HomeSort by relevance Sort by last modified time
    Searched refs:Authctxt (Results 1 - 25 of 37) sorted by null

1 2

  /external/openssh/
serverloop.h 25 void server_loop2(Authctxt *);
auth.h 45 typedef struct Authctxt Authctxt;
49 struct Authctxt {
86 int (*userauth)(Authctxt *authctxt);
100 void* (*init_ctx)(Authctxt*);
111 int auth_rhosts_rsa(Authctxt *, char *, Key *);
112 int auth_password(Authctxt *, const char *);
113 int auth_rsa(Authctxt *, BIGNUM *);
124 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *)
    [all...]
auth-pam.h 34 void start_pam(Authctxt *);
47 int sshpam_auth_passwd(Authctxt *, const char *);
session.h 36 Authctxt *authctxt; member in struct:Session
65 void do_authenticated(Authctxt *);
66 void do_cleanup(Authctxt *);
68 int session_open(Authctxt *, int);
auth1.c 48 static int auth1_process_password(Authctxt *, char *, size_t);
49 static int auth1_process_rsa(Authctxt *, char *, size_t);
50 static int auth1_process_rhosts_rsa(Authctxt *, char *, size_t);
51 static int auth1_process_tis_challenge(Authctxt *, char *, size_t);
52 static int auth1_process_tis_response(Authctxt *, char *, size_t);
60 int (*method)(Authctxt *, char *, size_t);
115 auth1_process_password(Authctxt *authctxt, char *info, size_t infolen)
131 authenticated = PRIVSEP(auth_password(authctxt, password));
146 auth1_process_rsa(Authctxt *authctxt, char *info, size_t infolen
    [all...]
auth-bsdauth.c 45 bsdauth_init_ctx(Authctxt *authctxt)
47 return authctxt;
54 Authctxt *authctxt = ctx; local
57 if (authctxt->as != NULL) {
59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
61 auth_close(authctxt->as);
62 authctxt->as = NULL;
69 authctxt->style ? authctxt->style : "<default>")
93 Authctxt *authctxt = ctx; local
115 Authctxt *authctxt = ctx; local
    [all...]
auth2-kbdint.c 45 userauth_kbdint(Authctxt *authctxt)
57 authenticated = auth2_challenge(authctxt, devs);
auth2-none.c 60 userauth_none(Authctxt *authctxt)
67 return (PRIVSEP(auth_password(authctxt, "")));
auth-skey.c 46 skey_init_ctx(Authctxt *authctxt)
48 return authctxt;
55 Authctxt *authctxt = ctx; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
77 Authctxt *authctxt = ctx; local
79 if (authctxt->valid &&
81 skey_haskey(authctxt->pw->pw_name) == 0 &
    [all...]
monitor_wrap.h 38 struct Authctxt;
47 int mm_auth_password(struct Authctxt *, char *);
66 void mm_start_pam(struct Authctxt *);
68 void *mm_sshpam_init_ctx(struct Authctxt *);
107 void mm_auth2_jpake_get_pwdata(struct Authctxt *, BIGNUM **, char **, char **);
auth-chall.c 46 get_challenge(Authctxt *authctxt)
60 if ((authctxt->kbdintctxt = device->init_ctx(authctxt)) == NULL)
62 if (device->query(authctxt->kbdintctxt, &name, &info,
64 device->free_ctx(authctxt->kbdintctxt);
65 authctxt->kbdintctxt = NULL;
81 verify_response(Authctxt *authctxt, const char *response)
89 if (authctxt->kbdintctxt == NULL
    [all...]
auth2-passwd.c 50 userauth_passwd(Authctxt *authctxt)
71 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
monitor.h 87 struct Authctxt;
88 void monitor_child_preauth(struct Authctxt *, struct monitor *);
auth2-chall.c 49 static int auth2_challenge_start(Authctxt *);
50 static int send_userauth_info_request(Authctxt *);
186 * try challenge-response, set authctxt->postponed if we have to
190 auth2_challenge(Authctxt *authctxt, char *devs)
193 authctxt->user ? authctxt->user : "<nouser>",
196 if (authctxt->user == NULL || !devs)
198 if (authctxt->kbdintctxt == NULL)
199 authctxt->kbdintctxt = kbdint_alloc(devs)
282 Authctxt *authctxt = ctxt; local
    [all...]
sshconnect2.c 239 typedef struct Authctxt Authctxt;
254 struct Authctxt {
274 int (*userauth)(Authctxt *authctxt);
275 void (*cleanup)(Authctxt *authctxt);
292 int userauth_none(Authctxt *);
293 int userauth_pubkey(Authctxt *);
294 int userauth_passwd(Authctxt *);
368 Authctxt authctxt; local
498 Authctxt *authctxt = ctxt; local
518 Authctxt *authctxt = ctxt; local
531 Authctxt *authctxt = ctxt; local
553 Authctxt *authctxt = ctxt; local
681 Authctxt *authctxt = ctxt; local
736 Authctxt *authctxt = ctxt; local
776 Authctxt *authctxt = ctxt; local
804 Authctxt *authctxt = ctxt; local
905 Authctxt *authctxt = ctxt; local
1030 Authctxt *authctxt = ctxt; local
1098 Authctxt *authctxt = ctxt; local
1145 Authctxt *authctxt = ctxt; local
1522 Authctxt *authctxt = ctxt; local
    [all...]
auth-passwd.c 81 auth_password(Authctxt *authctxt, const char *password)
83 struct passwd * pw = authctxt->pw;
84 int result, ok = authctxt->valid;
98 int ret = auth_krb5_password(authctxt, password);
116 return (sshpam_auth_passwd(authctxt, password) && ok);
121 if (auth_shadow_pwexpired(authctxt))
122 authctxt->force_pwchange = 1;
125 result = sys_auth_passwd(authctxt, password);
126 if (authctxt->force_pwchange
    [all...]
auth-rh-rsa.c 66 auth_rhosts_rsa(Authctxt *authctxt, char *cuser, Key *client_host_key)
69 struct passwd *pw = authctxt->pw;
74 if (!authctxt->valid || client_host_key == NULL ||
auth2-jpake.c 71 static int auth2_jpake_start(Authctxt *);
82 userauth_jpake(Authctxt *authctxt)
90 if (authctxt->user != NULL) {
91 if (authctxt->jpake_ctx == NULL)
92 authctxt->jpake_ctx = jpake_new();
94 authenticated = auth2_jpake_start(authctxt);
108 auth2_jpake_stop(Authctxt *authctxt)
114 if (authctxt->jpake_ctx != NULL)
425 Authctxt *authctxt = ctxt; local
483 Authctxt *authctxt = ctxt; local
533 Authctxt *authctxt = ctxt; local
    [all...]
auth2-gss.c 60 userauth_gssapi(Authctxt *authctxt)
71 if (!authctxt->valid || authctxt->user == NULL)
105 authctxt->server_caused_failure = 1;
113 authctxt->server_caused_failure = 1;
117 authctxt->methoddata = (void *)ctxt;
129 authctxt->postponed = 1;
137 Authctxt *authctxt = ctxt local
191 Authctxt *authctxt = ctxt; local
231 Authctxt *authctxt = ctxt; local
260 Authctxt *authctxt = ctxt; local
    [all...]
auth-krb5.c 60 Authctxt *authctxt = (Authctxt *)context; local
63 if (authctxt->krb5_ctx == NULL) {
64 problem = krb5_init_context(&authctxt->krb5_ctx);
72 auth_krb5_password(Authctxt *authctxt, const char *password)
84 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name);
85 client = platform_client ? platform_client : authctxt->pw->pw_name;
87 temporarily_use_uid(authctxt->pw)
    [all...]
auth-sia.c 53 sys_auth_passwd(Authctxt *authctxt, const char *pass)
61 if (!authctxt->user || pass == NULL || pass[0] == '\0')
64 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
70 authctxt->user, host);
audit.c 45 extern Authctxt *the_authctxt;
auth-shadow.c 88 auth_shadow_pwexpired(Authctxt *ctxt)
auth2.c 168 * loop until authctxt->success == TRUE
171 do_authentication2(Authctxt *authctxt)
175 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt);
182 Authctxt *authctxt = ctxt; local
188 if (authctxt == NULL)
189 fatal("input_service_request: no authctxt");
192 if (!authctxt->success)
216 Authctxt *authctxt = ctxt; local
    [all...]
  /external/openssh/openbsd-compat/
port-uw.c 53 sys_auth_passwd(Authctxt *authctxt, const char *password)
55 struct passwd *pw = authctxt->pw;
59 /* Just use the supplied fake password if authctxt is invalid */
60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd;
83 if (authctxt->valid)

Completed in 256 milliseconds

1 2