/external/openssh/ |
H A D | auth2-kbdint.c | 47 int authenticated = 0; local 57 authenticated = auth2_challenge(authctxt, devs); 61 return authenticated;
|
H A D | auth2-passwd.c | 53 int authenticated = 0; local 72 authenticated = 1; 76 return authenticated;
|
H A D | auth1.c | 117 int authenticated = 0; local 131 authenticated = PRIVSEP(auth_password(authctxt, password)); 135 authenticated = 0; 141 return (authenticated); 148 int authenticated = 0; local 156 authenticated = auth_rsa(authctxt, n); 159 return (authenticated); 166 int keybits, authenticated = 0; local 192 authenticated = auth_rhosts_rsa(authctxt, client_user, 198 return (authenticated); 224 int authenticated = 0; local 244 int authenticated = 0; local [all...] |
H A D | auth-chall.c | 85 int authenticated = 0; local 94 authenticated = 1; 102 authenticated = 1; 114 return authenticated;
|
H A D | auth2.c | 219 int authenticated = 0; local 283 authenticated = m->userauth(authctxt); 285 userauth_finish(authctxt, authenticated, method); 293 userauth_finish(Authctxt *authctxt, int authenticated, char *method) argument 297 if (!authctxt->valid && authenticated) 298 fatal("INTERNAL ERROR: authenticated invalid user %s", 302 if (authenticated && authctxt->pw->pw_uid == 0 && 304 authenticated = 0; 311 if (options.use_pam && authenticated) { 326 if (authenticated [all...] |
H A D | auth2-hostbased.c | 65 int authenticated = 0; local 120 authenticated = 0; 124 authenticated = 1; 128 debug2("userauth_hostbased: authenticated %d", authenticated); 136 return authenticated;
|
H A D | auth2-gss.c | 233 int authenticated; local 247 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 254 userauth_finish(authctxt, authenticated, "gssapi-with-mic"); 262 int authenticated = 0; local 282 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user)); 294 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
|
H A D | auth2-pubkey.c | 76 int authenticated = 0; local 141 authenticated = 0; 145 authenticated = 1; 169 if (authenticated != 1) 172 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); 177 return authenticated;
|
H A D | auth2-chall.c | 284 int authenticated = 0, res; local 321 authenticated = authctxt->valid ? 1 : 0; 336 if (authenticated) { 344 userauth_finish(authctxt, authenticated, method);
|
H A D | auth.c | 254 auth_log(Authctxt *authctxt, int authenticated, char *method, char *info) argument 263 if (authenticated == 1 || 272 authmsg = authenticated ? "Accepted" : "Failed"; 284 if (authenticated == 0 && !authctxt->postponed && 291 if (authenticated) 297 if (authenticated == 0 && !authctxt->postponed)
|
H A D | auth2-jpake.c | 84 int authenticated = 0; local 94 authenticated = auth2_jpake_start(authctxt); 97 return authenticated; 535 int authenticated = 0; local 551 authenticated = authctxt->valid ? 1 : 0; 559 userauth_finish(authctxt, authenticated, method_jpake.name);
|
H A D | monitor.c | 355 int authenticated = 0; local 381 while (!authenticated) { 383 authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1); 384 if (authenticated) { 390 authenticated = 0; 393 if (options.use_pam && authenticated) { 399 authenticated = mm_answer_pam_account(pmonitor->m_sendfd, &m); 406 auth_log(authctxt, authenticated, auth_method, 408 if (!authenticated) 427 fatal("%s: authenticated invali 846 int authenticated; local 2097 int authenticated; local 2283 int authenticated = 0; local [all...] |
H A D | auth.h | 51 int authenticated; /* authenticated and alarms cancelled */ member in struct:Authctxt
|
H A D | monitor_wrap.c | 346 int authenticated = 0; local 357 authenticated = buffer_get_int(&m); 362 __func__, authenticated ? "" : "not "); 363 return (authenticated); 1278 int authenticated = 0; local 1286 authenticated = buffer_get_int(&m); 1289 debug3("%s: user %sauthenticated",__func__, authenticated ? "" : "not "); 1290 return (authenticated);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
H A D | Connection.java | 90 private boolean authenticated = false; field in class:Connection 167 * @return whether the connection is now authenticated. 180 if (authenticated) 181 throw new IllegalStateException("Connection is already authenticated!"); 195 authenticated = am.authenticatePublicKey(user, pem.toCharArray(), password, getOrCreateSecureRND()); 197 return authenticated; 209 * @return whether the connection is now authenticated. 249 * @return whether the connection is now authenticated. 261 if (authenticated) 262 throw new IllegalStateException("Connection is already authenticated!"); [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/ |
H A D | AuthenticationManager.java | 53 private boolean authenticated = false; field in class:AuthenticationManager 161 authenticated = true; 177 return authenticated; 260 authenticated = true; 290 return authenticated; 315 authenticated = true; 364 authenticated = true;
|
/external/chromium/chrome/browser/sync/engine/ |
H A D | all_status.cc | 84 const bool online = status_.authenticated && 128 status_.authenticated = true; 130 status_.authenticated = false;
|
/external/dbus/dbus/ |
H A D | dbus-transport-protected.h | 114 unsigned int authenticated : 1; /**< Cache of auth state; use _dbus_transport_get_is_authenticated() to query value */ member in struct:DBusTransport
|
H A D | dbus-transport.c | 164 transport->authenticated = FALSE; 656 /* We have authenticated! */ 684 * Returns #TRUE if we have been authenticated. Will return #TRUE 691 * @returns whether we're authenticated 696 if (transport->authenticated) 788 transport->authenticated = maybe_authenticated; 799 * @returns #TRUE if not authenticated or authenticated as anonymous 806 if (!transport->authenticated) 1296 if (!transport->authenticated) [all...] |
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 269 int authenticated = NOT_AUTHENTICATED; /* not auth */ local 412 authenticated = AUTHENTICATED; 415 authenticated = NOT_AUTHENTICATED; 427 authenticated = NOT_AUTHENTICATED; 431 authenticated = NOT_AUTHENTICATED; 454 if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key) { 455 notice("Did not get user session key, despite being authenticated!"); 458 return authenticated;
|
/external/apache-harmony/support/src/test/java/tests/support/ |
H A D | Support_HttpServer.java | 220 boolean authenticated = false, contentLength = false, chunked = false; 236 authenticated = true; 270 authenticateTest(authenticated); 336 private void authenticateTest(boolean authenticated) { argument 346 if (!authenticated) {
|
/external/chromium/chrome/browser/sync/ |
H A D | sync_ui_util.cc | 69 // Returns the message that should be displayed when the user is authenticated 70 // and can connect to the sync server. If the user hasn't yet authenticated, an 107 if (status.authenticated && !service->observed_passphrase_required()) { 166 } else if (!status.authenticated) { 341 strings->Set("authenticated", 342 new FundamentalValue(full_status.authenticated));
|
/external/webkit/Tools/Scripts/webkitpy/common/net/bugzilla/ |
H A D | bugzilla.py | 211 self.authenticated = False 400 if self.authenticated: 405 self.authenticated = True 411 while not self.authenticated: 434 self.authenticated = True
|
/external/chromium/testing/gmock/scripts/ |
H A D | upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True
|
/external/chromium/testing/gtest/scripts/ |
H A D | upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True
|