HomeSort by relevance Sort by last modified time
    Searched refs:authctxt (Results 1 - 25 of 29) sorted by null

1 2

  /external/openssh/
auth-bsdauth.c 45 bsdauth_init_ctx(Authctxt *authctxt)
47 return authctxt;
54 Authctxt *authctxt = ctx; local
57 if (authctxt->as != NULL) {
59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
61 auth_close(authctxt->as);
62 authctxt->as = NULL;
69 authctxt->style ? authctxt->style : "<default>")
93 Authctxt *authctxt = ctx; local
115 Authctxt *authctxt = ctx; local
    [all...]
auth-krb5.c 60 Authctxt *authctxt = (Authctxt *)context; local
63 if (authctxt->krb5_ctx == NULL) {
64 problem = krb5_init_context(&authctxt->krb5_ctx);
72 auth_krb5_password(Authctxt *authctxt, const char *password)
84 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name);
85 client = platform_client ? platform_client : authctxt->pw->pw_name;
87 temporarily_use_uid(authctxt->pw)
    [all...]
auth-chall.c 46 get_challenge(Authctxt *authctxt)
60 if ((authctxt->kbdintctxt = device->init_ctx(authctxt)) == NULL)
62 if (device->query(authctxt->kbdintctxt, &name, &info,
64 device->free_ctx(authctxt->kbdintctxt);
65 authctxt->kbdintctxt = NULL;
81 verify_response(Authctxt *authctxt, const char *response)
89 if (authctxt->kbdintctxt == NULL
    [all...]
auth1.c 48 static int auth1_process_password(Authctxt *, char *, size_t);
49 static int auth1_process_rsa(Authctxt *, char *, size_t);
50 static int auth1_process_rhosts_rsa(Authctxt *, char *, size_t);
51 static int auth1_process_tis_challenge(Authctxt *, char *, size_t);
52 static int auth1_process_tis_response(Authctxt *, char *, size_t);
60 int (*method)(Authctxt *, char *, size_t);
115 auth1_process_password(Authctxt *authctxt, char *info, size_t infolen)
131 authenticated = PRIVSEP(auth_password(authctxt, password));
146 auth1_process_rsa(Authctxt *authctxt, char *info, size_t infolen
    [all...]
auth2.c 168 * loop until authctxt->success == TRUE
171 do_authentication2(Authctxt *authctxt)
175 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt);
182 Authctxt *authctxt = ctxt; local
188 if (authctxt == NULL)
189 fatal("input_service_request: no authctxt");
192 if (!authctxt->success)
216 Authctxt *authctxt = ctxt; local
    [all...]
auth2-gss.c 60 userauth_gssapi(Authctxt *authctxt)
71 if (!authctxt->valid || authctxt->user == NULL)
105 authctxt->server_caused_failure = 1;
113 authctxt->server_caused_failure = 1;
117 authctxt->methoddata = (void *)ctxt;
129 authctxt->postponed = 1;
137 Authctxt *authctxt = ctxt local
191 Authctxt *authctxt = ctxt; local
231 Authctxt *authctxt = ctxt; local
260 Authctxt *authctxt = ctxt; local
    [all...]
auth2-jpake.c 71 static int auth2_jpake_start(Authctxt *);
82 userauth_jpake(Authctxt *authctxt)
90 if (authctxt->user != NULL) {
91 if (authctxt->jpake_ctx == NULL)
92 authctxt->jpake_ctx = jpake_new();
94 authenticated = auth2_jpake_start(authctxt);
108 auth2_jpake_stop(Authctxt *authctxt)
114 if (authctxt->jpake_ctx != NULL)
425 Authctxt *authctxt = ctxt; local
483 Authctxt *authctxt = ctxt; local
533 Authctxt *authctxt = ctxt; local
    [all...]
auth-skey.c 46 skey_init_ctx(Authctxt *authctxt)
48 return authctxt;
55 Authctxt *authctxt = ctx; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
77 Authctxt *authctxt = ctx; local
79 if (authctxt->valid &&
81 skey_haskey(authctxt->pw->pw_name) == 0 &
    [all...]
auth2-chall.c 49 static int auth2_challenge_start(Authctxt *);
50 static int send_userauth_info_request(Authctxt *);
186 * try challenge-response, set authctxt->postponed if we have to
190 auth2_challenge(Authctxt *authctxt, char *devs)
193 authctxt->user ? authctxt->user : "<nouser>",
196 if (authctxt->user == NULL || !devs)
198 if (authctxt->kbdintctxt == NULL)
199 authctxt->kbdintctxt = kbdint_alloc(devs)
282 Authctxt *authctxt = ctxt; local
    [all...]
auth-passwd.c 81 auth_password(Authctxt *authctxt, const char *password)
83 struct passwd * pw = authctxt->pw;
84 int result, ok = authctxt->valid;
98 int ret = auth_krb5_password(authctxt, password);
116 return (sshpam_auth_passwd(authctxt, password) && ok);
121 if (auth_shadow_pwexpired(authctxt))
122 authctxt->force_pwchange = 1;
125 result = sys_auth_passwd(authctxt, password);
126 if (authctxt->force_pwchange
    [all...]
auth2-kbdint.c 45 userauth_kbdint(Authctxt *authctxt)
57 authenticated = auth2_challenge(authctxt, devs);
auth2-none.c 60 userauth_none(Authctxt *authctxt)
67 return (PRIVSEP(auth_password(authctxt, "")));
sshconnect2.c 239 typedef struct Authctxt Authctxt;
254 struct Authctxt {
274 int (*userauth)(Authctxt *authctxt);
275 void (*cleanup)(Authctxt *authctxt);
292 int userauth_none(Authctxt *);
293 int userauth_pubkey(Authctxt *);
294 int userauth_passwd(Authctxt *);
368 Authctxt authctxt; local
498 Authctxt *authctxt = ctxt; local
518 Authctxt *authctxt = ctxt; local
531 Authctxt *authctxt = ctxt; local
553 Authctxt *authctxt = ctxt; local
681 Authctxt *authctxt = ctxt; local
736 Authctxt *authctxt = ctxt; local
776 Authctxt *authctxt = ctxt; local
804 Authctxt *authctxt = ctxt; local
905 Authctxt *authctxt = ctxt; local
1030 Authctxt *authctxt = ctxt; local
1098 Authctxt *authctxt = ctxt; local
1145 Authctxt *authctxt = ctxt; local
1522 Authctxt *authctxt = ctxt; local
    [all...]
auth-rh-rsa.c 66 auth_rhosts_rsa(Authctxt *authctxt, char *cuser, Key *client_host_key)
69 struct passwd *pw = authctxt->pw;
74 if (!authctxt->valid || client_host_key == NULL ||
auth2-passwd.c 50 userauth_passwd(Authctxt *authctxt)
71 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
auth-sia.c 53 sys_auth_passwd(Authctxt *authctxt, const char *pass)
61 if (!authctxt->user || pass == NULL || pass[0] == '\0')
64 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
70 authctxt->user, host);
auth.h 45 typedef struct Authctxt Authctxt;
49 struct Authctxt {
86 int (*userauth)(Authctxt *authctxt);
100 void* (*init_ctx)(Authctxt*);
111 int auth_rhosts_rsa(Authctxt *, char *, Key *);
112 int auth_password(Authctxt *, const char *);
113 int auth_rsa(Authctxt *, BIGNUM *);
124 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *)
    [all...]
auth2-hostbased.c 57 userauth_hostbased(Authctxt *authctxt)
67 if (!authctxt->valid) {
104 authctxt->service;
109 buffer_put_cstring(&b, authctxt->user);
121 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) &&
monitor.c 192 static Authctxt *authctxt; variable
352 monitor_child_preauth(Authctxt *_authctxt, struct monitor *pmonitor)
363 authctxt = _authctxt;
364 memset(authctxt, 0, sizeof(*authctxt));
366 authctxt->loginmsg = &loginmsg;
388 if (authctxt->pw->pw_uid == 0 &&
406 auth_log(authctxt, authenticated, auth_method,
409 authctxt->failures++
    [all...]
session.h 36 Authctxt *authctxt; member in struct:Session
65 void do_authenticated(Authctxt *);
66 void do_cleanup(Authctxt *);
68 int session_open(Authctxt *, int);
auth.c 254 auth_log(Authctxt *authctxt, int authenticated, char *method, char *info)
259 if (use_privsep && !mm_is_monitor() && !authctxt->postponed)
264 !authctxt->valid ||
265 authctxt->failures >= options.max_authtries / 2 ||
269 if (authctxt->postponed)
277 authctxt->valid ? "" : "invalid user ",
278 authctxt->user,
284 if (authenticated == 0 && !authctxt->postponed &&
288 record_failed_login(authctxt->user
    [all...]
auth2-pubkey.c 68 userauth_pubkey(Authctxt *authctxt)
78 if (!authctxt->valid) {
124 buffer_put_cstring(&b, authctxt->user);
128 authctxt->service);
142 if (PRIVSEP(user_key_allowed(authctxt->pw, key)) &&
160 if (PRIVSEP(user_key_allowed(authctxt->pw, key))) {
166 authctxt->postponed = 1;
session.c 127 static void do_authenticated1(Authctxt *);
128 static void do_authenticated2(Authctxt *);
271 do_authenticated(Authctxt *authctxt)
273 setproctitle("%s", authctxt->pw->pw_name);
282 do_authenticated2(authctxt);
284 do_authenticated1(authctxt);
286 do_cleanup(authctxt);
296 do_authenticated1(Authctxt *authctxt)
    [all...]
auth-pam.c 232 static Authctxt *sshpam_authctxt = NULL;
280 fatal("%s: PAM authctxt not initialized", __func__);
461 fatal("%s: PAM authctxt not initialized", __func__);
621 sshpam_init(Authctxt *authctxt)
624 const char *pam_rhost, *pam_user, *user = authctxt->user;
639 sshpam_authctxt = authctxt;
672 sshpam_init_ctx(Authctxt *authctxt)
686 if (sshpam_init(authctxt) == -1)
    [all...]
  /external/openssh/openbsd-compat/
port-uw.c 53 sys_auth_passwd(Authctxt *authctxt, const char *password)
55 struct passwd *pw = authctxt->pw;
59 /* Just use the supplied fake password if authctxt is invalid */
60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd;
83 if (authctxt->valid)

Completed in 256 milliseconds

1 2