/external/openssh/ |
serverloop.h | 25 void server_loop2(Authctxt *);
|
auth.h | 45 typedef struct Authctxt Authctxt; 49 struct Authctxt { 86 int (*userauth)(Authctxt *authctxt); 100 void* (*init_ctx)(Authctxt*); 111 int auth_rhosts_rsa(Authctxt *, char *, Key *); 112 int auth_password(Authctxt *, const char *); 113 int auth_rsa(Authctxt *, BIGNUM *); 124 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *) [all...] |
auth-pam.h | 34 void start_pam(Authctxt *); 47 int sshpam_auth_passwd(Authctxt *, const char *);
|
session.h | 36 Authctxt *authctxt; member in struct:Session 65 void do_authenticated(Authctxt *); 66 void do_cleanup(Authctxt *); 68 int session_open(Authctxt *, int);
|
auth1.c | 48 static int auth1_process_password(Authctxt *, char *, size_t); 49 static int auth1_process_rsa(Authctxt *, char *, size_t); 50 static int auth1_process_rhosts_rsa(Authctxt *, char *, size_t); 51 static int auth1_process_tis_challenge(Authctxt *, char *, size_t); 52 static int auth1_process_tis_response(Authctxt *, char *, size_t); 60 int (*method)(Authctxt *, char *, size_t); 115 auth1_process_password(Authctxt *authctxt, char *info, size_t infolen) 131 authenticated = PRIVSEP(auth_password(authctxt, password)); 146 auth1_process_rsa(Authctxt *authctxt, char *info, size_t infolen [all...] |
auth-bsdauth.c | 45 bsdauth_init_ctx(Authctxt *authctxt) 47 return authctxt; 54 Authctxt *authctxt = ctx; local 57 if (authctxt->as != NULL) { 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 61 auth_close(authctxt->as); 62 authctxt->as = NULL; 69 authctxt->style ? authctxt->style : "<default>") 93 Authctxt *authctxt = ctx; local 115 Authctxt *authctxt = ctx; local [all...] |
auth2-kbdint.c | 45 userauth_kbdint(Authctxt *authctxt) 57 authenticated = auth2_challenge(authctxt, devs);
|
auth2-none.c | 60 userauth_none(Authctxt *authctxt) 67 return (PRIVSEP(auth_password(authctxt, "")));
|
auth-skey.c | 46 skey_init_ctx(Authctxt *authctxt) 48 return authctxt; 55 Authctxt *authctxt = ctx; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 77 Authctxt *authctxt = ctx; local 79 if (authctxt->valid && 81 skey_haskey(authctxt->pw->pw_name) == 0 & [all...] |
monitor_wrap.h | 38 struct Authctxt; 47 int mm_auth_password(struct Authctxt *, char *); 66 void mm_start_pam(struct Authctxt *); 68 void *mm_sshpam_init_ctx(struct Authctxt *); 107 void mm_auth2_jpake_get_pwdata(struct Authctxt *, BIGNUM **, char **, char **);
|
auth-chall.c | 46 get_challenge(Authctxt *authctxt) 60 if ((authctxt->kbdintctxt = device->init_ctx(authctxt)) == NULL) 62 if (device->query(authctxt->kbdintctxt, &name, &info, 64 device->free_ctx(authctxt->kbdintctxt); 65 authctxt->kbdintctxt = NULL; 81 verify_response(Authctxt *authctxt, const char *response) 89 if (authctxt->kbdintctxt == NULL [all...] |
auth2-passwd.c | 50 userauth_passwd(Authctxt *authctxt) 71 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
|
monitor.h | 87 struct Authctxt; 88 void monitor_child_preauth(struct Authctxt *, struct monitor *);
|
auth2-chall.c | 49 static int auth2_challenge_start(Authctxt *); 50 static int send_userauth_info_request(Authctxt *); 186 * try challenge-response, set authctxt->postponed if we have to 190 auth2_challenge(Authctxt *authctxt, char *devs) 193 authctxt->user ? authctxt->user : "<nouser>", 196 if (authctxt->user == NULL || !devs) 198 if (authctxt->kbdintctxt == NULL) 199 authctxt->kbdintctxt = kbdint_alloc(devs) 282 Authctxt *authctxt = ctxt; local [all...] |
sshconnect2.c | 239 typedef struct Authctxt Authctxt; 254 struct Authctxt { 274 int (*userauth)(Authctxt *authctxt); 275 void (*cleanup)(Authctxt *authctxt); 292 int userauth_none(Authctxt *); 293 int userauth_pubkey(Authctxt *); 294 int userauth_passwd(Authctxt *); 368 Authctxt authctxt; local 498 Authctxt *authctxt = ctxt; local 518 Authctxt *authctxt = ctxt; local 531 Authctxt *authctxt = ctxt; local 553 Authctxt *authctxt = ctxt; local 681 Authctxt *authctxt = ctxt; local 736 Authctxt *authctxt = ctxt; local 776 Authctxt *authctxt = ctxt; local 804 Authctxt *authctxt = ctxt; local 905 Authctxt *authctxt = ctxt; local 1030 Authctxt *authctxt = ctxt; local 1098 Authctxt *authctxt = ctxt; local 1145 Authctxt *authctxt = ctxt; local 1522 Authctxt *authctxt = ctxt; local [all...] |
auth-passwd.c | 81 auth_password(Authctxt *authctxt, const char *password) 83 struct passwd * pw = authctxt->pw; 84 int result, ok = authctxt->valid; 98 int ret = auth_krb5_password(authctxt, password); 116 return (sshpam_auth_passwd(authctxt, password) && ok); 121 if (auth_shadow_pwexpired(authctxt)) 122 authctxt->force_pwchange = 1; 125 result = sys_auth_passwd(authctxt, password); 126 if (authctxt->force_pwchange [all...] |
auth-rh-rsa.c | 66 auth_rhosts_rsa(Authctxt *authctxt, char *cuser, Key *client_host_key) 69 struct passwd *pw = authctxt->pw; 74 if (!authctxt->valid || client_host_key == NULL ||
|
auth2-jpake.c | 71 static int auth2_jpake_start(Authctxt *); 82 userauth_jpake(Authctxt *authctxt) 90 if (authctxt->user != NULL) { 91 if (authctxt->jpake_ctx == NULL) 92 authctxt->jpake_ctx = jpake_new(); 94 authenticated = auth2_jpake_start(authctxt); 108 auth2_jpake_stop(Authctxt *authctxt) 114 if (authctxt->jpake_ctx != NULL) 425 Authctxt *authctxt = ctxt; local 483 Authctxt *authctxt = ctxt; local 533 Authctxt *authctxt = ctxt; local [all...] |
auth2-gss.c | 60 userauth_gssapi(Authctxt *authctxt) 71 if (!authctxt->valid || authctxt->user == NULL) 105 authctxt->server_caused_failure = 1; 113 authctxt->server_caused_failure = 1; 117 authctxt->methoddata = (void *)ctxt; 129 authctxt->postponed = 1; 137 Authctxt *authctxt = ctxt local 191 Authctxt *authctxt = ctxt; local 231 Authctxt *authctxt = ctxt; local 260 Authctxt *authctxt = ctxt; local [all...] |
auth-krb5.c | 60 Authctxt *authctxt = (Authctxt *)context; local 63 if (authctxt->krb5_ctx == NULL) { 64 problem = krb5_init_context(&authctxt->krb5_ctx); 72 auth_krb5_password(Authctxt *authctxt, const char *password) 84 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name); 85 client = platform_client ? platform_client : authctxt->pw->pw_name; 87 temporarily_use_uid(authctxt->pw) [all...] |
auth-sia.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *pass) 61 if (!authctxt->user || pass == NULL || pass[0] == '\0') 64 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user, 70 authctxt->user, host);
|
audit.c | 45 extern Authctxt *the_authctxt;
|
auth-shadow.c | 88 auth_shadow_pwexpired(Authctxt *ctxt)
|
auth2.c | 168 * loop until authctxt->success == TRUE 171 do_authentication2(Authctxt *authctxt) 175 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt); 182 Authctxt *authctxt = ctxt; local 188 if (authctxt == NULL) 189 fatal("input_service_request: no authctxt"); 192 if (!authctxt->success) 216 Authctxt *authctxt = ctxt; local [all...] |
/external/openssh/openbsd-compat/ |
port-uw.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *password) 55 struct passwd *pw = authctxt->pw; 59 /* Just use the supplied fake password if authctxt is invalid */ 60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; 83 if (authctxt->valid)
|