Home | History | Annotate | Download | only in openssh

Lines Matching refs:authctxt

192 static Authctxt *authctxt;
352 monitor_child_preauth(Authctxt *_authctxt, struct monitor *pmonitor)
363 authctxt = _authctxt;
364 memset(authctxt, 0, sizeof(*authctxt));
366 authctxt->loginmsg = &loginmsg;
388 if (authctxt->pw->pw_uid == 0 &&
406 auth_log(authctxt, authenticated, auth_method,
409 authctxt->failures++;
414 if (authctxt->jpake_ctx != NULL) {
415 jpake_free(authctxt->jpake_ctx);
416 authctxt->jpake_ctx = NULL;
426 if (!authctxt->valid)
432 __func__, authctxt->user);
737 if (authctxt->attempt++ != 0)
744 authctxt->user = xstrdup(username);
752 authctxt->pw = fakepw();
757 authctxt->pw = pwent;
758 authctxt->valid = 1;
828 authctxt->service = buffer_get_string(m, NULL);
829 authctxt->style = buffer_get_string(m, NULL);
831 __func__, authctxt->service, authctxt->style);
833 if (strlen(authctxt->style) == 0) {
834 xfree(authctxt->style);
835 authctxt->style = NULL;
854 auth_password(authctxt, passwd);
887 success = bsdauth_query(authctxt, &name, &infotxt, &numprompts,
914 if (authctxt->as == 0)
919 auth_userresponse(authctxt->as, response, 0);
920 authctxt->as = NULL;
944 success = _compat_skeychallenge(&skey, authctxt->user, challenge,
967 authctxt->valid &&
968 skey_haskey(authctxt->pw->pw_name) == 0 &&
969 skey_passcheck(authctxt->pw->pw_name, response) != -1);
992 start_pam(authctxt);
1025 authctxt->user = buffer_get_string(m, NULL);
1026 sshpam_ctxt = (sshpam_device.init_ctx)(authctxt);
1142 if (key != NULL && authctxt->valid) {
1146 user_key_allowed(authctxt->pw, key);
1153 hostbased_key_allowed(authctxt->pw,
1160 auth_rhosts_rsa_key_allowed(authctxt->pw,
1186 auth_log(authctxt, 0, auth_method, compat20 ? " ssh2" : "");
1237 if (strcmp(authctxt->user, p) != 0) {
1239 authctxt->user, p);
1285 if (strcmp(authctxt->user, p) != 0) {
1287 authctxt->user, p);
1424 s->authctxt = authctxt;
1425 s->pw = authctxt->pw;
1430 pty_setowner(authctxt->pw, s->tty);
1439 mm_record_login(s, authctxt->pw);
1554 if (options.rsa_authentication && authctxt->valid) {
1558 allowed = auth_rsa_key_allowed(authctxt->pw, client_n, &key);
1598 if (!authctxt->valid)
1599 fatal("%s: authctxt not valid", __func__);
1637 if (!authctxt->valid)
1638 fatal("%s: authctxt not valid", __func__);
2099 authenticated = authctxt->valid && ssh_gssapi_userok(authctxt->user);
2125 if (authctxt->jpake_ctx != NULL)
2126 fatal("%s: authctxt->jpake_ctx already set (%p)",
2127 __func__, authctxt->jpake_ctx);
2128 authctxt->jpake_ctx = pctx = jpake_new();
2163 struct jpake_ctx *pctx = authctxt->jpake_ctx;
2169 auth2_jpake_get_pwdata(authctxt, &pctx->s, &hash_scheme, &salt);
2192 struct jpake_ctx *pctx = authctxt->jpake_ctx;
2243 struct jpake_ctx *pctx = authctxt->jpake_ctx;
2286 struct jpake_ctx *pctx = authctxt->jpake_ctx;
2296 peer_confirm_hash, peer_confirm_hash_len) && authctxt->valid;