/external/openssh/ |
auth-bsdauth.c | 47 bsdauth_init_ctx(Authctxt *authctxt) 49 return authctxt; 56 Authctxt *authctxt = ctx; local 64 if (authctxt->as != NULL) { 66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 68 auth_close(authctxt->as); 69 authctxt->as = NULL; 76 authctxt->style ? authctxt->style : "<default>") 100 Authctxt *authctxt = ctx; local 122 Authctxt *authctxt = ctx; local [all...] |
auth-skey.c | 46 skey_init_ctx(Authctxt *authctxt) 48 return authctxt; 55 Authctxt *authctxt = ctx; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 77 Authctxt *authctxt = ctx; local 79 if (authctxt->valid && 81 skey_haskey(authctxt->pw->pw_name) == 0 & [all...] |
auth-krb5.c | 61 Authctxt *authctxt = (Authctxt *)context; local 64 if (authctxt->krb5_ctx == NULL) { 65 problem = krb5_init_context(&authctxt->krb5_ctx); 73 auth_krb5_password(Authctxt *authctxt, const char *password) 86 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name); 87 client = platform_client ? platform_client : authctxt->pw->pw_name; 89 temporarily_use_uid(authctxt->pw) [all...] |
auth2-gss.c | 61 userauth_gssapi(Authctxt *authctxt) 71 if (!authctxt->valid || authctxt->user == NULL) 100 authctxt->server_caused_failure = 1; 108 authctxt->server_caused_failure = 1; 112 authctxt->methoddata = (void *)ctxt; 124 authctxt->postponed = 1; 132 Authctxt *authctxt = ctxt local 187 Authctxt *authctxt = ctxt; local 228 Authctxt *authctxt = ctxt; local 255 Authctxt *authctxt = ctxt; local [all...] |
auth2-chall.c | 50 static int auth2_challenge_start(Authctxt *); 51 static int send_userauth_info_request(Authctxt *); 158 kbdint_next_device(Authctxt *authctxt, KbdintAuthctxt *kbdintctxt) 174 !auth2_method_allowed(authctxt, 194 * try challenge-response, set authctxt->postponed if we have to 198 auth2_challenge(Authctxt *authctxt, char *devs) 201 authctxt->user ? authctxt->user : "<nouser>" 290 Authctxt *authctxt = ctxt; local [all...] |
session.h | 36 Authctxt *authctxt; member in struct:Session 66 void do_authenticated(Authctxt *); 67 void do_cleanup(Authctxt *); 69 int session_open(Authctxt *, int);
|
auth2.c | 94 static Authmethod *authmethod_lookup(Authctxt *, const char *); 95 static char *authmethods_get(Authctxt *authctxt); 166 * loop until authctxt->success == TRUE 169 do_authentication2(Authctxt *authctxt) 173 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt); 180 Authctxt *authctxt = ctxt local 215 Authctxt *authctxt = ctxt; local [all...] |
sshd.c | 245 Authctxt *the_authctxt = NULL; 657 privsep_preauth(Authctxt *authctxt) 687 monitor_child_preauth(authctxt, pmonitor); 731 privsep_postauth(Authctxt *authctxt) 738 if (authctxt->pw->pw_uid == 0 || options.use_login) { 778 do_setusercontext(authctxt->pw); 1476 Authctxt *authctxt; local [all...] |
monitor.c | 169 static Authctxt *authctxt; variable 334 monitor_child_preauth(Authctxt *_authctxt, struct monitor *pmonitor) 345 authctxt = _authctxt; 346 memset(authctxt, 0, sizeof(*authctxt)); 348 authctxt->loginmsg = &loginmsg; 375 !auth2_update_methods_lists(authctxt, 388 if (authctxt->pw->pw_uid == 0 && 405 auth_log(authctxt, authenticated, partial [all...] |
sshconnect2.c | 241 typedef struct cauthctxt Authctxt; 281 int (*userauth)(Authctxt *authctxt); 282 void (*cleanup)(Authctxt *authctxt); 296 int userauth_none(Authctxt *); 297 int userauth_pubkey(Authctxt *); 298 int userauth_passwd(Authctxt *); 299 int userauth_kbdint(Authctxt *); 300 int userauth_hostbased(Authctxt *); 362 Authctxt authctxt; local 493 Authctxt *authctxt = ctxt; local 510 Authctxt *authctxt = ctxt; local 524 Authctxt *authctxt = ctxt; local 551 Authctxt *authctxt = ctxt; local 682 Authctxt *authctxt = ctxt; local 737 Authctxt *authctxt = ctxt; local 778 Authctxt *authctxt = ctxt; local 807 Authctxt *authctxt = ctxt; local 909 Authctxt *authctxt = ctxt; local 1411 Authctxt *authctxt = ctxt; local [all...] |