• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10/OpenSSH-189/openssh/

Lines Matching defs:authctxt

82 userauth_jpake(Authctxt *authctxt)
90 if (authctxt->user != NULL) {
91 if (authctxt->jpake_ctx == NULL)
92 authctxt->jpake_ctx = jpake_new();
94 authenticated = auth2_jpake_start(authctxt);
108 auth2_jpake_stop(Authctxt *authctxt)
114 if (authctxt->jpake_ctx != NULL) {
115 jpake_free(authctxt->jpake_ctx);
116 authctxt->jpake_ctx = NULL;
220 fake_salt_and_scheme(Authctxt *authctxt, char **salt, char **scheme)
227 if ((lc = login_getclass(authctxt->pw->pw_class)) == NULL &&
240 xasprintf(salt, "$1$%s$", makesalt(8, authctxt->user));
243 *salt = xstrdup(makesalt(2, authctxt->user));
251 makesalt(4, authctxt->user));
258 makesalt(22, authctxt->user));
263 __func__, *scheme, authctxt->user, *salt);
272 auth2_jpake_get_pwdata(Authctxt *authctxt, BIGNUM **s,
281 authctxt->valid, authctxt->pw->pw_passwd);
286 if (authctxt->valid) {
287 if (strncmp(authctxt->pw->pw_passwd, "$2$", 3) == 0 &&
288 strlen(authctxt->pw->pw_passwd) > 28) {
295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
297 } else if (strncmp(authctxt->pw->pw_passwd, "$2a$", 4) == 0 &&
298 strlen(authctxt->pw->pw_passwd) > 29) {
305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
307 } else if (strncmp(authctxt->pw->pw_passwd, "$1$", 3) == 0 &&
308 strlen(authctxt->pw->pw_passwd) > 5) {
313 cp = strchr(authctxt->pw->pw_passwd + 3, '$');
315 salt_len = (cp - authctxt->pw->pw_passwd) + 1;
317 strlcpy(*salt, authctxt->pw->pw_passwd,
321 } else if (strncmp(authctxt->pw->pw_passwd, "_", 1) == 0 &&
322 strlen(authctxt->pw->pw_passwd) > 9) {
329 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
331 } else if (strlen(authctxt->pw->pw_passwd) == 13 &&
332 valid_crypt_salt(authctxt->pw->pw_passwd[0]) &&
333 valid_crypt_salt(authctxt->pw->pw_passwd[1])) {
340 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
345 __func__, authctxt->pw->pw_name);
349 fake_salt_and_scheme(authctxt, salt, hash_scheme);
351 if (hash_buffer(authctxt->pw->pw_passwd,
352 strlen(authctxt->pw->pw_passwd), EVP_sha256(),
369 * Note, sets authctxt->postponed while in subprotocol
372 auth2_jpake_start(Authctxt *authctxt)
374 struct jpake_ctx *pctx = authctxt->jpake_ctx;
387 PRIVSEP(auth2_jpake_get_pwdata(authctxt, &pctx->s,
417 authctxt->postponed = 1;
425 Authctxt *authctxt = ctxt;
426 struct jpake_ctx *pctx = authctxt->jpake_ctx;
483 Authctxt *authctxt = ctxt;
484 struct jpake_ctx *pctx = authctxt->jpake_ctx;
533 Authctxt *authctxt = ctxt;
534 struct jpake_ctx *pctx = authctxt->jpake_ctx;
551 authenticated = authctxt->valid ? 1 : 0;
556 authctxt->postponed = 0;
557 jpake_free(authctxt->jpake_ctx);
558 authctxt->jpake_ctx = NULL;
559 userauth_finish(authctxt, authenticated, method_jpake.name, NULL);