Searched refs:authctxt (Results 1 - 25 of 29) sorted by relevance

12

/freebsd-10.0-release/crypto/openssh/
H A Dauth-bsdauth.c45 bsdauth_init_ctx(Authctxt *authctxt) argument
47 return authctxt;
54 Authctxt *authctxt = ctx; local
57 if (authctxt->as != NULL) {
59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
61 auth_close(authctxt->as);
62 authctxt->as = NULL;
69 authctxt->style ? authctxt->style : "<default>");
70 authctxt
93 Authctxt *authctxt = ctx; local
115 Authctxt *authctxt = ctx; local
[all...]
H A Dauth-krb5.c60 Authctxt *authctxt = (Authctxt *)context; local
63 if (authctxt->krb5_ctx == NULL) {
64 problem = krb5_init_context(&authctxt->krb5_ctx);
72 auth_krb5_password(Authctxt *authctxt, const char *password) argument
85 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name);
86 client = platform_client ? platform_client : authctxt->pw->pw_name;
88 temporarily_use_uid(authctxt->pw);
90 problem = krb5_init(authctxt);
94 problem = krb5_parse_name(authctxt->krb5_ctx, client,
95 &authctxt
222 krb5_cleanup_proc(Authctxt *authctxt) argument
[all...]
H A Dauth-chall.c46 get_challenge(Authctxt *authctxt) argument
60 if ((authctxt->kbdintctxt = device->init_ctx(authctxt)) == NULL)
62 if (device->query(authctxt->kbdintctxt, &name, &info,
64 device->free_ctx(authctxt->kbdintctxt);
65 authctxt->kbdintctxt = NULL;
81 verify_response(Authctxt *authctxt, const char *response) argument
89 if (authctxt->kbdintctxt == NULL)
92 switch (device->respond(authctxt->kbdintctxt, 1, resp)) {
97 if ((device->query(authctxt
117 abandon_challenge_response(Authctxt *authctxt) argument
[all...]
H A Dauth2.c102 static char *authmethods_get(Authctxt *authctxt);
175 * loop until authctxt->success == TRUE
178 do_authentication2(Authctxt *authctxt) argument
182 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt);
189 Authctxt *authctxt = ctxt; local
195 if (authctxt == NULL)
196 fatal("input_service_request: no authctxt");
199 if (!authctxt->success) {
223 Authctxt *authctxt local
330 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, const char *submethod) argument
424 auth2_method_allowed(Authctxt *authctxt, const char *method, const char *submethod) argument
444 authmethods_get(Authctxt *authctxt) argument
472 authmethod_lookup(Authctxt *authctxt, const char *name) argument
544 auth2_setup_methods_lists(Authctxt *authctxt) argument
633 auth2_update_methods_lists(Authctxt *authctxt, const char *method, const char *submethod) argument
[all...]
H A Dauth1.c115 auth1_process_password(Authctxt *authctxt) argument
130 authenticated = PRIVSEP(auth_password(authctxt, password));
140 auth1_process_rsa(Authctxt *authctxt) argument
150 authenticated = auth_rsa(authctxt, n);
158 auth1_process_rhosts_rsa(Authctxt *authctxt) argument
186 authenticated = auth_rhosts_rsa(authctxt, client_user,
190 auth_info(authctxt, "ruser %.100s", client_user);
197 auth1_process_tis_challenge(Authctxt *authctxt) argument
201 if ((challenge = get_challenge(authctxt)) == NULL)
216 auth1_process_tis_response(Authctxt *authctxt) argument
236 do_authloop(Authctxt *authctxt) argument
380 do_authentication(Authctxt *authctxt) argument
[all...]
H A Dauth2-chall.c156 kbdint_next_device(Authctxt *authctxt, KbdintAuthctxt *kbdintctxt) argument
171 if (!auth2_method_allowed(authctxt,
188 * try challenge-response, set authctxt->postponed if we have to
192 auth2_challenge(Authctxt *authctxt, char *devs) argument
195 authctxt->user ? authctxt->user : "<nouser>",
198 if (authctxt->user == NULL || !devs)
200 if (authctxt->kbdintctxt == NULL)
201 authctxt->kbdintctxt = kbdint_alloc(devs);
202 return auth2_challenge_start(authctxt);
207 auth2_challenge_stop(Authctxt *authctxt) argument
219 auth2_challenge_start(Authctxt *authctxt) argument
249 send_userauth_info_request(Authctxt *authctxt) argument
284 Authctxt *authctxt = ctxt; local
[all...]
H A Dauth2-jpake.c82 userauth_jpake(Authctxt *authctxt) argument
90 if (authctxt->user != NULL) {
91 if (authctxt->jpake_ctx == NULL)
92 authctxt->jpake_ctx = jpake_new();
94 authenticated = auth2_jpake_start(authctxt);
108 auth2_jpake_stop(Authctxt *authctxt) argument
114 if (authctxt->jpake_ctx != NULL) {
115 jpake_free(authctxt->jpake_ctx);
116 authctxt->jpake_ctx = NULL;
220 fake_salt_and_scheme(Authctxt *authctxt, cha argument
272 auth2_jpake_get_pwdata(Authctxt *authctxt, BIGNUM **s, char **hash_scheme, char **salt) argument
372 auth2_jpake_start(Authctxt *authctxt) argument
425 Authctxt *authctxt = ctxt; local
483 Authctxt *authctxt = ctxt; local
533 Authctxt *authctxt = ctxt; local
[all...]
H A Dauth-skey.c46 skey_init_ctx(Authctxt *authctxt) argument
48 return authctxt;
55 Authctxt *authctxt = ctx; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
77 Authctxt *authctxt = ctx; local
79 if (authctxt->valid &&
81 skey_haskey(authctxt->pw->pw_name) == 0 &&
82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
H A Dauth2-gss.c60 userauth_gssapi(Authctxt *authctxt) argument
71 if (!authctxt->valid || authctxt->user == NULL)
104 authctxt->server_caused_failure = 1;
112 authctxt->server_caused_failure = 1;
116 authctxt->methoddata = (void *)ctxt;
128 authctxt->postponed = 1;
136 Authctxt *authctxt = ctxt; local
143 if (authctxt == NULL || (authctxt
190 Authctxt *authctxt = ctxt; local
230 Authctxt *authctxt = ctxt; local
256 Authctxt *authctxt = ctxt; local
[all...]
H A Dauth-passwd.c81 auth_password(Authctxt *authctxt, const char *password) argument
83 struct passwd * pw = authctxt->pw;
84 int result, ok = authctxt->valid;
98 int ret = auth_krb5_password(authctxt, password);
116 return (sshpam_auth_passwd(authctxt, password) && ok);
121 if (auth_shadow_pwexpired(authctxt))
122 authctxt->force_pwchange = 1;
125 result = sys_auth_passwd(authctxt, password);
126 if (authctxt->force_pwchange)
133 warn_expiry(Authctxt *authctxt, auth_session_ argument
167 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
192 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
[all...]
H A Dauth2-kbdint.c45 userauth_kbdint(Authctxt *authctxt) argument
57 authenticated = auth2_challenge(authctxt, devs);
H A Dauth2-none.c60 userauth_none(Authctxt *authctxt) argument
65 return (PRIVSEP(auth_password(authctxt, "")));
H A Dsshconnect2.c287 int (*userauth)(Authctxt *authctxt);
288 void (*cleanup)(Authctxt *authctxt);
315 int userauth_gssapi(Authctxt *authctxt);
381 Authctxt authctxt; local
409 memset(&authctxt, 0, sizeof(authctxt));
410 pubkey_prepare(&authctxt);
411 authctxt.server_user = server_user;
412 authctxt.local_user = local_user;
413 authctxt
463 userauth(Authctxt *authctxt, char *authlist) argument
531 Authctxt *authctxt = ctxt; local
547 Authctxt *authctxt = ctxt; local
560 Authctxt *authctxt = ctxt; local
586 Authctxt *authctxt = ctxt; local
655 userauth_gssapi(Authctxt *authctxt) argument
714 Authctxt *authctxt = ctxt; local
769 Authctxt *authctxt = ctxt; local
809 Authctxt *authctxt = ctxt; local
837 Authctxt *authctxt = ctxt; local
884 userauth_none(Authctxt *authctxt) argument
896 userauth_passwd(Authctxt *authctxt) argument
937 Authctxt *authctxt = ctxt; local
1016 jpake_password_to_secret(Authctxt *authctxt, const char *crypt_scheme, const char *salt) argument
1062 Authctxt *authctxt = ctxt; local
1130 Authctxt *authctxt = ctxt; local
1177 Authctxt *authctxt = ctxt; local
1229 sign_and_send_pubkey(Authctxt *authctxt, Identity *id) argument
1317 send_pubkey_test(Authctxt *authctxt, Identity *id) argument
1396 pubkey_prepare(Authctxt *authctxt) argument
1492 pubkey_cleanup(Authctxt *authctxt) argument
1509 userauth_pubkey(Authctxt *authctxt) argument
1550 userauth_kbdint(Authctxt *authctxt) argument
1583 Authctxt *authctxt = ctxt; local
1712 userauth_hostbased(Authctxt *authctxt) argument
1806 userauth_jpake(Authctxt *authctxt) argument
1866 userauth_jpake_cleanup(Authctxt *authctxt) argument
[all...]
H A Dauth-rh-rsa.c66 auth_rhosts_rsa(Authctxt *authctxt, char *cuser, Key *client_host_key) argument
69 struct passwd *pw = authctxt->pw;
74 if (!authctxt->valid || client_host_key == NULL ||
H A Dauth2-passwd.c50 userauth_passwd(Authctxt *authctxt) argument
69 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
H A Dauth-sia.c53 sys_auth_passwd(Authctxt *authctxt, const char *pass) argument
61 if (!authctxt->user || pass == NULL || pass[0] == '\0')
64 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
70 authctxt->user, host);
H A Dauth.h89 int (*userauth)(Authctxt *authctxt);
133 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *);
134 int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt);
135 int auth_krb5_password(Authctxt *authctxt, const char *password);
136 void krb5_cleanup_proc(Authctxt *authctxt);
154 void auth_info(Authctxt *authctxt, const char *, ...)
H A Dauth2-hostbased.c57 userauth_hostbased(Authctxt *authctxt) argument
67 if (!authctxt->valid) {
104 authctxt->service;
109 buffer_put_cstring(&b, authctxt->user);
120 pubkey_auth_info(authctxt, key,
125 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) &&
H A Dauth.c257 auth_info(Authctxt *authctxt, const char *fmt, ...) argument
262 free(authctxt->info);
263 authctxt->info = NULL;
266 i = vasprintf(&authctxt->info, fmt, ap);
269 if (i < 0 || authctxt->info == NULL)
274 auth_log(Authctxt *authctxt, int authenticated, int partial, argument
280 if (use_privsep && !mm_is_monitor() && !authctxt->postponed)
285 !authctxt->valid ||
286 authctxt->failures >= options.max_authtries / 2 ||
290 if (authctxt
[all...]
H A Dmonitor.c193 static Authctxt *authctxt; variable
365 authctxt = _authctxt;
366 memset(authctxt, 0, sizeof(*authctxt));
368 authctxt->loginmsg = &loginmsg;
395 !auth2_update_methods_lists(authctxt,
408 if (authctxt->pw->pw_uid == 0 &&
425 auth_log(authctxt, authenticated, partial,
428 authctxt->failures++;
433 if (authctxt
[all...]
H A Dsession.h36 Authctxt *authctxt; member in struct:Session
H A Dauth2-pubkey.c74 userauth_pubkey(Authctxt *authctxt) argument
84 if (!authctxt->valid) {
130 xasprintf(&userstyle, "%s%s%s", authctxt->user,
131 authctxt->style ? ":" : "",
132 authctxt->style ? authctxt->style : "");
138 authctxt->service);
150 pubkey_auth_info(authctxt, key, NULL);
154 if (PRIVSEP(user_key_allowed(authctxt->pw, key)) &&
172 if (PRIVSEP(user_key_allowed(authctxt
193 pubkey_auth_info(Authctxt *authctxt, const Key *key, const char *fmt, ...) argument
[all...]
H A Dsession.c276 do_authenticated(Authctxt *authctxt) argument
278 setproctitle("%s", authctxt->pw->pw_name);
290 do_authenticated2(authctxt);
292 do_authenticated1(authctxt);
294 do_cleanup(authctxt);
304 do_authenticated1(Authctxt *authctxt) argument
317 s->authctxt = authctxt;
318 s->pw = authctxt->pw;
886 if (options.use_pam && !use_privsep && s->authctxt
1952 session_open(Authctxt *authctxt, int chanid) argument
2706 do_authenticated2(Authctxt *authctxt) argument
2712 do_cleanup(Authctxt *authctxt) argument
[all...]
H A Dauth-rsa.c302 auth_rsa(Authctxt *authctxt, BIGNUM *client_n) argument
305 struct passwd *pw = authctxt->pw;
308 if (!authctxt->valid)
334 pubkey_auth_info(authctxt, key, NULL);
/freebsd-10.0-release/crypto/openssh/openbsd-compat/
H A Dport-uw.c53 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
55 struct passwd *pw = authctxt->pw;
59 /* Just use the supplied fake password if authctxt is invalid */
60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd;
83 if (authctxt->valid)

Completed in 325 milliseconds

12