Searched refs:authctxt (Results 1 - 25 of 28) sorted by relevance

12

/freebsd-10-stable/crypto/openssh/
H A Dauth-bsdauth.c47 bsdauth_init_ctx(Authctxt *authctxt) argument
49 return authctxt;
56 Authctxt *authctxt = ctx; local
64 if (authctxt->as != NULL) {
66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
68 auth_close(authctxt->as);
69 authctxt->as = NULL;
76 authctxt->style ? authctxt->style : "<default>");
77 authctxt
100 Authctxt *authctxt = ctx; local
122 Authctxt *authctxt = ctx; local
[all...]
H A Dauth-krb5.c60 Authctxt *authctxt = (Authctxt *)context; local
63 if (authctxt->krb5_ctx == NULL) {
64 problem = krb5_init_context(&authctxt->krb5_ctx);
72 auth_krb5_password(Authctxt *authctxt, const char *password) argument
85 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name);
86 client = platform_client ? platform_client : authctxt->pw->pw_name;
88 temporarily_use_uid(authctxt->pw);
90 problem = krb5_init(authctxt);
94 problem = krb5_parse_name(authctxt->krb5_ctx, client,
95 &authctxt
223 krb5_cleanup_proc(Authctxt *authctxt) argument
[all...]
H A Dauth-chall.c48 get_challenge(Authctxt *authctxt) argument
62 if ((authctxt->kbdintctxt = device->init_ctx(authctxt)) == NULL)
64 if (device->query(authctxt->kbdintctxt, &name, &info,
66 device->free_ctx(authctxt->kbdintctxt);
67 authctxt->kbdintctxt = NULL;
83 verify_response(Authctxt *authctxt, const char *response) argument
91 if (authctxt->kbdintctxt == NULL)
94 switch (device->respond(authctxt->kbdintctxt, 1, resp)) {
99 if ((device->query(authctxt
119 abandon_challenge_response(Authctxt *authctxt) argument
[all...]
H A Dauth2.c97 static char *authmethods_get(Authctxt *authctxt);
168 * loop until authctxt->success == TRUE
171 do_authentication2(Authctxt *authctxt) argument
175 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt);
182 Authctxt *authctxt = ctxt; local
188 if (authctxt == NULL)
189 fatal("input_service_request: no authctxt");
192 if (!authctxt->success) {
217 Authctxt *authctxt local
320 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, const char *submethod) argument
414 auth2_method_allowed(Authctxt *authctxt, const char *method, const char *submethod) argument
434 authmethods_get(Authctxt *authctxt) argument
462 authmethod_lookup(Authctxt *authctxt, const char *name) argument
534 auth2_setup_methods_lists(Authctxt *authctxt) argument
623 auth2_update_methods_lists(Authctxt *authctxt, const char *method, const char *submethod) argument
[all...]
H A Dauth1.c118 auth1_process_password(Authctxt *authctxt) argument
133 authenticated = PRIVSEP(auth_password(authctxt, password));
143 auth1_process_rsa(Authctxt *authctxt) argument
153 authenticated = auth_rsa(authctxt, n);
161 auth1_process_rhosts_rsa(Authctxt *authctxt) argument
189 authenticated = auth_rhosts_rsa(authctxt, client_user,
193 auth_info(authctxt, "ruser %.100s", client_user);
200 auth1_process_tis_challenge(Authctxt *authctxt) argument
204 if ((challenge = get_challenge(authctxt)) == NULL)
219 auth1_process_tis_response(Authctxt *authctxt) argument
239 do_authloop(Authctxt *authctxt) argument
383 do_authentication(Authctxt *authctxt) argument
[all...]
H A Dauth2-chall.c158 kbdint_next_device(Authctxt *authctxt, KbdintAuthctxt *kbdintctxt) argument
174 !auth2_method_allowed(authctxt,
194 * try challenge-response, set authctxt->postponed if we have to
198 auth2_challenge(Authctxt *authctxt, char *devs) argument
201 authctxt->user ? authctxt->user : "<nouser>",
204 if (authctxt->user == NULL || !devs)
206 if (authctxt->kbdintctxt == NULL)
207 authctxt->kbdintctxt = kbdint_alloc(devs);
208 return auth2_challenge_start(authctxt);
213 auth2_challenge_stop(Authctxt *authctxt) argument
225 auth2_challenge_start(Authctxt *authctxt) argument
255 send_userauth_info_request(Authctxt *authctxt) argument
290 Authctxt *authctxt = ctxt; local
[all...]
H A Dauth-skey.c46 skey_init_ctx(Authctxt *authctxt) argument
48 return authctxt;
55 Authctxt *authctxt = ctx; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
77 Authctxt *authctxt = ctx; local
79 if (authctxt->valid &&
81 skey_haskey(authctxt->pw->pw_name) == 0 &&
82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
H A Dauth2-gss.c61 userauth_gssapi(Authctxt *authctxt) argument
71 if (!authctxt->valid || authctxt->user == NULL)
100 authctxt->server_caused_failure = 1;
108 authctxt->server_caused_failure = 1;
112 authctxt->methoddata = (void *)ctxt;
124 authctxt->postponed = 1;
132 Authctxt *authctxt = ctxt; local
139 if (authctxt == NULL || (authctxt
187 Authctxt *authctxt = ctxt; local
228 Authctxt *authctxt = ctxt; local
255 Authctxt *authctxt = ctxt; local
[all...]
H A Dauth-passwd.c84 auth_password(Authctxt *authctxt, const char *password) argument
86 struct passwd * pw = authctxt->pw;
87 int result, ok = authctxt->valid;
104 int ret = auth_krb5_password(authctxt, password);
122 return (sshpam_auth_passwd(authctxt, password) && ok);
127 if (auth_shadow_pwexpired(authctxt))
128 authctxt->force_pwchange = 1;
131 result = sys_auth_passwd(authctxt, password);
132 if (authctxt->force_pwchange)
139 warn_expiry(Authctxt *authctxt, auth_session_ argument
173 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
198 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
[all...]
H A Dauth2-none.c62 userauth_none(Authctxt *authctxt) argument
67 return (PRIVSEP(auth_password(authctxt, "")));
H A Dauth2-kbdint.c46 userauth_kbdint(Authctxt *authctxt) argument
58 authenticated = auth2_challenge(authctxt, devs);
H A Dsshconnect2.c284 int (*userauth)(Authctxt *authctxt);
285 void (*cleanup)(Authctxt *authctxt);
308 int userauth_gssapi(Authctxt *authctxt);
368 Authctxt authctxt; local
377 memset(&authctxt, 0, sizeof(authctxt));
378 pubkey_prepare(&authctxt);
379 authctxt.server_user = server_user;
380 authctxt.local_user = local_user;
381 authctxt
414 Authctxt *authctxt = ctxt; local
452 userauth(Authctxt *authctxt, char *authlist) argument
516 Authctxt *authctxt = ctxt; local
533 Authctxt *authctxt = ctxt; local
547 Authctxt *authctxt = ctxt; local
574 Authctxt *authctxt = ctxt; local
646 userauth_gssapi(Authctxt *authctxt) argument
705 Authctxt *authctxt = ctxt; local
760 Authctxt *authctxt = ctxt; local
801 Authctxt *authctxt = ctxt; local
830 Authctxt *authctxt = ctxt; local
879 userauth_none(Authctxt *authctxt) argument
891 userauth_passwd(Authctxt *authctxt) argument
932 Authctxt *authctxt = ctxt; local
1043 sign_and_send_pubkey(Authctxt *authctxt, Identity *id) argument
1161 send_pubkey_test(Authctxt *authctxt, Identity *id) argument
1264 pubkey_prepare(Authctxt *authctxt) argument
1400 pubkey_cleanup(Authctxt *authctxt) argument
1430 userauth_pubkey(Authctxt *authctxt) argument
1475 userauth_kbdint(Authctxt *authctxt) argument
1508 Authctxt *authctxt = ctxt; local
1676 userauth_hostbased(Authctxt *authctxt) argument
[all...]
H A Dauth2-passwd.c51 userauth_passwd(Authctxt *authctxt) argument
70 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
H A Dauth-sia.c53 sys_auth_passwd(Authctxt *authctxt, const char *pass) argument
61 if (!authctxt->user || pass == NULL || pass[0] == '\0')
64 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
70 authctxt->user, host);
H A Dauth-rh-rsa.c69 auth_rhosts_rsa(Authctxt *authctxt, char *cuser, Key *client_host_key) argument
73 struct passwd *pw = authctxt->pw;
78 if (!authctxt->valid || client_host_key == NULL ||
H A Dauth.c261 auth_info(Authctxt *authctxt, const char *fmt, ...) argument
266 free(authctxt->info);
267 authctxt->info = NULL;
270 i = vasprintf(&authctxt->info, fmt, ap);
273 if (i < 0 || authctxt->info == NULL)
278 auth_log(Authctxt *authctxt, int authenticated, int partial, argument
285 if (use_privsep && !mm_is_monitor() && !authctxt->postponed)
290 !authctxt->valid ||
291 authctxt->failures >= options.max_authtries / 2 ||
295 if (authctxt
338 auth_maxtries_exceeded(Authctxt *authctxt) argument
[all...]
H A Dauth.h94 int (*userauth)(Authctxt *authctxt);
141 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *);
142 int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt);
143 int auth_krb5_password(Authctxt *authctxt, const char *password);
144 void krb5_cleanup_proc(Authctxt *authctxt);
162 void auth_info(Authctxt *authctxt, const char *, ...)
H A Dmonitor.c170 static Authctxt *authctxt; variable
346 authctxt = _authctxt;
347 memset(authctxt, 0, sizeof(*authctxt));
349 authctxt->loginmsg = &loginmsg;
376 !auth2_update_methods_lists(authctxt,
389 if (authctxt->pw->pw_uid == 0 &&
406 auth_log(authctxt, authenticated, partial,
409 authctxt->failures++;
413 if (!authctxt
[all...]
H A Dauth2-pubkey.c78 userauth_pubkey(Authctxt *authctxt) argument
88 if (!authctxt->valid) {
130 if (auth2_userkey_already_used(authctxt, key)) {
154 xasprintf(&userstyle, "%s%s%s", authctxt->user,
155 authctxt->style ? ":" : "",
156 authctxt->style ? authctxt->style : "");
162 authctxt->service);
174 pubkey_auth_info(authctxt, key, NULL);
178 if (PRIVSEP(user_key_allowed(authctxt
223 pubkey_auth_info(Authctxt *authctxt, const Key *key, const char *fmt, ...) argument
1079 auth2_record_userkey(Authctxt *authctxt, struct sshkey *key) argument
1094 auth2_userkey_already_used(Authctxt *authctxt, struct sshkey *key) argument
[all...]
H A Dsession.h36 Authctxt *authctxt; member in struct:Session
H A Dauth2-hostbased.c59 userauth_hostbased(Authctxt *authctxt) argument
69 if (!authctxt->valid) {
119 authctxt->service;
124 buffer_put_cstring(&b, authctxt->user);
135 pubkey_auth_info(authctxt, key,
140 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) &&
H A Dauth-rsa.c311 auth_rsa(Authctxt *authctxt, BIGNUM *client_n) argument
314 struct passwd *pw = authctxt->pw;
317 if (!authctxt->valid)
343 pubkey_auth_info(authctxt, key, NULL);
H A Dauth-pam.c288 fatal("%s: PAM authctxt not initialized", __func__);
453 fatal("%s: PAM authctxt not initialized", __func__);
616 sshpam_init(Authctxt *authctxt) argument
619 const char *pam_rhost, *pam_user, *user = authctxt->user;
635 sshpam_authctxt = authctxt;
668 sshpam_init_ctx(Authctxt *authctxt) argument
682 if (sshpam_init(authctxt) == -1) {
911 start_pam(Authctxt *authctxt) argument
916 if (sshpam_init(authctxt) == -1)
1206 sshpam_auth_passwd(Authctxt *authctxt, cons argument
[all...]
H A Dsession.c257 do_authenticated(Authctxt *authctxt) argument
259 setproctitle("%s", authctxt->pw->pw_name);
272 do_authenticated2(authctxt);
274 do_authenticated1(authctxt);
276 do_cleanup(authctxt);
301 do_authenticated1(Authctxt *authctxt) argument
314 s->authctxt = authctxt;
315 s->pw = authctxt->pw;
916 if (options.use_pam && !use_privsep && s->authctxt
2005 session_open(Authctxt *authctxt, int chanid) argument
2768 do_authenticated2(Authctxt *authctxt) argument
2774 do_cleanup(Authctxt *authctxt) argument
[all...]
/freebsd-10-stable/crypto/openssh/openbsd-compat/
H A Dport-uw.c54 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
56 struct passwd *pw = authctxt->pw;
60 /* Just use the supplied fake password if authctxt is invalid */
61 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd;
84 if (authctxt->valid)

Completed in 348 milliseconds

12