Home
last modified time | relevance | path

Searched refs:authctxt (Results 1 – 17 of 17) sorted by relevance

/dragonfly/crypto/openssh/
H A Dauth2.c173 Authctxt *authctxt = ssh->authctxt; in do_authentication2() local
178 ssh->authctxt = NULL; in do_authentication2()
185 Authctxt *authctxt = ssh->authctxt; in input_service_request() local
193 if (authctxt == NULL) in input_service_request()
263 Authctxt *authctxt = ssh->authctxt; in input_userauth_request() local
277 debug("attempt %d failures %d", authctxt->attempt, authctxt->failures); in input_userauth_request()
319 authctxt->user, authctxt->service, user, service); in input_userauth_request()
356 Authctxt *authctxt = ssh->authctxt; in userauth_finish() local
630 authctxt->auth_methods[authctxt->num_auth_methods++] = in auth2_setup_methods_lists()
775 (tmp = recallocarray(authctxt->prev_keys, authctxt->nprev_keys, in auth2_record_key()
[all …]
H A Dsshconnect2.c468 authctxt.active_ktype = authctxt.oktypes = authctxt.ktypes = NULL; in ssh_userauth2()
487 ssh->authctxt = &authctxt; in ssh_userauth2()
618 Authctxt *authctxt = ssh->authctxt; in input_userauth_success() local
636 Authctxt *authctxt = ssh->authctxt;
651 Authctxt *authctxt = ssh->authctxt; in input_userauth_failure() local
712 Authctxt *authctxt = ssh->authctxt; in input_userauth_pk_ok() local
852 Authctxt *authctxt = ssh->authctxt; in process_gssapi_token() local
920 Authctxt *authctxt = ssh->authctxt; in input_gssapi_response() local
965 Authctxt *authctxt = ssh->authctxt; in input_gssapi_token() local
998 Authctxt *authctxt = ssh->authctxt; in input_gssapi_errtok() local
[all …]
H A Dauth-passwd.c79 Authctxt *authctxt = ssh->authctxt; in auth_password() local
80 struct passwd *pw = authctxt->pw; in auth_password()
81 int result, ok = authctxt->valid; in auth_password()
122 authctxt->force_pwchange = 1; in auth_password()
126 if (authctxt->force_pwchange) in auth_password()
143 if (authctxt->valid) { in warn_expiry()
169 Authctxt *authctxt = ssh->authctxt; in sys_auth_passwd() local
173 as = auth_usercheck(authctxt->pw->pw_name, authctxt->style, "auth-ssh", in sys_auth_passwd()
180 authctxt->force_pwchange = 1; in sys_auth_passwd()
185 warn_expiry(authctxt, as); in sys_auth_passwd()
[all …]
H A Dauth2-chall.c195 Authctxt *authctxt = ssh->authctxt; in auth2_challenge() local
197 authctxt->user ? authctxt->user : "<nouser>", in auth2_challenge()
211 Authctxt *authctxt = ssh->authctxt; in auth2_challenge_stop() local
216 authctxt->kbdintctxt = NULL; in auth2_challenge_stop()
224 Authctxt *authctxt = ssh->authctxt; in auth2_challenge_start() local
248 authctxt->postponed = 1; in auth2_challenge_start()
255 Authctxt *authctxt = ssh->authctxt; in send_userauth_info_request() local
292 Authctxt *authctxt = ssh->authctxt; in input_userauth_info_response() local
300 if (authctxt == NULL) in input_userauth_info_response()
341 authctxt->postponed = 1; in input_userauth_info_response()
[all …]
H A Dmonitor.c283 authctxt = (Authctxt *)ssh->authctxt; in monitor_child_preauth()
284 memset(authctxt, 0, sizeof(*authctxt)); in monitor_child_preauth()
285 ssh->authctxt = authctxt; in monitor_child_preauth()
350 if (!authctxt->valid) in monitor_child_preauth()
356 ssh->authctxt = NULL; in monitor_child_preauth()
739 authctxt->valid = 1; in mm_answer_pwnamallow()
766 authctxt->valid ? "authenticating" : "invalid ", authctxt->user); in mm_answer_pwnamallow()
836 debug3_f("service=%s, style=%s", authctxt->service, authctxt->style); in mm_answer_authserv()
1281 authctxt->style ? authctxt->style : ""); in monitor_valid_userblob()
1352 authctxt->style ? authctxt->style : ""); in monitor_valid_hostbasedblob()
[all …]
H A Dauth.c231 format_method_key(Authctxt *authctxt) in format_method_key() argument
271 Authctxt *authctxt = (Authctxt *)ssh->authctxt; in auth_log() local
281 !authctxt->valid || in auth_log()
286 if (authctxt->postponed) in auth_log()
294 if (authctxt->auth_method_info != NULL) in auth_log()
302 authctxt->valid ? "" : "invalid user ", in auth_log()
303 authctxt->user, in auth_log()
318 record_failed_login(ssh, authctxt->user, in auth_log()
328 sys_auth_record_login(authctxt->user, in auth_log()
337 Authctxt *authctxt = (Authctxt *)ssh->authctxt; in auth_maxtries_exceeded() local
[all …]
H A Dauth2-pubkey.c90 Authctxt *authctxt = ssh->authctxt; in userauth_pubkey() local
91 struct passwd *pw = authctxt->pw; in userauth_pubkey()
131 authctxt->valid ? "valid" : "invalid", authctxt->user, in userauth_pubkey()
162 if (auth2_key_already_used(authctxt, key)) { in userauth_pubkey()
204 if (!authctxt->valid || authctxt->user == NULL) { in userauth_pubkey()
210 authctxt->style ? ":" : "", in userauth_pubkey()
211 authctxt->style ? authctxt->style : ""); in userauth_pubkey()
249 authctxt->valid ? "" : "invalid user ", in userauth_pubkey()
250 authctxt->user, ssh_remote_ipaddr(ssh), in userauth_pubkey()
278 if (!authctxt->valid || authctxt->user == NULL) { in userauth_pubkey()
[all …]
H A Dauth2-hostbased.c62 Authctxt *authctxt = ssh->authctxt; in userauth_hostbased() local
128 if (!authctxt->valid || authctxt->user == NULL) { in userauth_hostbased()
138 (r = sshbuf_put_cstring(b, authctxt->user)) != 0 || in userauth_hostbased()
139 (r = sshbuf_put_cstring(b, authctxt->service)) != 0 || in userauth_hostbased()
150 auth2_record_info(authctxt, in userauth_hostbased()
155 if (PRIVSEP(hostbased_key_allowed(ssh, authctxt->pw, cuser, in userauth_hostbased()
161 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased()
H A Dauth.h148 void auth2_record_info(Authctxt *authctxt, const char *, ...)
154 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *);
155 int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt);
156 int auth_krb5_password(Authctxt *authctxt, const char *password);
157 void krb5_cleanup_proc(Authctxt *authctxt);
H A Dauth-pam.c687 sshpam_init(struct ssh *ssh, Authctxt *authctxt) in sshpam_init() argument
689 const char *pam_user, *user = authctxt->user; in sshpam_init()
715 sshpam_authctxt = authctxt; in sshpam_init()
788 sshpam_init_ctx(Authctxt *authctxt) in sshpam_init_ctx() argument
802 if (sshpam_init(NULL, authctxt) == -1) { in sshpam_init_ctx()
1049 Authctxt *authctxt = (Authctxt *)ssh->authctxt; in start_pam() local
1054 if (sshpam_init(ssh, authctxt) == -1) in start_pam()
1348 sshpam_authctxt = authctxt; in sshpam_auth_passwd()
1355 if (!authctxt->valid || (authctxt->pw->pw_uid == 0 && in sshpam_auth_passwd()
1372 authctxt->user); in sshpam_auth_passwd()
[all …]
H A Dsession.c360 prepare_auth_info_file(authctxt->pw, authctxt->session_info); in do_authenticated()
364 do_cleanup(ssh, authctxt); in do_authenticated()
1093 if (s->authctxt->krb5_ccname) in do_setup_env()
1095 s->authctxt->krb5_ccname); in do_setup_env()
1804 s->authctxt = authctxt; in session_open()
1805 s->pw = authctxt->pw; in session_open()
2638 server_loop2(ssh, authctxt); in do_authenticated2()
2657 if (authctxt == NULL) in do_cleanup()
2667 if (!authctxt->authenticated) in do_cleanup()
2672 authctxt->krb5_ctx) in do_cleanup()
[all …]
H A Dsshd.c546 if (authctxt->pw->pw_uid == 0) {
580 do_setusercontext(authctxt->pw);
1555 Authctxt *authctxt; local
2222 authctxt = xcalloc(1, sizeof(*authctxt));
2223 ssh->authctxt = authctxt;
2225 authctxt->loginmsg = loginmsg;
2228 the_authctxt = authctxt;
2271 authctxt->authenticated = 1;
2283 temporarily_use_uid(authctxt->pw);
2300 privsep_postauth(ssh, authctxt);
[all …]
H A Dsession.h36 Authctxt *authctxt; member
H A Dpacket.h82 void *authctxt; member
H A Dmonitor_wrap.c693 mm_sshpam_init_ctx(Authctxt *authctxt) in mm_sshpam_init_ctx() argument
713 return (authctxt); in mm_sshpam_init_ctx()
H A Dserverloop.c335 server_loop2(struct ssh *ssh, Authctxt *authctxt) in server_loop2() argument
/dragonfly/usr.sbin/sshd/
H A Dauth-passwd-custom.c44 Authctxt *authctxt = ssh->authctxt; in sys_auth_passwd() local
45 struct passwd *pw = authctxt->pw; in sys_auth_passwd()
49 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; in sys_auth_passwd()
63 if (authctxt->valid && pw_password[0] && pw_password[1]) in sys_auth_passwd()