/freebsd/crypto/openssh/ |
H A D | auth-krb5.c | 60 Authctxt *authctxt = (Authctxt *)context; in krb5_init() local 63 if (authctxt->krb5_ctx == NULL) { in krb5_init() 64 problem = krb5_init_context(&authctxt->krb5_ctx); in krb5_init() 72 auth_krb5_password(Authctxt *authctxt, const char *password) in auth_krb5_password() argument 85 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name); in auth_krb5_password() 86 client = platform_client ? platform_client : authctxt->pw->pw_name; in auth_krb5_password() 88 temporarily_use_uid(authctxt->pw); in auth_krb5_password() 90 problem = krb5_init(authctxt); in auth_krb5_password() 94 problem = krb5_parse_name(authctxt->krb5_ctx, client, in auth_krb5_password() 95 &authctxt->krb5_user); in auth_krb5_password() [all …]
|
H A D | auth2.c | 98 static char *authmethods_get(Authctxt *authctxt); 174 Authctxt *authctxt = ssh->authctxt; in do_authentication2() local 180 ssh_dispatch_run_fatal(ssh, DISPATCH_BLOCK, &authctxt->success); in do_authentication2() 181 ssh->authctxt = NULL; in do_authentication2() 187 Authctxt *authctxt = ssh->authctxt; in input_service_request() local 195 if (authctxt == NULL) in input_service_request() 199 if (!authctxt->success) { in input_service_request() 272 Authctxt *authctxt = ssh->authctxt; in input_userauth_request() local 278 if (authctxt == NULL) in input_userauth_request() 286 debug("attempt %d failures %d", authctxt->attempt, authctxt->failures); in input_userauth_request() [all …]
|
H A D | auth-bsdauth.c | 45 bsdauth_init_ctx(Authctxt *authctxt) in bsdauth_init_ctx() argument 47 return authctxt; in bsdauth_init_ctx() 54 Authctxt *authctxt = ctx; in bsdauth_query() local 62 if (authctxt->as != NULL) { in bsdauth_query() 64 challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE); in bsdauth_query() 66 auth_close(authctxt->as); in bsdauth_query() 67 authctxt->as = NULL; in bsdauth_query() 74 authctxt->style ? authctxt->style : "<default>"); in bsdauth_query() 75 authctxt->as = auth_userchallenge(authctxt->user, in bsdauth_query() 76 authctxt->style, "auth-ssh", &challenge); in bsdauth_query() [all …]
|
H A D | sshconnect2.c | 426 Authctxt authctxt; in ssh_userauth2() local 433 memset(&authctxt, 0, sizeof(authctxt)); in ssh_userauth2() 434 authctxt.server_user = server_user; in ssh_userauth2() 435 authctxt.local_user = local_user; in ssh_userauth2() 436 authctxt.host = host; in ssh_userauth2() 437 authctxt.service = "ssh-connection"; /* service name */ in ssh_userauth2() 438 authctxt.success = 0; in ssh_userauth2() 439 authctxt.method = authmethod_lookup("none"); in ssh_userauth2() 440 authctxt.authlist = NULL; in ssh_userauth2() 441 authctxt.methoddata = NULL; in ssh_userauth2() [all …]
|
H A D | auth-passwd.c | 79 Authctxt *authctxt = ssh->authctxt; in auth_password() local 80 struct passwd *pw = authctxt->pw; in auth_password() 81 int result, ok = authctxt->valid; in auth_password() 98 int ret = auth_krb5_password(authctxt, password); in auth_password() 116 return (sshpam_auth_passwd(authctxt, password) && ok); in auth_password() 121 if (auth_shadow_pwexpired(authctxt)) in auth_password() 122 authctxt->force_pwchange = 1; in auth_password() 126 if (authctxt->force_pwchange) in auth_password() 133 warn_expiry(Authctxt *authctxt, auth_session_t *as) in warn_expiry() argument 143 if (authctxt->valid) { in warn_expiry() [all …]
|
H A D | auth2-gss.c | 68 Authctxt *authctxt = ssh->authctxt; in userauth_gssapi() local 110 authctxt->server_caused_failure = 1; in userauth_gssapi() 114 if (!authctxt->valid || authctxt->user == NULL) { in userauth_gssapi() 124 authctxt->server_caused_failure = 1; in userauth_gssapi() 128 authctxt->methoddata = (void *)ctxt; in userauth_gssapi() 140 authctxt->postponed = 1; in userauth_gssapi() 148 Authctxt *authctxt = ssh->authctxt; in input_gssapi_token() local 157 if (authctxt == NULL) in input_gssapi_token() 160 gssctxt = authctxt->methoddata; in input_gssapi_token() 181 authctxt->postponed = 0; in input_gssapi_token() [all …]
|
H A D | auth2-chall.c | 153 kbdint_next_device(Authctxt *authctxt, KbdintAuthctxt *kbdintctxt) in kbdint_next_device() argument 169 !auth2_method_allowed(authctxt, in kbdint_next_device() 195 Authctxt *authctxt = ssh->authctxt; in auth2_challenge() local 197 authctxt->user ? authctxt->user : "<nouser>", in auth2_challenge() 200 if (authctxt->user == NULL || !devs) in auth2_challenge() 202 if (authctxt->kbdintctxt == NULL) in auth2_challenge() 203 authctxt->kbdintctxt = kbdint_alloc(devs); in auth2_challenge() 211 Authctxt *authctxt = ssh->authctxt; in auth2_challenge_stop() local 214 if (authctxt->kbdintctxt != NULL) { in auth2_challenge_stop() 215 kbdint_free(authctxt->kbdintctxt); in auth2_challenge_stop() [all …]
|
H A D | monitor.c | 151 static Authctxt *authctxt; variable 280 authctxt = (Authctxt *)ssh->authctxt; in monitor_child_preauth() 281 memset(authctxt, 0, sizeof(*authctxt)); in monitor_child_preauth() 282 ssh->authctxt = authctxt; in monitor_child_preauth() 284 authctxt->loginmsg = loginmsg; in monitor_child_preauth() 296 auth2_authctxt_reset_info(authctxt); in monitor_child_preauth() 308 !auth2_update_methods_lists(authctxt, in monitor_child_preauth() 320 if (authctxt->pw->pw_uid == 0 && in monitor_child_preauth() 343 authctxt->failures++; in monitor_child_preauth() 345 auth2_update_session_info(authctxt, in monitor_child_preauth() [all …]
|
H A D | auth.c | 230 format_method_key(Authctxt *authctxt) in format_method_key() argument 232 const struct sshkey *key = authctxt->auth_method_key; in format_method_key() 233 const char *methinfo = authctxt->auth_method_info; in format_method_key() 270 Authctxt *authctxt = (Authctxt *)ssh->authctxt; in auth_log() local 275 if (!mm_is_monitor() && !authctxt->postponed) in auth_log() 280 !authctxt->valid || in auth_log() 281 authctxt->failures >= options.max_authtries / 2 || in auth_log() 285 if (authctxt->postponed) in auth_log() 295 if ((extra = format_method_key(authctxt)) == NULL) { in auth_log() 296 if (authctxt->auth_method_info != NULL) in auth_log() [all …]
|
H A D | auth2-pubkey.c | 91 Authctxt *authctxt = ssh->authctxt; in userauth_pubkey() local 92 struct passwd *pw = authctxt->pw; in userauth_pubkey() 132 authctxt->valid ? "valid" : "invalid", authctxt->user, in userauth_pubkey() 157 if (auth2_key_already_used(authctxt, key)) { in userauth_pubkey() 199 if (!authctxt->valid || authctxt->user == NULL) { in userauth_pubkey() 204 xasprintf(&userstyle, "%s%s%s", authctxt->user, in userauth_pubkey() 205 authctxt->style ? ":" : "", in userauth_pubkey() 206 authctxt->style ? authctxt->style : ""); in userauth_pubkey() 209 (r = sshbuf_put_cstring(b, authctxt->service)) != 0 || in userauth_pubkey() 231 auth2_record_info(authctxt, "signature count = %u", in userauth_pubkey() [all …]
|
H A D | auth2-hostbased.c | 62 Authctxt *authctxt = ssh->authctxt; in userauth_hostbased() local 122 if (!authctxt->valid || authctxt->user == NULL) { in userauth_hostbased() 132 (r = sshbuf_put_cstring(b, authctxt->user)) != 0 || in userauth_hostbased() 133 (r = sshbuf_put_cstring(b, authctxt->service)) != 0 || in userauth_hostbased() 144 auth2_record_info(authctxt, in userauth_hostbased() 149 if (mm_hostbased_key_allowed(ssh, authctxt->pw, cuser, in userauth_hostbased() 155 auth2_record_key(authctxt, authenticated, key); in userauth_hostbased()
|
H A D | auth-sia.c | 58 Authctxt *authctxt = ssh->authctxt; in sys_auth_passwd() local 62 if (!authctxt->user || pass == NULL || pass[0] == '\0') in sys_auth_passwd() 65 if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user, in sys_auth_passwd() 71 authctxt->user, host); in sys_auth_passwd()
|
H A D | auth-pam.c | 688 sshpam_init(struct ssh *ssh, Authctxt *authctxt) in sshpam_init() argument 690 const char *pam_user, *user = authctxt->user; in sshpam_init() 721 sshpam_authctxt = authctxt; in sshpam_init() 800 sshpam_init_ctx(Authctxt *authctxt) in sshpam_init_ctx() argument 814 if (sshpam_init(NULL, authctxt) == -1) { in sshpam_init_ctx() 1065 Authctxt *authctxt = (Authctxt *)ssh->authctxt; in start_pam() local 1070 if (sshpam_init(ssh, authctxt) == -1) in start_pam() 1351 sshpam_auth_passwd(Authctxt *authctxt, const char *password) in sshpam_auth_passwd() argument 1362 sshpam_authctxt = authctxt; in sshpam_auth_passwd() 1369 if (!authctxt->valid || (authctxt->pw->pw_uid == 0 && in sshpam_auth_passwd() [all …]
|
H A D | session.c | 344 do_authenticated(struct ssh *ssh, Authctxt *authctxt) in do_authenticated() argument 346 setproctitle("%s", authctxt->pw->pw_name); in do_authenticated() 370 prepare_auth_info_file(authctxt->pw, authctxt->session_info); in do_authenticated() 372 do_authenticated2(ssh, authctxt); in do_authenticated() 374 do_cleanup(ssh, authctxt); in do_authenticated() 1098 if (s->authctxt->krb5_ccname) in do_setup_env() 1100 s->authctxt->krb5_ccname); in do_setup_env() 1536 if (s->authctxt->force_pwchange) { in do_child() 1614 (s->authctxt->krb5_ctx != NULL)) { in do_child() 1622 krb5_afslog(s->authctxt->krb5_ctx, in do_child() [all …]
|
H A D | auth.h | 152 void auth2_record_info(Authctxt *authctxt, const char *, ...) 158 int auth_krb5_password(Authctxt *authctxt, const char *password); 159 void krb5_cleanup_proc(Authctxt *authctxt);
|
H A D | sshd-session.c | 392 privsep_postauth(struct ssh *ssh, Authctxt *authctxt) in privsep_postauth() argument 437 do_setusercontext(authctxt->pw); in privsep_postauth() 882 Authctxt *authctxt; in main() local 1305 authctxt = xcalloc(1, sizeof(*authctxt)); in main() 1306 ssh->authctxt = authctxt; in main() 1309 the_authctxt = authctxt; in main() 1347 authctxt->authenticated = 1; in main() 1364 temporarily_use_uid(authctxt->pw); in main() 1380 privsep_postauth(ssh, authctxt); in main() 1390 do_authenticated(ssh, authctxt); in main()
|
H A D | session.h | 36 Authctxt *authctxt; member
|
H A D | packet.h | 84 void *authctxt; member
|
H A D | monitor_wrap.c | 748 mm_sshpam_init_ctx(Authctxt *authctxt) in mm_sshpam_init_ctx() argument 768 return (authctxt); in mm_sshpam_init_ctx()
|
H A D | serverloop.c | 319 server_loop2(struct ssh *ssh, Authctxt *authctxt) in server_loop2() argument
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | port-uw.c | 55 Authctxt *authctxt = ssh->authctxt; in sys_auth_passwd() local 56 struct passwd *pw = authctxt->pw; in sys_auth_passwd() 61 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; in sys_auth_passwd() 87 if (authctxt->valid) in sys_auth_passwd()
|
H A D | port-aix.c | 178 Authctxt *ctxt = ssh->authctxt; in sys_auth_passwd()
|
/freebsd/contrib/blocklist/diff/ |
H A D | ssh.diff | 106 authctxt->pw = fakepw();
|