/macosx-10.10/OpenSSH-189/openssh/ |
H A D | auth-bsdauth.c | 45 bsdauth_init_ctx(Authctxt *authctxt) argument 47 return authctxt; 54 Authctxt *authctxt = ctx; local 57 if (authctxt->as != NULL) { 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 61 auth_close(authctxt->as); 62 authctxt->as = NULL; 69 authctxt->style ? authctxt->style : "<default>"); 70 authctxt 93 Authctxt *authctxt = ctx; local 115 Authctxt *authctxt = ctx; local [all...] |
H A D | auth-krb5.c | 60 Authctxt *authctxt = (Authctxt *)context; local 63 if (authctxt->krb5_ctx == NULL) { 64 problem = krb5_init_context(&authctxt->krb5_ctx); 72 auth_krb5_password(Authctxt *authctxt, const char *password) argument 84 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name); 85 client = platform_client ? platform_client : authctxt->pw->pw_name; 87 temporarily_use_uid(authctxt->pw); 89 problem = krb5_init(authctxt); 93 problem = krb5_parse_name(authctxt->krb5_ctx, client, 94 &authctxt 214 krb5_cleanup_proc(Authctxt *authctxt) argument [all...] |
H A D | auth-chall.c | 46 get_challenge(Authctxt *authctxt) argument 60 if ((authctxt->kbdintctxt = device->init_ctx(authctxt)) == NULL) 62 if (device->query(authctxt->kbdintctxt, &name, &info, 64 device->free_ctx(authctxt->kbdintctxt); 65 authctxt->kbdintctxt = NULL; 81 verify_response(Authctxt *authctxt, const char *response) argument 89 if (authctxt->kbdintctxt == NULL) 92 switch (device->respond(authctxt->kbdintctxt, 1, resp)) { 97 if ((device->query(authctxt 117 abandon_challenge_response(Authctxt *authctxt) argument [all...] |
H A D | auth1.c | 115 auth1_process_password(Authctxt *authctxt, char *info, size_t infolen) argument 130 authenticated = PRIVSEP(auth_password(authctxt, password)); 140 auth1_process_rsa(Authctxt *authctxt, char *info, size_t infolen) argument 150 authenticated = auth_rsa(authctxt, n); 158 auth1_process_rhosts_rsa(Authctxt *authctxt, char *info, size_t infolen) argument 186 authenticated = auth_rhosts_rsa(authctxt, client_user, 197 auth1_process_tis_challenge(Authctxt *authctxt, char *info, size_t infolen) argument 201 if ((challenge = get_challenge(authctxt)) == NULL) 216 auth1_process_tis_response(Authctxt *authctxt, char *info, size_t infolen) argument 224 authenticated = verify_response(authctxt, respons 236 do_authloop(Authctxt *authctxt) argument 385 do_authentication(Authctxt *authctxt) argument [all...] |
H A D | auth2.c | 102 static char *authmethods_get(Authctxt *authctxt); 172 * loop until authctxt->success == TRUE 175 do_authentication2(Authctxt *authctxt) argument 179 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt); 186 Authctxt *authctxt = ctxt; local 192 if (authctxt == NULL) 193 fatal("input_service_request: no authctxt"); 196 if (!authctxt->success) { 220 Authctxt *authctxt local 299 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, const char *submethod) argument 393 method_allowed(Authctxt *authctxt, const char *method) argument 411 authmethods_get(Authctxt *authctxt) argument 438 authmethod_lookup(Authctxt *authctxt, const char *name) argument 507 auth2_setup_methods_lists(Authctxt *authctxt) argument 574 auth2_update_methods_lists(Authctxt *authctxt, const char *method) argument [all...] |
H A D | auth2-gss.c | 59 userauth_gsskeyex(Authctxt *authctxt) argument 71 ssh_gssapi_buildmic(&b, authctxt->user, authctxt->service, 80 authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user, 81 authctxt->pw)); 94 userauth_gssapi(Authctxt *authctxt) argument 105 if (!authctxt->valid || authctxt->user == NULL) 139 authctxt->server_caused_failure = 1; 147 authctxt 171 Authctxt *authctxt = ctxt; local 225 Authctxt *authctxt = ctxt; local 265 Authctxt *authctxt = ctxt; local 295 Authctxt *authctxt = ctxt; local [all...] |
H A D | auth2-jpake.c | 82 userauth_jpake(Authctxt *authctxt) argument 90 if (authctxt->user != NULL) { 91 if (authctxt->jpake_ctx == NULL) 92 authctxt->jpake_ctx = jpake_new(); 94 authenticated = auth2_jpake_start(authctxt); 108 auth2_jpake_stop(Authctxt *authctxt) argument 114 if (authctxt->jpake_ctx != NULL) { 115 jpake_free(authctxt->jpake_ctx); 116 authctxt->jpake_ctx = NULL; 220 fake_salt_and_scheme(Authctxt *authctxt, cha argument 272 auth2_jpake_get_pwdata(Authctxt *authctxt, BIGNUM **s, char **hash_scheme, char **salt) argument 372 auth2_jpake_start(Authctxt *authctxt) argument 425 Authctxt *authctxt = ctxt; local 483 Authctxt *authctxt = ctxt; local 533 Authctxt *authctxt = ctxt; local [all...] |
H A D | auth-skey.c | 46 skey_init_ctx(Authctxt *authctxt) argument 48 return authctxt; 55 Authctxt *authctxt = ctx; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 77 Authctxt *authctxt = ctx; local 79 if (authctxt->valid && 81 skey_haskey(authctxt->pw->pw_name) == 0 && 82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
|
H A D | auth2-chall.c | 186 * try challenge-response, set authctxt->postponed if we have to 190 auth2_challenge(Authctxt *authctxt, char *devs) argument 193 authctxt->user ? authctxt->user : "<nouser>", 196 if (authctxt->user == NULL || !devs) 198 if (authctxt->kbdintctxt == NULL) 199 authctxt->kbdintctxt = kbdint_alloc(devs); 200 return auth2_challenge_start(authctxt); 205 auth2_challenge_stop(Authctxt *authctxt) argument 209 if (authctxt 217 auth2_challenge_start(Authctxt *authctxt) argument 247 send_userauth_info_request(Authctxt *authctxt) argument 282 Authctxt *authctxt = ctxt; local [all...] |
H A D | auth-passwd.c | 81 auth_password(Authctxt *authctxt, const char *password) argument 83 struct passwd * pw = authctxt->pw; 84 int result, ok = authctxt->valid; 98 int ret = auth_krb5_password(authctxt, password); 116 return (sshpam_auth_passwd(authctxt, password) && ok); 121 if (auth_shadow_pwexpired(authctxt)) 122 authctxt->force_pwchange = 1; 125 result = sys_auth_passwd(authctxt, password); 126 if (authctxt->force_pwchange) 133 warn_expiry(Authctxt *authctxt, auth_session_ argument 167 sys_auth_passwd(Authctxt *authctxt, const char *password) argument 192 sys_auth_passwd(Authctxt *authctxt, const char *password) argument [all...] |
H A D | sshconnect2.c | 334 int (*userauth)(Authctxt *authctxt); 335 void (*cleanup)(Authctxt *authctxt); 362 int userauth_gssapi(Authctxt *authctxt); 368 int userauth_gsskeyex(Authctxt *authctxt); 434 Authctxt authctxt; local 462 memset(&authctxt, 0, sizeof(authctxt)); 463 pubkey_prepare(&authctxt); 464 authctxt.server_user = server_user; 465 authctxt 493 userauth(Authctxt *authctxt, char *authlist) argument 564 Authctxt *authctxt = ctxt; local 584 Authctxt *authctxt = ctxt; local 597 Authctxt *authctxt = ctxt; local 619 Authctxt *authctxt = ctxt; local 688 userauth_gssapi(Authctxt *authctxt) argument 759 Authctxt *authctxt = ctxt; local 814 Authctxt *authctxt = ctxt; local 854 Authctxt *authctxt = ctxt; local 882 Authctxt *authctxt = ctxt; local 929 userauth_gsskeyex(Authctxt *authctxt) argument 972 userauth_none(Authctxt *authctxt) argument 984 userauth_passwd(Authctxt *authctxt) argument 1025 Authctxt *authctxt = ctxt; local 1104 jpake_password_to_secret(Authctxt *authctxt, const char *crypt_scheme, const char *salt) argument 1150 Authctxt *authctxt = ctxt; local 1218 Authctxt *authctxt = ctxt; local 1265 Authctxt *authctxt = ctxt; local 1317 sign_and_send_pubkey(Authctxt *authctxt, Identity *id) argument 1405 send_pubkey_test(Authctxt *authctxt, Identity *id) argument 1485 pubkey_prepare(Authctxt *authctxt) argument 1581 pubkey_cleanup(Authctxt *authctxt) argument 1599 userauth_pubkey(Authctxt *authctxt) argument 1640 userauth_kbdint(Authctxt *authctxt) argument 1673 Authctxt *authctxt = ctxt; local 1802 userauth_hostbased(Authctxt *authctxt) argument 1896 userauth_jpake(Authctxt *authctxt) argument 1956 userauth_jpake_cleanup(Authctxt *authctxt) argument [all...] |
H A D | auth2-kbdint.c | 45 userauth_kbdint(Authctxt *authctxt) argument 57 authenticated = auth2_challenge(authctxt, devs);
|
H A D | auth2-none.c | 60 userauth_none(Authctxt *authctxt) argument 65 return (PRIVSEP(auth_password(authctxt, "")));
|
H A D | auth-rh-rsa.c | 66 auth_rhosts_rsa(Authctxt *authctxt, char *cuser, Key *client_host_key) argument 69 struct passwd *pw = authctxt->pw; 74 if (!authctxt->valid || client_host_key == NULL ||
|
H A D | auth2-passwd.c | 50 userauth_passwd(Authctxt *authctxt) argument 69 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
|
H A D | auth-sia.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *pass) argument 61 if (!authctxt->user || pass == NULL || pass[0] == '\0') 64 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user, 70 authctxt->user, host);
|
H A D | auth.h | 92 int (*userauth)(Authctxt *authctxt); 134 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *); 135 int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt); 136 int auth_krb5_password(Authctxt *authctxt, const char *password); 137 void krb5_cleanup_proc(Authctxt *authctxt);
|
H A D | auth2-hostbased.c | 57 userauth_hostbased(Authctxt *authctxt) argument 67 if (!authctxt->valid) { 104 authctxt->service; 109 buffer_put_cstring(&b, authctxt->user); 121 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) &&
|
H A D | monitor.c | 198 static Authctxt *authctxt; variable 377 authctxt = _authctxt; 378 memset(authctxt, 0, sizeof(*authctxt)); 380 authctxt->loginmsg = &loginmsg; 411 !auth2_update_methods_lists(authctxt, 424 if (authctxt->pw->pw_uid == 0 && 441 auth_log(authctxt, authenticated, partial, 445 authctxt->failures++; 450 if (authctxt [all...] |
H A D | session.h | 36 Authctxt *authctxt; member in struct:Session
|
H A D | auth.c | 255 auth_log(Authctxt *authctxt, int authenticated, int partial, argument 261 if (use_privsep && !mm_is_monitor() && !authctxt->postponed) 266 !authctxt->valid || 267 authctxt->failures >= options.max_authtries / 2 || 271 if (authctxt->postponed) 282 authctxt->valid ? "" : "invalid user ", 283 authctxt->user, 289 if (authenticated == 0 && !authctxt->postponed && 293 record_failed_login(authctxt->user, 297 sys_auth_record_login(authctxt [all...] |
H A D | auth-pam.c | 280 fatal("%s: PAM authctxt not initialized", __func__); 461 fatal("%s: PAM authctxt not initialized", __func__); 621 sshpam_init(Authctxt *authctxt) argument 624 const char *pam_rhost, *pam_user, *user = authctxt->user; 639 sshpam_authctxt = authctxt; 672 sshpam_init_ctx(Authctxt *authctxt) argument 686 if (sshpam_init(authctxt) == -1) { 885 start_pam(Authctxt *authctxt) argument 890 if (sshpam_init(authctxt) == -1) 1182 sshpam_auth_passwd(Authctxt *authctxt, cons argument [all...] |
H A D | session.c | 271 do_authenticated(Authctxt *authctxt) argument 273 setproctitle("%s", authctxt->pw->pw_name); 285 do_authenticated2(authctxt); 287 do_authenticated1(authctxt); 289 do_cleanup(authctxt); 299 do_authenticated1(Authctxt *authctxt) argument 312 s->authctxt = authctxt; 313 s->pw = authctxt->pw; 881 if (options.use_pam && !use_privsep && s->authctxt 1941 session_open(Authctxt *authctxt, int chanid) argument 2737 do_authenticated2(Authctxt *authctxt) argument 2743 do_cleanup(Authctxt *authctxt) argument [all...] |
H A D | auth-rsa.c | 303 auth_rsa(Authctxt *authctxt, BIGNUM *client_n) argument 307 struct passwd *pw = authctxt->pw; 310 if (!authctxt->valid)
|
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | port-uw.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *password) argument 55 struct passwd *pw = authctxt->pw; 59 /* Just use the supplied fake password if authctxt is invalid */ 60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; 83 if (authctxt->valid)
|