/external/openssh/ |
auth-bsdauth.c | 47 bsdauth_init_ctx(Authctxt *authctxt) 49 return authctxt; 56 Authctxt *authctxt = ctx; local 64 if (authctxt->as != NULL) { 66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 68 auth_close(authctxt->as); 69 authctxt->as = NULL; 76 authctxt->style ? authctxt->style : "<default>") 100 Authctxt *authctxt = ctx; local 122 Authctxt *authctxt = ctx; local [all...] |
auth-krb5.c | 60 Authctxt *authctxt = (Authctxt *)context; local 63 if (authctxt->krb5_ctx == NULL) { 64 problem = krb5_init_context(&authctxt->krb5_ctx); 72 auth_krb5_password(Authctxt *authctxt, const char *password) 85 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name); 86 client = platform_client ? platform_client : authctxt->pw->pw_name; 88 temporarily_use_uid(authctxt->pw) [all...] |
auth2.c | 94 static Authmethod *authmethod_lookup(Authctxt *, const char *); 95 static char *authmethods_get(Authctxt *authctxt); 166 * loop until authctxt->success == TRUE 169 do_authentication2(Authctxt *authctxt) 173 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt); 180 Authctxt *authctxt = ctxt local 216 Authctxt *authctxt = ctxt; local [all...] |
auth2-chall.c | 50 static int auth2_challenge_start(Authctxt *); 51 static int send_userauth_info_request(Authctxt *); 158 kbdint_next_device(Authctxt *authctxt, KbdintAuthctxt *kbdintctxt) 174 !auth2_method_allowed(authctxt, 194 * try challenge-response, set authctxt->postponed if we have to 198 auth2_challenge(Authctxt *authctxt, char *devs) 201 authctxt->user ? authctxt->user : "<nouser>" 290 Authctxt *authctxt = ctxt; local [all...] |
auth-skey.c | 46 skey_init_ctx(Authctxt *authctxt) 48 return authctxt; 55 Authctxt *authctxt = ctx; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 77 Authctxt *authctxt = ctx; local 79 if (authctxt->valid && 81 skey_haskey(authctxt->pw->pw_name) == 0 & [all...] |
auth2-gss.c | 61 userauth_gssapi(Authctxt *authctxt) 71 if (!authctxt->valid || authctxt->user == NULL) 100 authctxt->server_caused_failure = 1; 108 authctxt->server_caused_failure = 1; 112 authctxt->methoddata = (void *)ctxt; 124 authctxt->postponed = 1; 132 Authctxt *authctxt = ctxt local 187 Authctxt *authctxt = ctxt; local 228 Authctxt *authctxt = ctxt; local 255 Authctxt *authctxt = ctxt; local [all...] |
auth-passwd.c | 84 auth_password(Authctxt *authctxt, const char *password) 86 struct passwd * pw = authctxt->pw; 87 int result, ok = authctxt->valid; 104 int ret = auth_krb5_password(authctxt, password); 122 return (sshpam_auth_passwd(authctxt, password) && ok); 127 if (auth_shadow_pwexpired(authctxt)) 128 authctxt->force_pwchange = 1; 131 result = sys_auth_passwd(authctxt, password); 132 if (authctxt->force_pwchange [all...] |
sshconnect2.c | 244 typedef struct cauthctxt Authctxt; 284 int (*userauth)(Authctxt *authctxt); 285 void (*cleanup)(Authctxt *authctxt); 301 int userauth_none(Authctxt *); 302 int userauth_pubkey(Authctxt *); 303 int userauth_passwd(Authctxt *); 304 int userauth_kbdint(Authctxt *); 305 int userauth_hostbased(Authctxt *); 369 Authctxt authctxt; local 417 Authctxt *authctxt = ctxt; local 519 Authctxt *authctxt = ctxt; local 536 Authctxt *authctxt = ctxt; local 550 Authctxt *authctxt = ctxt; local 576 Authctxt *authctxt = ctxt; local 707 Authctxt *authctxt = ctxt; local 762 Authctxt *authctxt = ctxt; local 803 Authctxt *authctxt = ctxt; local 832 Authctxt *authctxt = ctxt; local 934 Authctxt *authctxt = ctxt; local 1557 Authctxt *authctxt = ctxt; local [all...] |
auth2-kbdint.c | 46 userauth_kbdint(Authctxt *authctxt) 58 authenticated = auth2_challenge(authctxt, devs);
|
auth2-none.c | 62 userauth_none(Authctxt *authctxt) 70 return (PRIVSEP(auth_password(authctxt, "")));
|
auth2-passwd.c | 51 userauth_passwd(Authctxt *authctxt) 72 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
|
auth-sia.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *pass) 61 if (!authctxt->user || pass == NULL || pass[0] == '\0') 64 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user, 70 authctxt->user, host);
|
auth.c | 271 auth_info(Authctxt *authctxt, const char *fmt, ...) 276 free(authctxt->info); 277 authctxt->info = NULL; 280 i = vasprintf(&authctxt->info, fmt, ap); 283 if (i < 0 || authctxt->info == NULL) 288 auth_log(Authctxt *authctxt, int authenticated, int partial, 295 if (use_privsep && !mm_is_monitor() && !authctxt->postponed) 300 !authctxt->valid | [all...] |
auth.h | 48 typedef struct Authctxt Authctxt; 52 struct Authctxt { 94 int (*userauth)(Authctxt *authctxt); 108 void* (*init_ctx)(Authctxt*); 118 int auth_password(Authctxt *, const char *); 122 void pubkey_auth_info(Authctxt *, const Key *, const char *, ...) 124 void auth2_record_userkey(Authctxt *, struct sshkey *); 125 int auth2_userkey_already_used(Authctxt *, struct sshkey *) [all...] |
monitor.c | 169 static Authctxt *authctxt; variable 284 monitor_child_preauth(Authctxt *_authctxt, struct monitor *pmonitor) 296 authctxt = _authctxt; 297 memset(authctxt, 0, sizeof(*authctxt)); 299 authctxt->loginmsg = &loginmsg; 316 !auth2_update_methods_lists(authctxt, 329 if (authctxt->pw->pw_uid == 0 && 346 auth_log(authctxt, authenticated, partial [all...] |
auth2-pubkey.c | 78 userauth_pubkey(Authctxt *authctxt) 88 if (!authctxt->valid) { 130 if (auth2_userkey_already_used(authctxt, key)) { 154 xasprintf(&userstyle, "%s%s%s", authctxt->user, 155 authctxt->style ? ":" : "", 156 authctxt->style ? authctxt->style : ""); 162 authctxt->service); 174 pubkey_auth_info(authctxt, key, NULL) [all...] |
session.h | 36 Authctxt *authctxt; member in struct:Session 65 void do_authenticated(Authctxt *); 66 void do_cleanup(Authctxt *); 68 int session_open(Authctxt *, int);
|
auth2-hostbased.c | 59 userauth_hostbased(Authctxt *authctxt) 69 if (!authctxt->valid) { 119 authctxt->service; 124 buffer_put_cstring(&b, authctxt->user); 135 pubkey_auth_info(authctxt, key, 140 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) &&
|
session.c | 130 static void do_authenticated2(Authctxt *); 254 do_authenticated(Authctxt *authctxt) 256 setproctitle("%s", authctxt->pw->pw_name); 268 do_authenticated2(authctxt); 269 do_cleanup(authctxt); 729 if (options.use_pam && !use_privsep && s->authctxt->force_pwchange) { 732 s->authctxt->force_pwchange = 0; 1127 if (s->authctxt->krb5_ccname) 1129 s->authctxt->krb5_ccname) [all...] |
auth-pam.c | 246 static Authctxt *sshpam_authctxt = NULL; 293 fatal("%s: PAM authctxt not initialized", __func__); 458 fatal("%s: PAM authctxt not initialized", __func__); 621 sshpam_init(Authctxt *authctxt) 623 const char *pam_rhost, *pam_user, *user = authctxt->user; 639 sshpam_authctxt = authctxt; 672 sshpam_init_ctx(Authctxt *authctxt) 686 if (sshpam_init(authctxt) == -1) [all...] |
sshd.c | 244 Authctxt *the_authctxt = NULL; 579 privsep_preauth(Authctxt *authctxt) 609 monitor_child_preauth(authctxt, pmonitor); 648 privsep_postauth(Authctxt *authctxt) 653 if (authctxt->pw->pw_uid == 0) { 686 do_setusercontext(authctxt->pw); 1424 Authctxt *authctxt; local [all...] |
monitor_wrap.c | 350 mm_auth_password(Authctxt *authctxt, char *password) 558 mm_start_pam(Authctxt *authctxt) 601 mm_sshpam_init_ctx(Authctxt *authctxt) 618 return (authctxt);
|
serverloop.c | 84 extern Authctxt *the_authctxt; 352 server_loop2(Authctxt *authctxt)
|
/external/openssh/openbsd-compat/ |
port-uw.c | 54 sys_auth_passwd(Authctxt *authctxt, const char *password) 56 struct passwd *pw = authctxt->pw; 60 /* Just use the supplied fake password if authctxt is invalid */ 61 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; 84 if (authctxt->valid)
|