authenticated
status = authenticated(hdcp, event_ctx, input);
status = authenticated(hdcp, event_ctx, input);
status = authenticated(hdcp, event_ctx, input);
file->authenticated = 1;
fpriv->authenticated = 1;
priv->authenticated ? 'y' : 'n',
file->authenticated = capable(CAP_SYS_ADMIN);
file_priv->authenticated,
file_priv->authenticated);
client->auth = file_priv->authenticated;
!file_priv->authenticated))
file_priv->authenticated, ioctl->name);
file_priv->authenticated, cmd, nr);
bool authenticated;
uid = authenticated ? pw->pw_uid : getuid();
pw->pw_passwd = getnewpasswd(pw, lc, authenticated);
getnewpasswd(struct passwd *pw, login_cap_t *lc, int authenticated)
if (!authenticated) {
local_passwd(char *uname, int authenticated)
auth_log(struct ssh *ssh, int authenticated, int partial,
if (authenticated == 1 ||
authmsg = authenticated ? "Accepted" : "Failed";
int authenticated; /* authenticated and alarms cancelled */
int authenticated = 0, res;
authenticated = authctxt->valid ? 1 : 0;
if (authenticated) {
userauth_finish(ssh, authenticated, "keyboard-interactive",
int r, authenticated;
authenticated = mm_ssh_gssapi_userok(authctxt->user);
userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL);
int r, authenticated = 0;
authenticated = mm_ssh_gssapi_userok(authctxt->user);
userauth_finish(ssh, authenticated, "gssapi-with-mic", NULL);
authenticated = 0;
authenticated = 1;
auth2_record_key(authctxt, authenticated, key);
debug2_f("authenticated %d", authenticated);
return authenticated;
int r, pktype, authenticated = 0;
int r, authenticated = 0;
authenticated = auth2_challenge(ssh, devs);
return authenticated;
int authenticated = 0, r;
authenticated = 1;
return authenticated;
authenticated = 0;
authenticated = 1;
if (authenticated == 1 && sig_details != NULL) {
authenticated = 0;
authenticated = 0;
auth2_record_key(authctxt, authenticated, key);
if (authenticated == 1 && auth_activate_options(ssh, authopts) != 0) {
authenticated = 0;
debug2_f("authenticated %d pkalg %s", authenticated, pkalg);
return authenticated;
int req_presence = 0, req_verify = 0, authenticated = 0;
int r, authenticated = 0;
authenticated = m->userauth(ssh, method);
if (!authctxt->authenticated && strcmp(method, "none") != 0)
userauth_finish(ssh, authenticated, method, NULL);
userauth_finish(struct ssh *ssh, int authenticated, const char *packet_method,
if (authenticated) {
if (authenticated && authctxt->pw->pw_uid == 0 &&
authenticated = 0;
if (authenticated && options.num_auth_methods != 0) {
authenticated = 0;
auth_log(ssh, authenticated, partial, method, submethod);
if (authenticated || partial)
if (authenticated == 1) {
auth2_record_key(Authctxt *authctxt, int authenticated,
if (!authenticated)
int r, authenticated;
authenticated = authctxt->valid && ssh_gssapi_userok(authctxt->user);
if ((r = sshbuf_put_u32(m, authenticated)) != 0)
debug3_f("sending result %d", authenticated);
return (authenticated);
int status, authenticated = 0, partial = 0;
while (!authenticated) {
authenticated = (monitor_read(ssh, pmonitor,
if (authenticated &&
authenticated = 0;
if (authenticated) {
authenticated = 0;
auth_log(ssh, authenticated, partial,
if (!partial && !authenticated)
if (authenticated || partial) {
postauth = (authctxt && authctxt->pw && authctxt->authenticated);
int r, authenticated;
authenticated = options.password_authentication &&
if ((r = sshbuf_put_u32(m, authenticated)) != 0)
debug3_f("sending result %d", authenticated);
return (authenticated);
int r, authenticated = 0;
if ((r = sshbuf_get_u32(m, &authenticated)) != 0)
debug3_f("user %sauthenticated", authenticated ? "" : "not ");
return (authenticated);
int r, authenticated = 0;
if ((r = sshbuf_get_u32(m, &authenticated)) != 0)
debug3_f("user %sauthenticated", authenticated ? "" : "not ");
return (authenticated);
if (authctxt == NULL || !authctxt->authenticated)
authctxt->authenticated = 1;