search for: client_n

Displaying 5 results from an estimated 5 matches for "client_n".

Did you mean: client_t
2003 Feb 09
1
Logging of comments on keys
...%s", key_type(found), fp); + verbose("Comment on key: %s", cp); xfree(fp); break; } *** auth-rsa.c.orig Sun Feb 9 13:18:56 2003 --- auth-rsa.c Sun Feb 9 13:21:39 2003 *************** *** 153,159 **** int auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) { ! char line[8192], *file; int allowed = 0; u_int bits; FILE *f; --- 153,159 ---- int auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) { ! char line[8192], *file, *extpubkey; int allowed = 0; u_int bits; FILE *f; *************** *** 164...
2002 Jan 23
0
[PATCH] Add multiple AuthorizedKeyFiles options
.../auth-rsa.c,v retrieving revision 1.41 diff -u -r1.41 auth-rsa.c --- auth-rsa.c 22 Jan 2002 12:16:33 -0000 1.41 +++ auth-rsa.c 23 Jan 2002 11:11:28 -0000 @@ -58,6 +58,8 @@ * our challenge; returns zero if the client gives a wrong answer. */ +static int auth_rsa_file(struct passwd *pw, BIGNUM *client_n, char *file); + int auth_rsa_challenge_dialog(RSA *pk) { @@ -122,11 +124,33 @@ * 0 if the client could not be authenticated, and 1 if authentication was * successful. This may exit if there is a serious protocol violation. */ +int +auth_rsa(struct passwd *pw, BIGNUM *client_n) { + char *...
2002 Jan 29
2
Key fingerprint logging
...on Aug 6 23:01:49 2001 +++ openssh-3.0.2p1/auth-rsa.c Tue Jan 29 14:26:34 2002 @@ -118,11 +118,11 @@ * 0 if the client could not be authenticated, and 1 if authentication was * successful. This may exit if there is a serious protocol violation. */ int -auth_rsa(struct passwd *pw, BIGNUM *client_n) +auth_rsa(struct passwd *pw, BIGNUM *client_n, char *info, int info_size) { char line[8192], *file; int authenticated; u_int bits; FILE *f; @@ -179,11 +179,11 @@ * found, perform a challenge-response dialog to verify that the * user really has the corresponding private key. */...
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...c openssh-3.1p1-mods/auth-rsa.c - --- openssh-3.1p1/auth-rsa.c Thu May 9 12:18:25 2002 +++ openssh-3.1p1-mods/auth-rsa.c Thu May 9 12:19:54 2002 @@ -123,8 +123,11 @@ * successful. This may exit if there is a serious protocol violation. */ int - -auth_rsa(struct passwd *pw, BIGNUM *client_n) +auth_rsa(struct passwd *pw, BIGNUM *client_n, char *realname, int realnamesize) { char line[8192], *file; int authenticated; @@ -134,6 +137,8 @@ struct stat st; Key *key; char *fp; + char *comment; + int commentlen;...
2006 Feb 12
1
sshd double-logging
..." ssh2" : ""); } debug3("%s: key %p is %s", @@ -1374,6 +1381,7 @@ mm_answer_rsa_keyallowed(int sock, Buffe debug3("%s entering", __func__); + auth_method = "rsa"; if (options.rsa_authentication && authctxt->valid) { if ((client_n = BN_new()) == NULL) fatal("%s: BN_new", __func__); -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69 Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement.