Displaying 6 results from an estimated 6 matches for "ssh_close_authentication_connect".
2001 Jul 29
1
add version 2 identities by default, too
...ITY);
+ snprintf(rsa_name, sizeof rsa_name, "%s/%s", pw->pw_dir, _PATH_SSH_CLIENT_ID_RSA);
+ snprintf(dsa_name, sizeof dsa_name, "%s/%s", pw->pw_dir, _PATH_SSH_CLIENT_ID_DSA);
+ if (!pw) {
+ fprintf(stderr, "No user found with uid %u\n",
+ (u_int)getuid());
+ ssh_close_authentication_connection(ac);
+ exit(1);
+ } else {
+ int identity_found = !access(identity_name, R_OK);
+ int rsa_found = !access(rsa_name, R_OK);
+ int dsa_found = !access(dsa_name, R_OK);
+
+ if (!(identity_found || rsa_found || dsa_found)) {
+ fprintf(stderr,
+ "No files specified, and unable to find...
2010 Jan 12
2
[patch] Automatically add keys to agent
...= BN_new()) == NULL)
fatal("try_agent_authentication: BN_new failed");
/* Loop through identities served by the agent. */
@@ -134,7 +128,6 @@ try_agent_authentication(void)
/* The server returns success if it accepted the authentication. */
if (type == SSH_SMSG_SUCCESS) {
- ssh_close_authentication_connection(auth);
BN_clear_free(challenge);
debug("RSA authentication accepted by server.");
return 1;
@@ -144,7 +137,6 @@ try_agent_authentication(void)
packet_disconnect("Protocol error waiting RSA auth response: %d",
type);
}
- ssh_close_authentication_conne...
2001 Jan 07
1
[PATCH] Caching passphrase in ssh-add.
...add_file(ac, buf);
+
+ snprintf(buf, sizeof buf, "%s/%s", pw->pw_dir, SSH_CLIENT_ID_DSA);
+ if (deleting)
+ delete_file(ac, buf);
+ else
+ add_file(ac, buf);
+ }
+ if (last_passphrase) {
+ memset(last_passphrase, 0, strlen(last_passphrase));
+ xfree(last_passphrase);
}
ssh_close_authentication_connection(ac);
exit(0);
--
dwmw2
2013 Jun 25
1
RFC: encrypted hostkeys patch
...e if (pid != 0) {
debug2("Network child is on pid %ld", (long)pid);
+ auth_conn = ssh_get_authentication_connection();
+
pmonitor->m_pid = pid;
if (box != NULL)
ssh_sandbox_parent_preauth(box, pid);
monitor_child_preauth(authctxt, pmonitor);
+ if (auth_conn) {
+ ssh_close_authentication_connection(auth_conn);
+ auth_conn = NULL;
+ }
+
/* Sync memory */
monitor_sync(pmonitor);
@@ -704,10 +716,11 @@ privsep_postauth(Authctxt *authctxt)
u_int32_t rnd[256];
#ifdef DISABLE_FD_PASSING
- if (1) {
+ if (1)
#else
- if (authctxt->pw->pw_uid == 0 || options.use_login) {
+ if (...
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
...);
packet_check_eom();
+
debug("Received RSA challenge from server.");
/* Ask the agent to decrypt the challenge. */
@@ -136,12 +145,16 @@
type = packet_read();
/* The server returns success if it accepted the authentication. */
+
if (type == SSH_SMSG_SUCCESS) {
ssh_close_authentication_connection(auth);
BN_clear_free(challenge);
debug("RSA authentication accepted by server.");
return 1;
}
+
+
+
/* Otherwise it should return failure. */
if (type != SSH_SMSG_FAILURE)
packet_disconnect("Protocol error waiting RSA auth response: %d",
@@ -234,7 +24...
2005 Jul 26
1
Linux in-kernel keys support
...goto done;
+ } else if (inkernel && confirm) {
+ fprintf(stderr, "Cannot use confirmation with in-kernel keys\n");
+ ret = 1;
+ goto done;
+ }
+
argc -= optind;
argv += optind;
if (sc_reader_id != NULL) {
@@ -410,6 +640,7 @@
clear_pass();
done:
+ if (ac != NULL)
ssh_close_authentication_connection(ac);
return ret;
}
diff -ubr -x configure openssh-4.1p1/ssh.c openssh-4.1p1-hacked/ssh.c
--- openssh-4.1p1/ssh.c 2005-05-04 07:33:09.000000000 +0200
+++ openssh-4.1p1-hacked/ssh.c 2005-07-25 23:29:10.000000000 +0200
@@ -73,6 +73,10 @@
#include "monitor_fdpass.h"
#include "uid...