• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10/OpenSSH-189/openssh/

Lines Matching defs:authctxt

198 static Authctxt *authctxt;
377 authctxt = _authctxt;
378 memset(authctxt, 0, sizeof(*authctxt));
380 authctxt->loginmsg = &loginmsg;
411 !auth2_update_methods_lists(authctxt,
424 if (authctxt->pw->pw_uid == 0 &&
441 auth_log(authctxt, authenticated, partial,
445 authctxt->failures++;
450 if (authctxt->jpake_ctx != NULL) {
451 jpake_free(authctxt->jpake_ctx);
452 authctxt->jpake_ctx = NULL;
458 if (!authctxt->valid)
464 __func__, authctxt->user);
775 if (authctxt->attempt++ != 0)
782 authctxt->user = xstrdup(username);
790 authctxt->pw = fakepw();
795 authctxt->pw = pwent;
796 authctxt->valid = 1;
826 if (compat20 && auth2_setup_methods_lists(authctxt) != 0) {
874 authctxt->service = buffer_get_string(m, NULL);
875 authctxt->style = buffer_get_string(m, NULL);
877 __func__, authctxt->service, authctxt->style);
879 if (strlen(authctxt->style) == 0) {
880 xfree(authctxt->style);
881 authctxt->style = NULL;
898 auth_password(authctxt, passwd);
928 success = bsdauth_query(authctxt, &name, &infotxt, &numprompts,
955 if (authctxt->as == 0)
960 auth_userresponse(authctxt->as, response, 0);
961 authctxt->as = NULL;
988 success = _compat_skeychallenge(&skey, authctxt->user, challenge,
1011 authctxt->valid &&
1012 skey_haskey(authctxt->pw->pw_name) == 0 &&
1013 skey_passcheck(authctxt->pw->pw_name, response) != -1);
1036 start_pam(authctxt);
1069 authctxt->user = buffer_get_string(m, NULL);
1070 sshpam_ctxt = (sshpam_device.init_ctx)(authctxt);
1189 if (key != NULL && authctxt->valid) {
1193 user_key_allowed(authctxt->pw, key);
1200 hostbased_key_allowed(authctxt->pw,
1207 auth_rhosts_rsa_key_allowed(authctxt->pw,
1233 auth_log(authctxt, 0, 0, auth_method, NULL,
1285 if (strcmp(authctxt->user, p) != 0) {
1287 authctxt->user, p);
1333 if (strcmp(authctxt->user, p) != 0) {
1335 authctxt->user, p);
1472 s->authctxt = authctxt;
1473 s->pw = authctxt->pw;
1478 pty_setowner(authctxt->pw, s->tty);
1487 mm_record_login(s, authctxt->pw);
1602 if (options.rsa_authentication && authctxt->valid) {
1606 allowed = auth_rsa_key_allowed(authctxt->pw, client_n, &key);
1646 if (!authctxt->valid)
1647 fatal("%s: authctxt not valid", __func__);
1685 if (!authctxt->valid)
1686 fatal("%s: authctxt not valid", __func__);
2167 authenticated = authctxt->valid &&
2168 ssh_gssapi_userok(authctxt->user, authctxt->pw);
2262 if (authctxt->jpake_ctx != NULL)
2263 fatal("%s: authctxt->jpake_ctx already set (%p)",
2264 __func__, authctxt->jpake_ctx);
2265 authctxt->jpake_ctx = pctx = jpake_new();
2300 struct jpake_ctx *pctx = authctxt->jpake_ctx;
2306 auth2_jpake_get_pwdata(authctxt, &pctx->s, &hash_scheme, &salt);
2329 struct jpake_ctx *pctx = authctxt->jpake_ctx;
2380 struct jpake_ctx *pctx = authctxt->jpake_ctx;
2423 struct jpake_ctx *pctx = authctxt->jpake_ctx;
2433 peer_confirm_hash, peer_confirm_hash_len) && authctxt->valid;