/external/openssh/ |
H A D | auth2-none.c | 62 userauth_none(Authctxt *authctxt) argument 70 return (PRIVSEP(auth_password(authctxt, "")));
|
H A D | auth2-kbdint.c | 46 userauth_kbdint(Authctxt *authctxt) argument 58 authenticated = auth2_challenge(authctxt, devs);
|
H A D | auth-rh-rsa.c | 69 auth_rhosts_rsa(Authctxt *authctxt, char *cuser, Key *client_host_key) argument 72 struct passwd *pw = authctxt->pw; 77 if (!authctxt->valid || client_host_key == NULL ||
|
H A D | auth-sia.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *pass) argument 61 if (!authctxt->user || pass == NULL || pass[0] == '\0') 64 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user, 70 authctxt->user, host);
|
H A D | auth2-passwd.c | 51 userauth_passwd(Authctxt *authctxt) argument 72 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
|
H A D | auth-chall.c | 50 get_challenge(Authctxt *authctxt) argument 64 if ((authctxt->kbdintctxt = device->init_ctx(authctxt)) == NULL) 66 if (device->query(authctxt->kbdintctxt, &name, &info, 68 device->free_ctx(authctxt->kbdintctxt); 69 authctxt->kbdintctxt = NULL; 85 verify_response(Authctxt *authctxt, const char *response) argument 93 if (authctxt->kbdintctxt == NULL) 96 switch (device->respond(authctxt->kbdintctxt, 1, resp)) { 101 if ((device->query(authctxt 121 abandon_challenge_response(Authctxt *authctxt) argument [all...] |
H A D | auth-bsdauth.c | 47 bsdauth_init_ctx(Authctxt *authctxt) argument 49 return authctxt; 56 Authctxt *authctxt = ctx; local 64 if (authctxt->as != NULL) { 66 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); 68 auth_close(authctxt->as); 69 authctxt->as = NULL; 76 authctxt->style ? authctxt->style : "<default>"); 77 authctxt 100 Authctxt *authctxt = ctx; local 122 Authctxt *authctxt = ctx; local [all...] |
H A D | auth-skey.c | 46 skey_init_ctx(Authctxt *authctxt) argument 48 return authctxt; 55 Authctxt *authctxt = ctx; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 77 Authctxt *authctxt = ctx; local 79 if (authctxt->valid && 81 skey_haskey(authctxt->pw->pw_name) == 0 && 82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
|
H A D | auth-krb5.c | 61 Authctxt *authctxt = (Authctxt *)context; local 64 if (authctxt->krb5_ctx == NULL) { 65 problem = krb5_init_context(&authctxt->krb5_ctx); 73 auth_krb5_password(Authctxt *authctxt, const char *password) argument 86 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name); 87 client = platform_client ? platform_client : authctxt->pw->pw_name; 89 temporarily_use_uid(authctxt->pw); 91 problem = krb5_init(authctxt); 95 problem = krb5_parse_name(authctxt->krb5_ctx, client, 96 &authctxt 224 krb5_cleanup_proc(Authctxt *authctxt) argument [all...] |
H A D | auth-passwd.c | 82 auth_password(Authctxt *authctxt, const char *password) argument 84 struct passwd * pw = authctxt->pw; 85 int result, ok = authctxt->valid; 99 int ret = auth_krb5_password(authctxt, password); 117 return (sshpam_auth_passwd(authctxt, password) && ok); 122 if (auth_shadow_pwexpired(authctxt)) 123 authctxt->force_pwchange = 1; 126 result = sys_auth_passwd(authctxt, password); 127 if (authctxt->force_pwchange) 134 warn_expiry(Authctxt *authctxt, auth_session_ argument 168 sys_auth_passwd(Authctxt *authctxt, const char *password) argument 193 sys_auth_passwd(Authctxt *authctxt, const char *password) argument [all...] |
H A D | auth2-gss.c | 61 userauth_gssapi(Authctxt *authctxt) argument 71 if (!authctxt->valid || authctxt->user == NULL) 100 authctxt->server_caused_failure = 1; 108 authctxt->server_caused_failure = 1; 112 authctxt->methoddata = (void *)ctxt; 124 authctxt->postponed = 1; 132 Authctxt *authctxt = ctxt; local 139 if (authctxt == NULL || (authctxt 187 Authctxt *authctxt = ctxt; local 228 Authctxt *authctxt = ctxt; local 255 Authctxt *authctxt = ctxt; local [all...] |
H A D | auth2-hostbased.c | 59 userauth_hostbased(Authctxt *authctxt) argument 69 if (!authctxt->valid) { 120 authctxt->service; 125 buffer_put_cstring(&b, authctxt->user); 136 pubkey_auth_info(authctxt, key, 141 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) &&
|
H A D | auth-rsa.c | 311 auth_rsa(Authctxt *authctxt, BIGNUM *client_n) argument 314 struct passwd *pw = authctxt->pw; 317 if (!authctxt->valid) 343 pubkey_auth_info(authctxt, key, NULL);
|
H A D | auth1.c | 118 auth1_process_password(Authctxt *authctxt) argument 133 authenticated = PRIVSEP(auth_password(authctxt, password)); 143 auth1_process_rsa(Authctxt *authctxt) argument 153 authenticated = auth_rsa(authctxt, n); 161 auth1_process_rhosts_rsa(Authctxt *authctxt) argument 189 authenticated = auth_rhosts_rsa(authctxt, client_user, 193 auth_info(authctxt, "ruser %.100s", client_user); 200 auth1_process_tis_challenge(Authctxt *authctxt) argument 204 if ((challenge = get_challenge(authctxt)) == NULL) 219 auth1_process_tis_response(Authctxt *authctxt) argument 239 do_authloop(Authctxt *authctxt) argument 383 do_authentication(Authctxt *authctxt) argument [all...] |
H A D | auth2-chall.c | 157 kbdint_next_device(Authctxt *authctxt, KbdintAuthctxt *kbdintctxt) argument 172 if (!auth2_method_allowed(authctxt, 189 * try challenge-response, set authctxt->postponed if we have to 193 auth2_challenge(Authctxt *authctxt, char *devs) argument 196 authctxt->user ? authctxt->user : "<nouser>", 199 if (authctxt->user == NULL || !devs) 201 if (authctxt->kbdintctxt == NULL) 202 authctxt->kbdintctxt = kbdint_alloc(devs); 203 return auth2_challenge_start(authctxt); 208 auth2_challenge_stop(Authctxt *authctxt) argument 220 auth2_challenge_start(Authctxt *authctxt) argument 250 send_userauth_info_request(Authctxt *authctxt) argument 285 Authctxt *authctxt = ctxt; local [all...] |
H A D | session.h | 36 Authctxt *authctxt; member in struct:Session
|
H A D | auth2-pubkey.c | 75 userauth_pubkey(Authctxt *authctxt) argument 85 if (!authctxt->valid) { 126 if (auth2_userkey_already_used(authctxt, key)) { 148 xasprintf(&userstyle, "%s%s%s", authctxt->user, 149 authctxt->style ? ":" : "", 150 authctxt->style ? authctxt->style : ""); 156 authctxt->service); 168 pubkey_auth_info(authctxt, key, NULL); 172 if (PRIVSEP(user_key_allowed(authctxt 215 pubkey_auth_info(Authctxt *authctxt, const Key *key, const char *fmt, ...) argument 708 auth2_record_userkey(Authctxt *authctxt, struct sshkey *key) argument 723 auth2_userkey_already_used(Authctxt *authctxt, struct sshkey *key) argument [all...] |
H A D | auth2.c | 95 static char *authmethods_get(Authctxt *authctxt); 166 * loop until authctxt->success == TRUE 169 do_authentication2(Authctxt *authctxt) argument 173 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt); 180 Authctxt *authctxt = ctxt; local 186 if (authctxt == NULL) 187 fatal("input_service_request: no authctxt"); 190 if (!authctxt->success) { 215 Authctxt *authctxt local 292 userauth_finish(Authctxt *authctxt, int authenticated, const char *method, const char *submethod) argument 386 auth2_method_allowed(Authctxt *authctxt, const char *method, const char *submethod) argument 406 authmethods_get(Authctxt *authctxt) argument 434 authmethod_lookup(Authctxt *authctxt, const char *name) argument 506 auth2_setup_methods_lists(Authctxt *authctxt) argument 595 auth2_update_methods_lists(Authctxt *authctxt, const char *method, const char *submethod) argument [all...] |
H A D | auth.c | 257 auth_info(Authctxt *authctxt, const char *fmt, ...) argument 262 free(authctxt->info); 263 authctxt->info = NULL; 266 i = vasprintf(&authctxt->info, fmt, ap); 269 if (i < 0 || authctxt->info == NULL) 274 auth_log(Authctxt *authctxt, int authenticated, int partial, argument 280 if (use_privsep && !mm_is_monitor() && !authctxt->postponed) 285 !authctxt->valid || 286 authctxt->failures >= options.max_authtries / 2 || 290 if (authctxt 332 auth_maxtries_exceeded(Authctxt *authctxt) argument [all...] |
H A D | auth-pam.c | 280 fatal("%s: PAM authctxt not initialized", __func__); 462 fatal("%s: PAM authctxt not initialized", __func__); 621 sshpam_init(Authctxt *authctxt) argument 624 const char *pam_rhost, *pam_user, *user = authctxt->user; 639 sshpam_authctxt = authctxt; 672 sshpam_init_ctx(Authctxt *authctxt) argument 686 if (sshpam_init(authctxt) == -1) { 884 start_pam(Authctxt *authctxt) argument 889 if (sshpam_init(authctxt) == -1) 1179 sshpam_auth_passwd(Authctxt *authctxt, cons argument [all...] |
H A D | monitor_wrap.c | 352 mm_auth_password(Authctxt *authctxt, char *password) argument 566 mm_start_pam(Authctxt *authctxt) argument 609 mm_sshpam_init_ctx(Authctxt *authctxt) argument 616 buffer_put_cstring(&m, authctxt->user); 627 return (authctxt);
|
H A D | serverloop.c | 824 server_loop2(Authctxt *authctxt) argument
|
H A D | monitor.c | 169 static Authctxt *authctxt; variable 345 authctxt = _authctxt; 346 memset(authctxt, 0, sizeof(*authctxt)); 348 authctxt->loginmsg = &loginmsg; 375 !auth2_update_methods_lists(authctxt, 388 if (authctxt->pw->pw_uid == 0 && 405 auth_log(authctxt, authenticated, partial, 408 authctxt->failures++; 412 if (!authctxt [all...] |
H A D | session.c | 254 do_authenticated(Authctxt *authctxt) argument 256 setproctitle("%s", authctxt->pw->pw_name); 269 do_authenticated2(authctxt); 271 do_authenticated1(authctxt); 273 do_cleanup(authctxt); 283 do_authenticated1(Authctxt *authctxt) argument 296 s->authctxt = authctxt; 297 s->pw = authctxt->pw; 888 if (options.use_pam && !use_privsep && s->authctxt 1973 session_open(Authctxt *authctxt, int chanid) argument 2724 do_authenticated2(Authctxt *authctxt) argument 2730 do_cleanup(Authctxt *authctxt) argument [all...] |
/external/openssh/openbsd-compat/ |
H A D | port-uw.c | 54 sys_auth_passwd(Authctxt *authctxt, const char *password) argument 56 struct passwd *pw = authctxt->pw; 60 /* Just use the supplied fake password if authctxt is invalid */ 61 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; 84 if (authctxt->valid)
|