Displaying 5 results from an estimated 5 matches for "client_n".
Did you mean:
client_t
2003 Feb 09
1
Logging of comments on keys
...%s",
key_type(found), fp);
+ verbose("Comment on key: %s", cp);
xfree(fp);
break;
}
*** auth-rsa.c.orig Sun Feb 9 13:18:56 2003
--- auth-rsa.c Sun Feb 9 13:21:39 2003
***************
*** 153,159 ****
int
auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey)
{
! char line[8192], *file;
int allowed = 0;
u_int bits;
FILE *f;
--- 153,159 ----
int
auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey)
{
! char line[8192], *file, *extpubkey;
int allowed = 0;
u_int bits;
FILE *f;
***************
*** 164...
2002 Jan 23
0
[PATCH] Add multiple AuthorizedKeyFiles options
.../auth-rsa.c,v
retrieving revision 1.41
diff -u -r1.41 auth-rsa.c
--- auth-rsa.c 22 Jan 2002 12:16:33 -0000 1.41
+++ auth-rsa.c 23 Jan 2002 11:11:28 -0000
@@ -58,6 +58,8 @@
* our challenge; returns zero if the client gives a wrong answer.
*/
+static int auth_rsa_file(struct passwd *pw, BIGNUM *client_n, char *file);
+
int
auth_rsa_challenge_dialog(RSA *pk)
{
@@ -122,11 +124,33 @@
* 0 if the client could not be authenticated, and 1 if authentication was
* successful. This may exit if there is a serious protocol violation.
*/
+int
+auth_rsa(struct passwd *pw, BIGNUM *client_n) {
+ char *...
2002 Jan 29
2
Key fingerprint logging
...on Aug 6 23:01:49 2001
+++ openssh-3.0.2p1/auth-rsa.c Tue Jan 29 14:26:34 2002
@@ -118,11 +118,11 @@
* 0 if the client could not be authenticated, and 1 if authentication was
* successful. This may exit if there is a serious protocol violation.
*/
int
-auth_rsa(struct passwd *pw, BIGNUM *client_n)
+auth_rsa(struct passwd *pw, BIGNUM *client_n, char *info, int info_size)
{
char line[8192], *file;
int authenticated;
u_int bits;
FILE *f;
@@ -179,11 +179,11 @@
* found, perform a challenge-response dialog to verify that the
* user really has the corresponding private key.
*/...
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...c openssh-3.1p1-mods/auth-rsa.c
- --- openssh-3.1p1/auth-rsa.c Thu May 9 12:18:25 2002
+++ openssh-3.1p1-mods/auth-rsa.c Thu May 9 12:19:54 2002
@@ -123,8 +123,11 @@
* successful. This may exit if there is a serious protocol
violation.
*/
int
- -auth_rsa(struct passwd *pw, BIGNUM *client_n)
+auth_rsa(struct passwd *pw, BIGNUM *client_n, char *realname, int
realnamesize)
{
char line[8192], *file;
int authenticated;
@@ -134,6 +137,8 @@
struct stat st;
Key *key;
char *fp;
+ char *comment;
+ int commentlen;...
2006 Feb 12
1
sshd double-logging
..." ssh2" : "");
}
debug3("%s: key %p is %s",
@@ -1374,6 +1381,7 @@ mm_answer_rsa_keyallowed(int sock, Buffe
debug3("%s entering", __func__);
+ auth_method = "rsa";
if (options.rsa_authentication && authctxt->valid) {
if ((client_n = BN_new()) == NULL)
fatal("%s: BN_new", __func__);
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.