Home | History | Annotate | Download | only in openssh

Lines Matching refs:user

54 static char *client_user = NULL;    /* Used to fill in remote user for PAM */
122 * Read user password. It is in plain text, but was
172 * Get client user name. Note that we just have to
174 * claim to be any user.
238 * read packets, try to authenticate the user and
250 authctxt->valid ? "" : "invalid user ", authctxt->user);
254 /* If the user has no password, accept authentication immediately. */
321 fatal("INTERNAL ERROR: authenticated invalid user %s",
322 authctxt->user);
325 if (authenticated && cray_access_denied(authctxt->user)) {
327 fatal("Access denied for user %s.",authctxt->user);
348 error("Access denied for user %s by PAM account "
349 "configuration", authctxt->user);
379 packet_disconnect(AUTH_FAIL_MSG, authctxt->user);
396 char *user, *style = NULL;
398 /* Get the name of the user that we wish to log in as. */
401 /* Get the user name. */
402 user = packet_get_cstring(&ulen);
405 if ((style = strchr(user, ':')) != NULL)
408 authctxt->user = user;
411 /* Verify that the user is a valid user. */
412 if ((authctxt->pw = PRIVSEP(getpwnamallow(user))) != NULL)
415 debug("do_authentication: invalid user %s", user);
419 setproctitle("%s%s", authctxt->valid ? user : "unknown",
428 * If we are not running as root, the user must have the same uid as
434 packet_disconnect("Cannot change user when server not running as root.");
438 * Loop until the user has been authenticated or the connection is
443 /* The user has been authenticated and accepted. */