Lines Matching defs:authctxt
154 kbdint_next_device(Authctxt *authctxt, KbdintAuthctxt *kbdintctxt)
170 !auth2_method_allowed(authctxt,
190 * try challenge-response, set authctxt->postponed if we have to
196 Authctxt *authctxt = ssh->authctxt;
198 authctxt->user ? authctxt->user : "<nouser>",
201 if (authctxt->user == NULL || !devs)
203 if (authctxt->kbdintctxt == NULL)
204 authctxt->kbdintctxt = kbdint_alloc(devs);
212 Authctxt *authctxt = ssh->authctxt;
215 if (authctxt->kbdintctxt != NULL) {
216 kbdint_free(authctxt->kbdintctxt);
217 authctxt->kbdintctxt = NULL;
221 /* side effect: sets authctxt->postponed if a reply was sent*/
225 Authctxt *authctxt = ssh->authctxt;
226 KbdintAuthctxt *kbdintctxt = authctxt->kbdintctxt;
231 if (kbdint_next_device(authctxt, kbdintctxt) == 0) {
238 if ((kbdintctxt->ctxt = kbdintctxt->device->init_ctx(authctxt)) == NULL) {
249 authctxt->postponed = 1;
256 Authctxt *authctxt = ssh->authctxt;
261 kbdintctxt = authctxt->kbdintctxt;
293 Authctxt *authctxt = ssh->authctxt;
301 if (authctxt == NULL)
302 fatal("input_userauth_info_response: no authctxt");
303 kbdintctxt = authctxt->kbdintctxt;
309 authctxt->postponed = 0; /* reset */
337 authenticated = authctxt->valid ? 1 : 0;
342 authctxt->postponed = 1;
349 if (!authctxt->postponed) {
354 /* may set authctxt->postponed */