search for: ssh_close_authentication_connect

Displaying 6 results from an estimated 6 matches for "ssh_close_authentication_connect".

2001 Jul 29
1
add version 2 identities by default, too
...ITY); + snprintf(rsa_name, sizeof rsa_name, "%s/%s", pw->pw_dir, _PATH_SSH_CLIENT_ID_RSA); + snprintf(dsa_name, sizeof dsa_name, "%s/%s", pw->pw_dir, _PATH_SSH_CLIENT_ID_DSA); + if (!pw) { + fprintf(stderr, "No user found with uid %u\n", + (u_int)getuid()); + ssh_close_authentication_connection(ac); + exit(1); + } else { + int identity_found = !access(identity_name, R_OK); + int rsa_found = !access(rsa_name, R_OK); + int dsa_found = !access(dsa_name, R_OK); + + if (!(identity_found || rsa_found || dsa_found)) { + fprintf(stderr, + "No files specified, and unable to find...
2010 Jan 12
2
[patch] Automatically add keys to agent
...= BN_new()) == NULL) fatal("try_agent_authentication: BN_new failed"); /* Loop through identities served by the agent. */ @@ -134,7 +128,6 @@ try_agent_authentication(void) /* The server returns success if it accepted the authentication. */ if (type == SSH_SMSG_SUCCESS) { - ssh_close_authentication_connection(auth); BN_clear_free(challenge); debug("RSA authentication accepted by server."); return 1; @@ -144,7 +137,6 @@ try_agent_authentication(void) packet_disconnect("Protocol error waiting RSA auth response: %d", type); } - ssh_close_authentication_conne...
2001 Jan 07
1
[PATCH] Caching passphrase in ssh-add.
...add_file(ac, buf); + + snprintf(buf, sizeof buf, "%s/%s", pw->pw_dir, SSH_CLIENT_ID_DSA); + if (deleting) + delete_file(ac, buf); + else + add_file(ac, buf); + } + if (last_passphrase) { + memset(last_passphrase, 0, strlen(last_passphrase)); + xfree(last_passphrase); } ssh_close_authentication_connection(ac); exit(0); -- dwmw2
2013 Jun 25
1
RFC: encrypted hostkeys patch
...e if (pid != 0) { debug2("Network child is on pid %ld", (long)pid); + auth_conn = ssh_get_authentication_connection(); + pmonitor->m_pid = pid; if (box != NULL) ssh_sandbox_parent_preauth(box, pid); monitor_child_preauth(authctxt, pmonitor); + if (auth_conn) { + ssh_close_authentication_connection(auth_conn); + auth_conn = NULL; + } + /* Sync memory */ monitor_sync(pmonitor); @@ -704,10 +716,11 @@ privsep_postauth(Authctxt *authctxt) u_int32_t rnd[256]; #ifdef DISABLE_FD_PASSING - if (1) { + if (1) #else - if (authctxt->pw->pw_uid == 0 || options.use_login) { + if (...
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
...); packet_check_eom(); + debug("Received RSA challenge from server."); /* Ask the agent to decrypt the challenge. */ @@ -136,12 +145,16 @@ type = packet_read(); /* The server returns success if it accepted the authentication. */ + if (type == SSH_SMSG_SUCCESS) { ssh_close_authentication_connection(auth); BN_clear_free(challenge); debug("RSA authentication accepted by server."); return 1; } + + + /* Otherwise it should return failure. */ if (type != SSH_SMSG_FAILURE) packet_disconnect("Protocol error waiting RSA auth response: %d", @@ -234,7 +24...
2005 Jul 26
1
Linux in-kernel keys support
...goto done; + } else if (inkernel && confirm) { + fprintf(stderr, "Cannot use confirmation with in-kernel keys\n"); + ret = 1; + goto done; + } + argc -= optind; argv += optind; if (sc_reader_id != NULL) { @@ -410,6 +640,7 @@ clear_pass(); done: + if (ac != NULL) ssh_close_authentication_connection(ac); return ret; } diff -ubr -x configure openssh-4.1p1/ssh.c openssh-4.1p1-hacked/ssh.c --- openssh-4.1p1/ssh.c 2005-05-04 07:33:09.000000000 +0200 +++ openssh-4.1p1-hacked/ssh.c 2005-07-25 23:29:10.000000000 +0200 @@ -73,6 +73,10 @@ #include "monitor_fdpass.h" #include "uid...