/dragonfly/crypto/openssh/ |
H A D | auth2.c | 173 Authctxt *authctxt = ssh->authctxt; in do_authentication2() local 178 ssh->authctxt = NULL; in do_authentication2() 185 Authctxt *authctxt = ssh->authctxt; in input_service_request() local 193 if (authctxt == NULL) in input_service_request() 263 Authctxt *authctxt = ssh->authctxt; in input_userauth_request() local 277 debug("attempt %d failures %d", authctxt->attempt, authctxt->failures); in input_userauth_request() 319 authctxt->user, authctxt->service, user, service); in input_userauth_request() 356 Authctxt *authctxt = ssh->authctxt; in userauth_finish() local 630 authctxt->auth_methods[authctxt->num_auth_methods++] = in auth2_setup_methods_lists() 775 (tmp = recallocarray(authctxt->prev_keys, authctxt->nprev_keys, in auth2_record_key() [all …]
|
H A D | sshconnect2.c | 468 authctxt.active_ktype = authctxt.oktypes = authctxt.ktypes = NULL; in ssh_userauth2() 487 ssh->authctxt = &authctxt; in ssh_userauth2() 618 Authctxt *authctxt = ssh->authctxt; in input_userauth_success() local 636 Authctxt *authctxt = ssh->authctxt; 651 Authctxt *authctxt = ssh->authctxt; in input_userauth_failure() local 712 Authctxt *authctxt = ssh->authctxt; in input_userauth_pk_ok() local 852 Authctxt *authctxt = ssh->authctxt; in process_gssapi_token() local 920 Authctxt *authctxt = ssh->authctxt; in input_gssapi_response() local 965 Authctxt *authctxt = ssh->authctxt; in input_gssapi_token() local 998 Authctxt *authctxt = ssh->authctxt; in input_gssapi_errtok() local [all …]
|
H A D | auth-passwd.c | 79 Authctxt *authctxt = ssh->authctxt; in auth_password() local 80 struct passwd *pw = authctxt->pw; in auth_password() 81 int result, ok = authctxt->valid; in auth_password() 122 authctxt->force_pwchange = 1; in auth_password() 126 if (authctxt->force_pwchange) in auth_password() 143 if (authctxt->valid) { in warn_expiry() 169 Authctxt *authctxt = ssh->authctxt; in sys_auth_passwd() local 173 as = auth_usercheck(authctxt->pw->pw_name, authctxt->style, "auth-ssh", in sys_auth_passwd() 180 authctxt->force_pwchange = 1; in sys_auth_passwd() 185 warn_expiry(authctxt, as); in sys_auth_passwd() [all …]
|
H A D | auth2-chall.c | 195 Authctxt *authctxt = ssh->authctxt; in auth2_challenge() local 197 authctxt->user ? authctxt->user : "<nouser>", in auth2_challenge() 211 Authctxt *authctxt = ssh->authctxt; in auth2_challenge_stop() local 216 authctxt->kbdintctxt = NULL; in auth2_challenge_stop() 224 Authctxt *authctxt = ssh->authctxt; in auth2_challenge_start() local 248 authctxt->postponed = 1; in auth2_challenge_start() 255 Authctxt *authctxt = ssh->authctxt; in send_userauth_info_request() local 292 Authctxt *authctxt = ssh->authctxt; in input_userauth_info_response() local 300 if (authctxt == NULL) in input_userauth_info_response() 341 authctxt->postponed = 1; in input_userauth_info_response() [all …]
|
H A D | monitor.c | 283 authctxt = (Authctxt *)ssh->authctxt; in monitor_child_preauth() 284 memset(authctxt, 0, sizeof(*authctxt)); in monitor_child_preauth() 285 ssh->authctxt = authctxt; in monitor_child_preauth() 350 if (!authctxt->valid) in monitor_child_preauth() 356 ssh->authctxt = NULL; in monitor_child_preauth() 739 authctxt->valid = 1; in mm_answer_pwnamallow() 766 authctxt->valid ? "authenticating" : "invalid ", authctxt->user); in mm_answer_pwnamallow() 836 debug3_f("service=%s, style=%s", authctxt->service, authctxt->style); in mm_answer_authserv() 1281 authctxt->style ? authctxt->style : ""); in monitor_valid_userblob() 1352 authctxt->style ? authctxt->style : ""); in monitor_valid_hostbasedblob() [all …]
|
H A D | auth.c | 231 format_method_key(Authctxt *authctxt) in format_method_key() argument 271 Authctxt *authctxt = (Authctxt *)ssh->authctxt; in auth_log() local 281 !authctxt->valid || in auth_log() 286 if (authctxt->postponed) in auth_log() 294 if (authctxt->auth_method_info != NULL) in auth_log() 302 authctxt->valid ? "" : "invalid user ", in auth_log() 303 authctxt->user, in auth_log() 318 record_failed_login(ssh, authctxt->user, in auth_log() 328 sys_auth_record_login(authctxt->user, in auth_log() 337 Authctxt *authctxt = (Authctxt *)ssh->authctxt; in auth_maxtries_exceeded() local [all …]
|
H A D | auth2-pubkey.c | 90 Authctxt *authctxt = ssh->authctxt; in userauth_pubkey() local 91 struct passwd *pw = authctxt->pw; in userauth_pubkey() 131 authctxt->valid ? "valid" : "invalid", authctxt->user, in userauth_pubkey() 162 if (auth2_key_already_used(authctxt, key)) { in userauth_pubkey() 204 if (!authctxt->valid || authctxt->user == NULL) { in userauth_pubkey() 210 authctxt->style ? ":" : "", in userauth_pubkey() 211 authctxt->style ? authctxt->style : ""); in userauth_pubkey() 249 authctxt->valid ? "" : "invalid user ", in userauth_pubkey() 250 authctxt->user, ssh_remote_ipaddr(ssh), in userauth_pubkey() 278 if (!authctxt->valid || authctxt->user == NULL) { in userauth_pubkey() [all …]
|
H A D | auth2-hostbased.c | 62 Authctxt *authctxt = ssh->authctxt; in userauth_hostbased() local 128 if (!authctxt->valid || authctxt->user == NULL) { in userauth_hostbased() 138 (r = sshbuf_put_cstring(b, authctxt->user)) != 0 || in userauth_hostbased() 139 (r = sshbuf_put_cstring(b, authctxt->service)) != 0 || in userauth_hostbased() 150 auth2_record_info(authctxt, in userauth_hostbased() 155 if (PRIVSEP(hostbased_key_allowed(ssh, authctxt->pw, cuser, in userauth_hostbased() 161 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased()
|
H A D | auth.h | 148 void auth2_record_info(Authctxt *authctxt, const char *, ...) 154 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *); 155 int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt); 156 int auth_krb5_password(Authctxt *authctxt, const char *password); 157 void krb5_cleanup_proc(Authctxt *authctxt);
|
H A D | auth-pam.c | 687 sshpam_init(struct ssh *ssh, Authctxt *authctxt) in sshpam_init() argument 689 const char *pam_user, *user = authctxt->user; in sshpam_init() 715 sshpam_authctxt = authctxt; in sshpam_init() 788 sshpam_init_ctx(Authctxt *authctxt) in sshpam_init_ctx() argument 802 if (sshpam_init(NULL, authctxt) == -1) { in sshpam_init_ctx() 1049 Authctxt *authctxt = (Authctxt *)ssh->authctxt; in start_pam() local 1054 if (sshpam_init(ssh, authctxt) == -1) in start_pam() 1348 sshpam_authctxt = authctxt; in sshpam_auth_passwd() 1355 if (!authctxt->valid || (authctxt->pw->pw_uid == 0 && in sshpam_auth_passwd() 1372 authctxt->user); in sshpam_auth_passwd() [all …]
|
H A D | session.c | 360 prepare_auth_info_file(authctxt->pw, authctxt->session_info); in do_authenticated() 364 do_cleanup(ssh, authctxt); in do_authenticated() 1093 if (s->authctxt->krb5_ccname) in do_setup_env() 1095 s->authctxt->krb5_ccname); in do_setup_env() 1804 s->authctxt = authctxt; in session_open() 1805 s->pw = authctxt->pw; in session_open() 2638 server_loop2(ssh, authctxt); in do_authenticated2() 2657 if (authctxt == NULL) in do_cleanup() 2667 if (!authctxt->authenticated) in do_cleanup() 2672 authctxt->krb5_ctx) in do_cleanup() [all …]
|
H A D | sshd.c | 546 if (authctxt->pw->pw_uid == 0) { 580 do_setusercontext(authctxt->pw); 1555 Authctxt *authctxt; local 2222 authctxt = xcalloc(1, sizeof(*authctxt)); 2223 ssh->authctxt = authctxt; 2225 authctxt->loginmsg = loginmsg; 2228 the_authctxt = authctxt; 2271 authctxt->authenticated = 1; 2283 temporarily_use_uid(authctxt->pw); 2300 privsep_postauth(ssh, authctxt); [all …]
|
H A D | session.h | 36 Authctxt *authctxt; member
|
H A D | packet.h | 82 void *authctxt; member
|
H A D | monitor_wrap.c | 693 mm_sshpam_init_ctx(Authctxt *authctxt) in mm_sshpam_init_ctx() argument 713 return (authctxt); in mm_sshpam_init_ctx()
|
H A D | serverloop.c | 335 server_loop2(struct ssh *ssh, Authctxt *authctxt) in server_loop2() argument
|
/dragonfly/usr.sbin/sshd/ |
H A D | auth-passwd-custom.c | 44 Authctxt *authctxt = ssh->authctxt; in sys_auth_passwd() local 45 struct passwd *pw = authctxt->pw; in sys_auth_passwd() 49 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; in sys_auth_passwd() 63 if (authctxt->valid && pw_password[0] && pw_password[1]) in sys_auth_passwd()
|