Lines Matching defs:ssh
72 #include "ssh-gss.h"
91 * Check if the user is allowed to log in via ssh. If user is listed
100 allowed_user(struct ssh *ssh, struct passwd * pw)
144 hostname = auth_get_canonical_hostname(ssh, options.use_dns);
145 ipaddr = ssh_remote_ipaddr(ssh);
267 auth_log(struct ssh *ssh, int authenticated, int partial,
270 Authctxt *authctxt = (Authctxt *)ssh->authctxt;
292 BLACKLIST_NOTIFY(ssh, BLACKLIST_AUTH_OK,
307 ssh_remote_ipaddr(ssh),
308 ssh_remote_port(ssh),
321 record_failed_login(ssh, authctxt->user,
322 auth_get_canonical_hostname(ssh, options.use_dns), "ssh");
325 audit_event(ssh, audit_classify_auth(method));
332 auth_get_canonical_hostname(ssh, options.use_dns), "ssh",
338 auth_maxtries_exceeded(struct ssh *ssh)
340 Authctxt *authctxt = (Authctxt *)ssh->authctxt;
342 BLACKLIST_NOTIFY(ssh, BLACKLIST_AUTH_FAIL, "Maximum attempts exceeded");
347 ssh_remote_ipaddr(ssh),
348 ssh_remote_port(ssh));
349 ssh_packet_disconnect(ssh, "Too many authentication failures");
357 auth_root_allowed(struct ssh *ssh, const char *method)
376 ssh_remote_ipaddr(ssh), ssh_remote_port(ssh));
468 getpwnamallow(struct ssh *ssh, const char *user)
483 ci = server_get_connection_info(ssh, 1, options.use_dns);
491 server_process_permitopen(ssh);
503 BLACKLIST_NOTIFY(ssh, BLACKLIST_AUTH_FAIL, "Invalid user");
505 user, ssh_remote_ipaddr(ssh), ssh_remote_port(ssh));
507 record_failed_login(ssh, user,
508 auth_get_canonical_hostname(ssh, options.use_dns), "ssh");
511 audit_event(ssh, SSH_INVALID_USER);
515 if (!allowed_user(ssh, pw))
523 from_host = auth_get_canonical_hostname(ssh, options.use_dns);
524 from_ip = ssh_remote_ipaddr(ssh);
539 auth_approval(as, lc, pw->pw_name, "ssh") <= 0) {
608 auth_debug_send(struct ssh *ssh)
618 ssh_packet_send_debug(ssh, "%s", msg);
672 auth_get_canonical_hostname(struct ssh *ssh, int use_dns)
677 return ssh_remote_ipaddr(ssh);
680 dnsname = ssh_remote_hostname(ssh);
758 auth_activate_options(struct ssh *ssh, struct sshauthopt *opts)
773 auth_restrict_session(struct ssh *ssh)
785 if (auth_activate_options(ssh, restricted) != 0)