/external/openssh/ |
D | auth-krb5.c | 60 Authctxt *authctxt = (Authctxt *)context; in krb5_init() local 63 if (authctxt->krb5_ctx == NULL) { in krb5_init() 64 problem = krb5_init_context(&authctxt->krb5_ctx); in krb5_init() 72 auth_krb5_password(Authctxt *authctxt, const char *password) in auth_krb5_password() argument 84 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name); in auth_krb5_password() 85 client = platform_client ? platform_client : authctxt->pw->pw_name; in auth_krb5_password() 87 temporarily_use_uid(authctxt->pw); in auth_krb5_password() 89 problem = krb5_init(authctxt); in auth_krb5_password() 93 problem = krb5_parse_name(authctxt->krb5_ctx, client, in auth_krb5_password() 94 &authctxt->krb5_user); in auth_krb5_password() [all …]
|
D | auth2.c | 171 do_authentication2(Authctxt *authctxt) in do_authentication2() argument 175 dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt); in do_authentication2() 182 Authctxt *authctxt = ctxt; in input_service_request() local 188 if (authctxt == NULL) in input_service_request() 192 if (!authctxt->success) { in input_service_request() 216 Authctxt *authctxt = ctxt; in input_userauth_request() local 221 if (authctxt == NULL) in input_userauth_request() 228 debug("attempt %d failures %d", authctxt->attempt, authctxt->failures); in input_userauth_request() 233 if (authctxt->attempt++ == 0) { in input_userauth_request() 235 authctxt->pw = PRIVSEP(getpwnamallow(user)); in input_userauth_request() [all …]
|
D | auth-bsdauth.c | 45 bsdauth_init_ctx(Authctxt *authctxt) in bsdauth_init_ctx() argument 47 return authctxt; in bsdauth_init_ctx() 54 Authctxt *authctxt = ctx; in bsdauth_query() local 57 if (authctxt->as != NULL) { in bsdauth_query() 59 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query() 61 auth_close(authctxt->as); in bsdauth_query() 62 authctxt->as = NULL; in bsdauth_query() 69 authctxt->style ? authctxt->style : "<default>"); in bsdauth_query() 70 authctxt->as = auth_userchallenge(authctxt->user, in bsdauth_query() 71 authctxt->style, "auth-ssh", &challenge); in bsdauth_query() [all …]
|
D | auth1.c | 115 auth1_process_password(Authctxt *authctxt, char *info, size_t infolen) in auth1_process_password() argument 131 authenticated = PRIVSEP(auth_password(authctxt, password)); in auth1_process_password() 146 auth1_process_rsa(Authctxt *authctxt, char *info, size_t infolen) in auth1_process_rsa() argument 156 authenticated = auth_rsa(authctxt, n); in auth1_process_rsa() 164 auth1_process_rhosts_rsa(Authctxt *authctxt, char *info, size_t infolen) in auth1_process_rhosts_rsa() argument 192 authenticated = auth_rhosts_rsa(authctxt, client_user, in auth1_process_rhosts_rsa() 203 auth1_process_tis_challenge(Authctxt *authctxt, char *info, size_t infolen) in auth1_process_tis_challenge() argument 207 if ((challenge = get_challenge(authctxt)) == NULL) in auth1_process_tis_challenge() 222 auth1_process_tis_response(Authctxt *authctxt, char *info, size_t infolen) in auth1_process_tis_response() argument 230 authenticated = verify_response(authctxt, response); in auth1_process_tis_response() [all …]
|
D | sshconnect2.c | 274 int (*userauth)(Authctxt *authctxt); 275 void (*cleanup)(Authctxt *authctxt); 302 int userauth_gssapi(Authctxt *authctxt); 368 Authctxt authctxt; in ssh_userauth2() local 396 memset(&authctxt, 0, sizeof(authctxt)); in ssh_userauth2() 397 pubkey_prepare(&authctxt); in ssh_userauth2() 398 authctxt.server_user = server_user; in ssh_userauth2() 399 authctxt.local_user = local_user; in ssh_userauth2() 400 authctxt.host = host; in ssh_userauth2() 401 authctxt.service = "ssh-connection"; /* service name */ in ssh_userauth2() [all …]
|
D | auth2-gss.c | 60 userauth_gssapi(Authctxt *authctxt) in userauth_gssapi() argument 71 if (!authctxt->valid || authctxt->user == NULL) in userauth_gssapi() 105 authctxt->server_caused_failure = 1; in userauth_gssapi() 113 authctxt->server_caused_failure = 1; in userauth_gssapi() 117 authctxt->methoddata = (void *)ctxt; in userauth_gssapi() 129 authctxt->postponed = 1; in userauth_gssapi() 137 Authctxt *authctxt = ctxt; in input_gssapi_token() local 144 if (authctxt == NULL || (authctxt->methoddata == NULL && !use_privsep)) in input_gssapi_token() 147 gssctxt = authctxt->methoddata; in input_gssapi_token() 164 authctxt->postponed = 0; in input_gssapi_token() [all …]
|
D | auth2-jpake.c | 82 userauth_jpake(Authctxt *authctxt) in userauth_jpake() argument 90 if (authctxt->user != NULL) { in userauth_jpake() 91 if (authctxt->jpake_ctx == NULL) in userauth_jpake() 92 authctxt->jpake_ctx = jpake_new(); in userauth_jpake() 94 authenticated = auth2_jpake_start(authctxt); in userauth_jpake() 108 auth2_jpake_stop(Authctxt *authctxt) in auth2_jpake_stop() argument 114 if (authctxt->jpake_ctx != NULL) { in auth2_jpake_stop() 115 jpake_free(authctxt->jpake_ctx); in auth2_jpake_stop() 116 authctxt->jpake_ctx = NULL; in auth2_jpake_stop() 220 fake_salt_and_scheme(Authctxt *authctxt, char **salt, char **scheme) in fake_salt_and_scheme() argument [all …]
|
D | auth-chall.c | 46 get_challenge(Authctxt *authctxt) in get_challenge() argument 60 if ((authctxt->kbdintctxt = device->init_ctx(authctxt)) == NULL) in get_challenge() 62 if (device->query(authctxt->kbdintctxt, &name, &info, in get_challenge() 64 device->free_ctx(authctxt->kbdintctxt); in get_challenge() 65 authctxt->kbdintctxt = NULL; in get_challenge() 81 verify_response(Authctxt *authctxt, const char *response) in verify_response() argument 89 if (authctxt->kbdintctxt == NULL) in verify_response() 92 switch (device->respond(authctxt->kbdintctxt, 1, resp)) { in verify_response() 97 if ((device->query(authctxt->kbdintctxt, &name, &info, in verify_response() 101 device->respond(authctxt->kbdintctxt, 0, resp) == 0) in verify_response() [all …]
|
D | auth2-chall.c | 190 auth2_challenge(Authctxt *authctxt, char *devs) in auth2_challenge() argument 193 authctxt->user ? authctxt->user : "<nouser>", in auth2_challenge() 196 if (authctxt->user == NULL || !devs) in auth2_challenge() 198 if (authctxt->kbdintctxt == NULL) in auth2_challenge() 199 authctxt->kbdintctxt = kbdint_alloc(devs); in auth2_challenge() 200 return auth2_challenge_start(authctxt); in auth2_challenge() 205 auth2_challenge_stop(Authctxt *authctxt) in auth2_challenge_stop() argument 209 if (authctxt->kbdintctxt != NULL) { in auth2_challenge_stop() 210 kbdint_free(authctxt->kbdintctxt); in auth2_challenge_stop() 211 authctxt->kbdintctxt = NULL; in auth2_challenge_stop() [all …]
|
D | auth-passwd.c | 81 auth_password(Authctxt *authctxt, const char *password) in auth_password() argument 83 struct passwd * pw = authctxt->pw; in auth_password() 84 int result, ok = authctxt->valid; in auth_password() 98 int ret = auth_krb5_password(authctxt, password); in auth_password() 116 return (sshpam_auth_passwd(authctxt, password) && ok); in auth_password() 121 if (auth_shadow_pwexpired(authctxt)) in auth_password() 122 authctxt->force_pwchange = 1; in auth_password() 125 result = sys_auth_passwd(authctxt, password); in auth_password() 126 if (authctxt->force_pwchange) in auth_password() 133 warn_expiry(Authctxt *authctxt, auth_session_t *as) in warn_expiry() argument [all …]
|
D | auth-skey.c | 46 skey_init_ctx(Authctxt *authctxt) in skey_init_ctx() argument 48 return authctxt; in skey_init_ctx() 55 Authctxt *authctxt = ctx; in skey_query() local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, in skey_query() 77 Authctxt *authctxt = ctx; in skey_respond() local 79 if (authctxt->valid && in skey_respond() 81 skey_haskey(authctxt->pw->pw_name) == 0 && in skey_respond() 82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1) in skey_respond()
|
D | monitor.c | 192 static Authctxt *authctxt; variable 363 authctxt = _authctxt; in monitor_child_preauth() 364 memset(authctxt, 0, sizeof(*authctxt)); in monitor_child_preauth() 366 authctxt->loginmsg = &loginmsg; in monitor_child_preauth() 388 if (authctxt->pw->pw_uid == 0 && in monitor_child_preauth() 406 auth_log(authctxt, authenticated, auth_method, in monitor_child_preauth() 409 authctxt->failures++; in monitor_child_preauth() 414 if (authctxt->jpake_ctx != NULL) { in monitor_child_preauth() 415 jpake_free(authctxt->jpake_ctx); in monitor_child_preauth() 416 authctxt->jpake_ctx = NULL; in monitor_child_preauth() [all …]
|
D | auth-sia.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *pass) in sys_auth_passwd() argument 61 if (!authctxt->user || pass == NULL || pass[0] == '\0') in sys_auth_passwd() 64 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user, in sys_auth_passwd() 70 authctxt->user, host); in sys_auth_passwd()
|
D | auth.h | 86 int (*userauth)(Authctxt *authctxt); 124 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *); 125 int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt); 126 int auth_krb5_password(Authctxt *authctxt, const char *password); 127 void krb5_cleanup_proc(Authctxt *authctxt);
|
D | auth.c | 254 auth_log(Authctxt *authctxt, int authenticated, char *method, char *info) in auth_log() argument 259 if (use_privsep && !mm_is_monitor() && !authctxt->postponed) in auth_log() 264 !authctxt->valid || in auth_log() 265 authctxt->failures >= options.max_authtries / 2 || in auth_log() 269 if (authctxt->postponed) in auth_log() 277 authctxt->valid ? "" : "invalid user ", in auth_log() 278 authctxt->user, in auth_log() 284 if (authenticated == 0 && !authctxt->postponed && in auth_log() 288 record_failed_login(authctxt->user, in auth_log() 292 sys_auth_record_login(authctxt->user, in auth_log() [all …]
|
D | auth-rh-rsa.c | 66 auth_rhosts_rsa(Authctxt *authctxt, char *cuser, Key *client_host_key) in auth_rhosts_rsa() argument 69 struct passwd *pw = authctxt->pw; in auth_rhosts_rsa() 74 if (!authctxt->valid || client_host_key == NULL || in auth_rhosts_rsa()
|
D | auth2-hostbased.c | 57 userauth_hostbased(Authctxt *authctxt) in userauth_hostbased() argument 67 if (!authctxt->valid) { in userauth_hostbased() 104 authctxt->service; in userauth_hostbased() 109 buffer_put_cstring(&b, authctxt->user); in userauth_hostbased() 121 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) && in userauth_hostbased()
|
D | session.c | 271 do_authenticated(Authctxt *authctxt) in do_authenticated() argument 273 setproctitle("%s", authctxt->pw->pw_name); in do_authenticated() 282 do_authenticated2(authctxt); in do_authenticated() 284 do_authenticated1(authctxt); in do_authenticated() 286 do_cleanup(authctxt); in do_authenticated() 296 do_authenticated1(Authctxt *authctxt) in do_authenticated1() argument 309 s->authctxt = authctxt; in do_authenticated1() 310 s->pw = authctxt->pw; in do_authenticated1() 878 if (options.use_pam && !use_privsep && s->authctxt->force_pwchange) { in do_login() 881 s->authctxt->force_pwchange = 0; in do_login() [all …]
|
D | auth2-pubkey.c | 68 userauth_pubkey(Authctxt *authctxt) in userauth_pubkey() argument 78 if (!authctxt->valid) { in userauth_pubkey() 124 buffer_put_cstring(&b, authctxt->user); in userauth_pubkey() 128 authctxt->service); in userauth_pubkey() 142 if (PRIVSEP(user_key_allowed(authctxt->pw, key)) && in userauth_pubkey() 160 if (PRIVSEP(user_key_allowed(authctxt->pw, key))) { in userauth_pubkey() 166 authctxt->postponed = 1; in userauth_pubkey()
|
D | auth-pam.c | 621 sshpam_init(Authctxt *authctxt) in sshpam_init() argument 624 const char *pam_rhost, *pam_user, *user = authctxt->user; in sshpam_init() 639 sshpam_authctxt = authctxt; in sshpam_init() 672 sshpam_init_ctx(Authctxt *authctxt) in sshpam_init_ctx() argument 686 if (sshpam_init(authctxt) == -1) { in sshpam_init_ctx() 884 start_pam(Authctxt *authctxt) in start_pam() argument 889 if (sshpam_init(authctxt) == -1) in start_pam() 1181 sshpam_auth_passwd(Authctxt *authctxt, const char *password) in sshpam_auth_passwd() argument 1191 sshpam_authctxt = authctxt; in sshpam_auth_passwd() 1198 if (!authctxt->valid || (authctxt->pw->pw_uid == 0 && in sshpam_auth_passwd() [all …]
|
D | auth2-none.c | 60 userauth_none(Authctxt *authctxt) in userauth_none() argument 67 return (PRIVSEP(auth_password(authctxt, ""))); in userauth_none()
|
D | auth2-kbdint.c | 45 userauth_kbdint(Authctxt *authctxt) in userauth_kbdint() argument 57 authenticated = auth2_challenge(authctxt, devs); in userauth_kbdint()
|
D | auth2-passwd.c | 50 userauth_passwd(Authctxt *authctxt) in userauth_passwd() argument 71 else if (PRIVSEP(auth_password(authctxt, password)) == 1) in userauth_passwd()
|
D | auth-rsa.c | 296 auth_rsa(Authctxt *authctxt, BIGNUM *client_n) in auth_rsa() argument 300 struct passwd *pw = authctxt->pw; in auth_rsa() 303 if (!authctxt->valid) in auth_rsa()
|
/external/openssh/openbsd-compat/ |
D | port-uw.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *password) in sys_auth_passwd() argument 55 struct passwd *pw = authctxt->pw; in sys_auth_passwd() 60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; in sys_auth_passwd() 83 if (authctxt->valid) in sys_auth_passwd()
|