Displaying 10 results from an estimated 10 matches for "do_authenticated1".
Did you mean:
do_authenticated
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...(Session *, const char *, const char *realname);
+void do_login(Session *, const char *, const char *realname);
#ifdef LOGIN_NEEDS_UTMPX
static void do_pre_login(Session *s);
#endif
@@ -109,8 +109,8 @@
void do_motd(void);
int check_quietlogin(Session *, const char *);
- -static void do_authenticated1(Authctxt *);
- -static void do_authenticated2(Authctxt *);
+static void do_authenticated1(Authctxt *, const char *realname);
+static void do_authenticated2(Authctxt *, const char *realname);
static void session_close(Session *);
static int session_pty_req(Session *);
@@ -140,7 +140,7 @@
#endif...
2001 Nov 15
1
Solaris 2.6: acomp failed for session.c
...-- session.c Thu Nov 15 14:45:40 2001
***************
*** 132,137 ****
--- 132,140 ----
void do_child(Session *, const char *);
void do_motd(void);
int check_quietlogin(Session *, const char *);
+ #ifdef LOGIN_NEEDS_UTMPX
+ static void do_pre_login(Session *);
+ #endif
static void do_authenticated1(Authctxt *);
static void do_authenticated2(Authctxt *);
FWIW,
--
Rick Troxel rick at helix.nih.gov 301/435-2983
/////////////////////////////////////////////////////////////////
All effort and exertion put forth by man from the fullness of his
heart is worship, if it is prompted...
2001 Oct 23
1
Compilation error on Solaris Workshop 6 (+patch)
...Tue Oct 23 11:13:06 2001
+++ session.c-patched Tue Oct 23 11:19:54 2001
@@ -132,6 +132,9 @@
void do_child(Session *, const char *);
void do_motd(void);
int check_quietlogin(Session *, const char *);
+#ifdef LOGIN_NEEDS_UTMPX
+static void do_pre_login(Session *s);
+#endif
static void do_authenticated1(Authctxt *);
static void do_authenticated2(Authctxt *);
================================== %<
===================================================
WBR,
Alexander Ignatyev
AI-RIPE
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pk...
2001 Jun 05
1
OpenSSH tmp cleanup
Hi,
I noticed that Markus has fixed the temporary file cleanup problems in
OpenSSH cvs. What files need patching for this ? I only noticed
changes in: session.c, channels.h and channels.c.
-Jarno
--
Jarno Huuskonen <Jarno.Huuskonen at uku.fi>
2001 Jul 13
1
terminal hangs on solaris
...d064 select (efffd170, ef6266cc, 11e8d0, ef6266d0, 11e8d4, 11) + 280
00034560 wait_until_can_do_something (effff24c, effff248, effff244, 64, 4, 1)
+ 2b8
00034d74 server_loop (fb000, 0, 104000, fb000, 104000, effff240) + 20c
00036c7c do_exec_pty (10bbcc, 11, 36634, fb400, 8a, 0) + 260
00036704 do_authenticated1 (0, 36400, fac00, 106800, ef623700, 36014) + 60c
00036074 do_authenticated (110fa8, efffefbc, d0710, 400, efffefc8, 0) + 80
0002d720 do_authentication (effff418, 3, fac00, cfc00, fb000, 10e400) + 174
0002c17c main (1eb4, f, 1, fac00, 1eb4, 10c498) + 1418
0002a27c _start (0, 0, 0, 0, 0, 0)...
2003 May 06
1
logging command line execs
...#39;%.500s' on command line", s->pw->pw_name, command);
do_exec(s, command);
xfree(command);
} else {
--------------------------------------
But as you might recognize, this snipet is from the do_authenticated1()
function - which is obviously for ssh protocol 1.
I cannot find the ssh protocol 2 counterpart of this code. The
do_authenticated2() function simply calls server_loop2(), which does
some child care, and I've followed various functions that are called in
server_loop2(), and never do I fin...
2001 Apr 13
0
Fixed patch for Digital Unix SIA
...-- openssh_cvs/session.c Fri Apr 13 09:28:30 2001
+++ openssh/session.c Fri Apr 13 09:32:41 2001
@@ -128,9 +128,11 @@
void do_exec_no_pty(Session *s, const char *command);
void do_login(Session *s, const char *command);
void do_child(Session *s, const char *command);
+void do_motd(void);
void do_authenticated1(Authctxt *authctxt);
void do_authenticated2(Authctxt *authctxt);
+int check_quietlogin(Session *s, const char *command);
/* import */
extern ServerOptions options;
@@ -633,8 +635,10 @@
close(ttyfd);
/* record login, etc. similar to login(1) */
+#ifndef HAVE_OSF_SIA
if (!(options.use...
2002 Nov 01
3
[Bug 423] Workaround for pw change in privsep mode (3.5.p1)
http://bugzilla.mindrot.org/show_bug.cgi?id=423
------- Additional Comments From michael_steffens at hp.com 2002-11-02 02:40 -------
Created an attachment (id=162)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=162&action=view)
Patch: Workaround for pw change in privsep mode (3.5.p1)
------- You are receiving this mail because: -------
You are the assignee for the bug, or are
2001 Oct 24
2
disable features
...ssion.c 22 Oct 2001 18:37:43 -0000
@@ -148,18 +148,22 @@
}
#endif
#endif
+#ifdef WITH_TCPFWD
/* setup the channel layer */
if (!no_port_forwarding_flag && options.allow_tcp_forwarding)
channel_permit_all_opens();
+#endif
if (compat20)
do_authenticated2(authctxt);
else
do_authenticated1(authctxt);
+#ifdef WITH_AGENTFWD
/* remove agent socket */
if (auth_get_socket_name())
auth_sock_cleanup_proc(authctxt->pw);
+#endif
#ifdef KRB4
if (options.kerberos_ticket_cleanup)
krb4_cleanup_proc(authctxt);
@@ -181,9 +185,15 @@
{
Session *s;
char *command;
- int success,...
2001 Nov 20
3
problem with AFS token forwarding
...tokens it has. This has the advantage that the server can use
these tokens and can access files in the AFS home directory of the user on
the server.
In the latest OpenSSH releases the token is only forwarded AFTER a
successful user authentication. That means that the older servers are in
function do_authenticated1() when the message of type 65
(SSH_CMSG_HAVE_AFS_TOKEN) arrives. This message is no longer accepted at
this point. Therefore the error message
Unknown packet type received after authentication: 65
is to be found in the server logs.
It would be very helpful for us if the next OpenSSH release wo...