationManager 161 authenticated = true; 177 return authenticated; 260 authenticated = true; 290 return authenticated; 315 authenticated = true; 364 authenticated = true;
|
/external/chromium/chrome/browser/sync/engine/ |
all_status.cc | 84 const bool online = status_.authenticated && 128 status_.authenticated = true; 130 status_.authenticated = false;
|
/external/smack/src/org/jivesoftware/smack/ |
BOSHConnection.java | 84 private boolean authenticated = false; field in class:BOSHConnection 110 * The full JID of the authenticated user. 287 return authenticated; 309 if (authenticated) { 355 // Indicate that we're now authenticated. 356 authenticated = true; 377 if (authenticated) { 404 // Indicate that we're now authenticated. 405 authenticated = true; 488 setWasAuthenticated(authenticated); [all...] |
XMPPConnection.java | 81 * Flag that indicates if the user is currently authenticated with the server. 83 private boolean authenticated = false; field in class:XMPPConnection 85 * Flag that indicates if the user was authenticated with the server when the connection 209 if (authenticated) { 250 // Indicate that we're now authenticated. 251 authenticated = true; 289 if (authenticated) { 316 // Indicate that we're now authenticated. 317 authenticated = true; 332 // if connection is authenticated the roster is already set by login() [all...] |
BOSHPacketReader.java | 107 connection.getSASLAuthentication().authenticated();
|
/external/ppp/pppd/plugins/ |
winbind.c | 60 #define AUTHENTICATED 1 269 int authenticated = NOT_AUTHENTICATED; /* not auth */ local 410 } else if (strcasecmp(message, "Authenticated") == 0) { 412 authenticated = AUTHENTICATED; 415 authenticated = NOT_AUTHENTICATED; 427 authenticated = NOT_AUTHENTICATED; 431 authenticated = NOT_AUTHENTICATED; 454 if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key) [all...] |
/external/apache-harmony/support/src/test/java/tests/support/ |
Support_HttpServer.java | 220 boolean authenticated = false, contentLength = false, chunked = false; 236 authenticated = true; 270 authenticateTest(authenticated); 336 private void authenticateTest(boolean authenticated) { 346 if (!authenticated) {
|
/frameworks/base/policy/src/com/android/internal/policy/impl/keyguard/ |
KeyguardViewMediator.java | 286 * @param authenticated Whether the user securely got past the keyguard. 291 void keyguardDone(boolean authenticated); 449 public void keyguardDone(boolean authenticated) { 450 KeyguardViewMediator.this.keyguardDone(authenticated, true); [all...] |
/external/chromium/chrome/browser/sync/ |
sync_ui_util.cc | 69 // Returns the message that should be displayed when the user is authenticated 70 // and can connect to the sync server. If the user hasn't yet authenticated, an 107 if (status.authenticated && !service->observed_passphrase_required()) { 166 } else if (!status.authenticated) { 341 strings->Set("authenticated", 342 new FundamentalValue(full_status.authenticated));
|
/external/webkit/Tools/Scripts/webkitpy/common/net/bugzilla/ |
bugzilla.py | 211 self.authenticated = False 400 if self.authenticated: 405 self.authenticated = True 411 while not self.authenticated: 434 self.authenticated = True [all...] |