HomeSort by relevance Sort by last modified time
    Searched refs:authctxt (Results 1 - 24 of 24) sorted by null

  /external/openssh/
auth-bsdauth.c 47 bsdauth_init_ctx(Authctxt *authctxt)
49 return authctxt;
56 Authctxt *authctxt = ctx; local
64 if (authctxt->as != NULL) {
66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
68 auth_close(authctxt->as);
69 authctxt->as = NULL;
76 authctxt->style ? authctxt->style : "<default>")
100 Authctxt *authctxt = ctx; local
122 Authctxt *authctxt = ctx; local
    [all...]
auth-krb5.c 60 Authctxt *authctxt = (Authctxt *)context; local
63 if (authctxt->krb5_ctx == NULL) {
64 problem = krb5_init_context(&authctxt->krb5_ctx);
72 auth_krb5_password(Authctxt *authctxt, const char *password)
85 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name);
86 client = platform_client ? platform_client : authctxt->pw->pw_name;
88 temporarily_use_uid(authctxt->pw)
    [all...]
auth2.c 94 static Authmethod *authmethod_lookup(Authctxt *, const char *);
95 static char *authmethods_get(Authctxt *authctxt);
166 * loop until authctxt->success == TRUE
169 do_authentication2(Authctxt *authctxt)
173 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt);
180 Authctxt *authctxt = ctxt local
216 Authctxt *authctxt = ctxt; local
    [all...]
auth2-chall.c 50 static int auth2_challenge_start(Authctxt *);
51 static int send_userauth_info_request(Authctxt *);
158 kbdint_next_device(Authctxt *authctxt, KbdintAuthctxt *kbdintctxt)
174 !auth2_method_allowed(authctxt,
194 * try challenge-response, set authctxt->postponed if we have to
198 auth2_challenge(Authctxt *authctxt, char *devs)
201 authctxt->user ? authctxt->user : "<nouser>"
290 Authctxt *authctxt = ctxt; local
    [all...]
auth-skey.c 46 skey_init_ctx(Authctxt *authctxt)
48 return authctxt;
55 Authctxt *authctxt = ctx; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
77 Authctxt *authctxt = ctx; local
79 if (authctxt->valid &&
81 skey_haskey(authctxt->pw->pw_name) == 0 &
    [all...]
auth2-gss.c 61 userauth_gssapi(Authctxt *authctxt)
71 if (!authctxt->valid || authctxt->user == NULL)
100 authctxt->server_caused_failure = 1;
108 authctxt->server_caused_failure = 1;
112 authctxt->methoddata = (void *)ctxt;
124 authctxt->postponed = 1;
132 Authctxt *authctxt = ctxt local
187 Authctxt *authctxt = ctxt; local
228 Authctxt *authctxt = ctxt; local
255 Authctxt *authctxt = ctxt; local
    [all...]
auth-passwd.c 84 auth_password(Authctxt *authctxt, const char *password)
86 struct passwd * pw = authctxt->pw;
87 int result, ok = authctxt->valid;
104 int ret = auth_krb5_password(authctxt, password);
122 return (sshpam_auth_passwd(authctxt, password) && ok);
127 if (auth_shadow_pwexpired(authctxt))
128 authctxt->force_pwchange = 1;
131 result = sys_auth_passwd(authctxt, password);
132 if (authctxt->force_pwchange
    [all...]
sshconnect2.c 244 typedef struct cauthctxt Authctxt;
284 int (*userauth)(Authctxt *authctxt);
285 void (*cleanup)(Authctxt *authctxt);
301 int userauth_none(Authctxt *);
302 int userauth_pubkey(Authctxt *);
303 int userauth_passwd(Authctxt *);
304 int userauth_kbdint(Authctxt *);
305 int userauth_hostbased(Authctxt *);
369 Authctxt authctxt; local
417 Authctxt *authctxt = ctxt; local
519 Authctxt *authctxt = ctxt; local
536 Authctxt *authctxt = ctxt; local
550 Authctxt *authctxt = ctxt; local
576 Authctxt *authctxt = ctxt; local
707 Authctxt *authctxt = ctxt; local
762 Authctxt *authctxt = ctxt; local
803 Authctxt *authctxt = ctxt; local
832 Authctxt *authctxt = ctxt; local
934 Authctxt *authctxt = ctxt; local
1557 Authctxt *authctxt = ctxt; local
    [all...]
auth2-kbdint.c 46 userauth_kbdint(Authctxt *authctxt)
58 authenticated = auth2_challenge(authctxt, devs);
auth2-none.c 62 userauth_none(Authctxt *authctxt)
70 return (PRIVSEP(auth_password(authctxt, "")));
auth2-passwd.c 51 userauth_passwd(Authctxt *authctxt)
72 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
auth-sia.c 53 sys_auth_passwd(Authctxt *authctxt, const char *pass)
61 if (!authctxt->user || pass == NULL || pass[0] == '\0')
64 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
70 authctxt->user, host);
auth.c 271 auth_info(Authctxt *authctxt, const char *fmt, ...)
276 free(authctxt->info);
277 authctxt->info = NULL;
280 i = vasprintf(&authctxt->info, fmt, ap);
283 if (i < 0 || authctxt->info == NULL)
288 auth_log(Authctxt *authctxt, int authenticated, int partial,
295 if (use_privsep && !mm_is_monitor() && !authctxt->postponed)
300 !authctxt->valid |
    [all...]
auth.h 48 typedef struct Authctxt Authctxt;
52 struct Authctxt {
94 int (*userauth)(Authctxt *authctxt);
108 void* (*init_ctx)(Authctxt*);
118 int auth_password(Authctxt *, const char *);
122 void pubkey_auth_info(Authctxt *, const Key *, const char *, ...)
124 void auth2_record_userkey(Authctxt *, struct sshkey *);
125 int auth2_userkey_already_used(Authctxt *, struct sshkey *)
    [all...]
monitor.c 169 static Authctxt *authctxt; variable
284 monitor_child_preauth(Authctxt *_authctxt, struct monitor *pmonitor)
296 authctxt = _authctxt;
297 memset(authctxt, 0, sizeof(*authctxt));
299 authctxt->loginmsg = &loginmsg;
316 !auth2_update_methods_lists(authctxt,
329 if (authctxt->pw->pw_uid == 0 &&
346 auth_log(authctxt, authenticated, partial
    [all...]
auth2-pubkey.c 78 userauth_pubkey(Authctxt *authctxt)
88 if (!authctxt->valid) {
130 if (auth2_userkey_already_used(authctxt, key)) {
154 xasprintf(&userstyle, "%s%s%s", authctxt->user,
155 authctxt->style ? ":" : "",
156 authctxt->style ? authctxt->style : "");
162 authctxt->service);
174 pubkey_auth_info(authctxt, key, NULL)
    [all...]
session.h 36 Authctxt *authctxt; member in struct:Session
65 void do_authenticated(Authctxt *);
66 void do_cleanup(Authctxt *);
68 int session_open(Authctxt *, int);
auth2-hostbased.c 59 userauth_hostbased(Authctxt *authctxt)
69 if (!authctxt->valid) {
119 authctxt->service;
124 buffer_put_cstring(&b, authctxt->user);
135 pubkey_auth_info(authctxt, key,
140 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) &&
session.c 130 static void do_authenticated2(Authctxt *);
254 do_authenticated(Authctxt *authctxt)
256 setproctitle("%s", authctxt->pw->pw_name);
268 do_authenticated2(authctxt);
269 do_cleanup(authctxt);
729 if (options.use_pam && !use_privsep && s->authctxt->force_pwchange) {
732 s->authctxt->force_pwchange = 0;
1127 if (s->authctxt->krb5_ccname)
1129 s->authctxt->krb5_ccname)
    [all...]
auth-pam.c 246 static Authctxt *sshpam_authctxt = NULL;
293 fatal("%s: PAM authctxt not initialized", __func__);
458 fatal("%s: PAM authctxt not initialized", __func__);
621 sshpam_init(Authctxt *authctxt)
623 const char *pam_rhost, *pam_user, *user = authctxt->user;
639 sshpam_authctxt = authctxt;
672 sshpam_init_ctx(Authctxt *authctxt)
686 if (sshpam_init(authctxt) == -1)
    [all...]
sshd.c 244 Authctxt *the_authctxt = NULL;
579 privsep_preauth(Authctxt *authctxt)
609 monitor_child_preauth(authctxt, pmonitor);
648 privsep_postauth(Authctxt *authctxt)
653 if (authctxt->pw->pw_uid == 0) {
686 do_setusercontext(authctxt->pw);
1424 Authctxt *authctxt; local
    [all...]
monitor_wrap.c 350 mm_auth_password(Authctxt *authctxt, char *password)
558 mm_start_pam(Authctxt *authctxt)
601 mm_sshpam_init_ctx(Authctxt *authctxt)
618 return (authctxt);
serverloop.c 84 extern Authctxt *the_authctxt;
352 server_loop2(Authctxt *authctxt)
  /external/openssh/openbsd-compat/
port-uw.c 54 sys_auth_passwd(Authctxt *authctxt, const char *password)
56 struct passwd *pw = authctxt->pw;
60 /* Just use the supplied fake password if authctxt is invalid */
61 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd;
84 if (authctxt->valid)

Completed in 708 milliseconds