Lines Matching refs:Authctxt
168 * loop until authctxt->success == TRUE
171 do_authentication2(Authctxt *authctxt)
175 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt);
182 Authctxt *authctxt = ctxt;
188 if (authctxt == NULL)
189 fatal("input_service_request: no authctxt");
192 if (!authctxt->success) {
216 Authctxt *authctxt = ctxt;
221 if (authctxt == NULL)
222 fatal("input_userauth_request: no authctxt");
228 debug("attempt %d failures %d", authctxt->attempt, authctxt->failures);
233 if (authctxt->attempt++ == 0) {
235 authctxt->pw = PRIVSEP(getpwnamallow(user));
236 authctxt->user = xstrdup(user);
237 if (authctxt->pw && strcmp(service, "ssh-connection")==0) {
238 authctxt->valid = 1;
239 debug2("input_userauth_request: setting up authctxt for %s", user);
242 authctxt->pw = fakepw();
249 PRIVSEP(start_pam(authctxt));
251 setproctitle("%s%s", authctxt->valid ? user : "unknown",
253 authctxt->service = xstrdup(service);
254 authctxt->style = style ? xstrdup(style) : NULL;
258 } else if (strcmp(user, authctxt->user) != 0 ||
259 strcmp(service, authctxt->service) != 0) {
262 authctxt->user, authctxt->service, user, service);
265 auth2_challenge_stop(authctxt);
267 auth2_jpake_stop(authctxt);
276 authctxt->postponed = 0;
277 authctxt->server_caused_failure = 0;
281 if (m != NULL && authctxt->failures < options.max_authtries) {
283 authenticated = m->userauth(authctxt);
285 userauth_finish(authctxt, authenticated, method);
293 userauth_finish(Authctxt *authctxt, int authenticated, char *method)
297 if (!authctxt->valid && authenticated)
299 authctxt->user);
302 if (authenticated && authctxt->pw->pw_uid == 0 &&
320 "configuration", authctxt->user);
326 if (authenticated && cray_access_denied(authctxt->user)) {
328 fatal("Access denied for user %s.",authctxt->user);
333 auth_log(authctxt, authenticated, method, " ssh2");
335 if (authctxt->postponed)
346 authctxt->success = 1;
350 if (!authctxt->server_caused_failure &&
351 (authctxt->attempt > 1 || strcmp(method, "none") != 0))
352 authctxt->failures++;
353 if (authctxt->failures >= options.max_authtries) {
357 packet_disconnect(AUTH_FAIL_MSG, authctxt->user);