/external/openssh/ |
auth2-kbdint.c | 47 int authenticated = 0; local 57 authenticated = auth2_challenge(authctxt, devs); 61 return authenticated;
|
auth2-passwd.c | 53 int authenticated = 0; local 72 authenticated = 1; 76 return authenticated;
|
auth-chall.c | 85 int authenticated = 0; local 94 authenticated = 1; 102 authenticated = 1; 114 return authenticated;
|
auth2-gss.c | 233 int authenticated; local 247 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 254 userauth_finish(authctxt, authenticated, "gssapi-with-mic"); 262 int authenticated = 0; local 282 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 294 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
|
auth2-hostbased.c | 65 int authenticated = 0; local 120 authenticated = 0; 124 authenticated = 1; 128 debug2("userauth_hostbased: authenticated %d", authenticated); 136 return authenticated;
|
auth2.c | 219 int authenticated = 0; local 283 authenticated = m->userauth(authctxt); 285 userauth_finish(authctxt, authenticated, method); 293 userauth_finish(Authctxt *authctxt, int authenticated, char *method) 297 if (!authctxt->valid && authenticated) 298 fatal("INTERNAL ERROR: authenticated invalid user %s", 302 if (authenticated && authctxt->pw->pw_uid == 0 && 304 authenticated = 0; 311 if (options.use_pam && authenticated) { 326 if (authenticated && cray_access_denied(authctxt->user)) [all...] |
auth.h | 51 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
|
auth1.c | 117 int authenticated = 0; local 131 authenticated = PRIVSEP(auth_password(authctxt, password)); 135 authenticated = 0; 141 return (authenticated); 148 int authenticated = 0; local 156 authenticated = auth_rsa(authctxt, n); 159 return (authenticated); 166 int keybits, authenticated = 0; local 192 authenticated = auth_rhosts_rsa(authctxt, client_user, 198 return (authenticated); 224 int authenticated = 0; local 244 int authenticated = 0; local [all...] |
auth2-chall.c | 284 int authenticated = 0, res; local 321 authenticated = authctxt->valid ? 1 : 0; 336 if (authenticated) { 344 userauth_finish(authctxt, authenticated, method);
|
auth2-pubkey.c | 76 int authenticated = 0; local 141 authenticated = 0; 145 authenticated = 1; 169 if (authenticated != 1) 172 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); 177 return authenticated;
|
auth2-jpake.c | 22 * F. Hao, P. Ryan, "Password Authenticated Key Exchange by Juggling", 84 int authenticated = 0; local 94 authenticated = auth2_jpake_start(authctxt); 97 return authenticated; 535 int authenticated = 0; local 551 authenticated = authctxt->valid ? 1 : 0; 559 userauth_finish(authctxt, authenticated, method_jpake.name);
|
monitor_wrap.c | 346 int authenticated = 0; local 357 authenticated = buffer_get_int(&m); 362 __func__, authenticated ? "" : "not "); 363 return (authenticated); 1278 int authenticated = 0; local 1286 authenticated = buffer_get_int(&m); 1289 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not "); 1290 return (authenticated); [all...] |
/external/chromium_org/device/bluetooth/ |
bluetooth_task_manager_win.h | 55 bool authenticated; member in struct:device::BluetoothTaskManagerWin::DeviceState
|
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/egl/wayland/ |
native_drm.c | 60 boolean authenticated; member in struct:wayland_drm_display 176 drmdpy->authenticated = true; 218 if (wayland_roundtrip(&drmdpy->base) < 0 || !drmdpy->authenticated) 246 boolean current_authenticate, authenticated; local 248 current_authenticate = drmdpy->authenticated; 252 authenticated = drmdpy->authenticated; 254 drmdpy->authenticated = current_authenticate; 256 return authenticated ? 0 : -1;
|
/external/mesa3d/src/gallium/state_trackers/egl/wayland/ |
native_drm.c | 60 boolean authenticated; member in struct:wayland_drm_display 176 drmdpy->authenticated = true; 218 if (wayland_roundtrip(&drmdpy->base) < 0 || !drmdpy->authenticated) 246 boolean current_authenticate, authenticated; local 248 current_authenticate = drmdpy->authenticated; 252 authenticated = drmdpy->authenticated; 254 drmdpy->authenticated = current_authenticate; 256 return authenticated ? 0 : -1;
|
/external/chromium_org/remoting/host/ |
client_session_unittest.cc | 87 // authenticated and channels have been connected. This effectively enables 245 Expectation authenticated = local 249 .After(authenticated); 251 .After(authenticated); 259 .After(authenticated) 275 // because the client isn't authenticated yet. 328 Expectation authenticated = local 332 .After(authenticated); 334 .After(authenticated); 342 .After(authenticated) 383 Expectation authenticated = local 440 Expectation authenticated = local 483 Expectation authenticated = local [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/egl/x11/ |
x11_screen.c | 327 boolean authenticated; local 329 authenticated = DRI2Authenticate(xscr->dpy, 332 return authenticated ? 0 : -1;
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/ |
AuthenticationManager.java | 53 private boolean authenticated = false; field in class:AuthenticationManager 161 authenticated = true; 177 return authenticated; 260 authenticated = true; 290 return authenticated; 315 authenticated = true; 364 authenticated = true;
|
/external/mesa3d/src/gallium/state_trackers/egl/x11/ |
x11_screen.c | 327 boolean authenticated; local 329 authenticated = DRI2Authenticate(xscr->dpy, 332 return authenticated ? 0 : -1;
|
/external/ppp/pppd/plugins/ |
winbind.c | 60 #define AUTHENTICATED 1 269 int authenticated = NOT_AUTHENTICATED; /* not auth */ local 410 } else if (strcasecmp(message, "Authenticated") == 0) { 412 authenticated = AUTHENTICATED; 415 authenticated = NOT_AUTHENTICATED; 427 authenticated = NOT_AUTHENTICATED; 431 authenticated = NOT_AUTHENTICATED; 454 if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key) [all...] |
/external/smack/src/org/jivesoftware/smack/ |
SASLAuthentication.java | 50 * <p>Once the user has been authenticated with SASL, it is necessary to bind a resource for
517 void authenticated() {
method in class:SASLAuthentication
|
/external/chromium/chrome/browser/sync/engine/ |
syncapi.h | 110 // A UserShare encapsulates the syncable pieces that represent an authenticated 683 bool authenticated; // Successfully authenticated via GAIA. member in struct:sync_api::SyncManager::Status [all...] |
/external/chromium_org/third_party/mesa/src/src/egl/drivers/dri2/ |
egl_dri2.h | 129 int authenticated; member in struct:dri2_egl_display
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
Connection.java | 90 private boolean authenticated = false; field in class:Connection 167 * @return whether the connection is now authenticated. 180 if (authenticated) 181 throw new IllegalStateException("Connection is already authenticated!"); 195 authenticated = am.authenticatePublicKey(user, pem.toCharArray(), password, getOrCreateSecureRND()); 197 return authenticated; 209 * @return whether the connection is now authenticated. 249 * @return whether the connection is now authenticated. 261 if (authenticated) 262 throw new IllegalStateException("Connection is already authenticated!"); [all...] |
/external/mesa3d/src/egl/drivers/dri2/ |
egl_dri2.h | 129 int authenticated; member in struct:dri2_egl_display
|