Displaying 6 results from an estimated 6 matches for "ssh_userauth1".
Did you mean:
ssh_userauth2
2006 May 15
2
[PATCH 10/12 bugfix: openssh-4.3p2: memory leak
...nssh-4.3p2/sshconnect.c openssh-4.3p2-kylie/sshconnect.c
--- openssh-4.3p2/sshconnect.c 2005-12-13 02:29:03.000000000 -0600
+++ openssh-4.3p2-kylie/sshconnect.c 2006-05-04 10:07:57.000000000 -0500
@@ -937,6 +937,7 @@ ssh_login(Sensitive *sensitive, const ch
} else {
ssh_kex(host, hostaddr);
ssh_userauth1(local_user, server_user, host, sensitive);
+ xfree(local_user);
}
}
2010 Jan 12
2
[patch] Automatically add keys to agent
...(auth, private, comment, 0, 0))
+ debug("Identity added: %s (%s)", authfile, comment);
+ else
+ verbose("Error while adding identity!");
+ }
+
/* Compute and send a response to the challenge. */
respond_to_rsa_challenge(challenge, private->rsa);
@@ -670,6 +675,7 @@ ssh_userauth1(const char *local_user, const char *serv
Sensitive *sensitive)
{
int i, type;
+ AuthenticationConnection *auth = NULL;
if (supported_authentications == 0)
fatal("ssh_userauth1: server supports no auth methods");
@@ -715,14 +721,15 @@ ssh_userauth1(const char *local_user, co...
2001 Oct 02
2
AFS and tokenforwarding
...en PSI Phone: ++41 56 310 3637
Fax: ++41 56 310 3649
-------------- next part --------------
--- openssh-2.9.9p2.orig/sshconnect1.c Sat Jul 14 04:17:00 2001
+++ openssh-2.9.9p2/sshconnect1.c Thu Sep 27 09:58:37 2001
@@ -1111,13 +1111,14 @@
ssh_userauth1(const char *local_user, const char *server_user, char *host,
Key **keys, int nkeys)
{
+
#ifdef KRB5
krb5_context context = NULL;
krb5_auth_context auth_context = NULL;
#endif
int i, type;
int payload_len;
-
+
if (supported_authentications == 0)
fatal("ssh_userauth1: serv...
2002 Oct 16
3
ssh-3.5p1 core dumps on Solaris 2.6
...symbols from /usr/lib/libmp.so.2...done.
Reading symbols from /software/@sys/usr/lib/libdb-4.0.so...done.
Reading symbols from /usr/platform/SUNW,Ultra-30/lib/libc_psr.so.1...done.
Reading symbols from /usr/lib/nss_files.so.1...done.
Reading symbols from /usr/lib/nss_dns.so.1...done.
#0 0x24210 in ssh_userauth1 (local_user=0xf7b30 "root", server_user=0xf79e0 "root",
host=0xfa790 "pf-i400", sensitive=0xf433c) at sshconnect1.c:1248
1248 if (options.identity_keys[i] != NULL &&
(gdb) where
#0 0x24210 in ssh_userauth1 (local_user=0xf7b30 &qu...
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...ication(int);
-int verify_host_key(char *, struct sockaddr *, Key *);
+int verify_host_key(char *, struct sockaddr *, Key *, const char *);
void ssh_kex(char *, struct sockaddr *);
-void ssh_kex2(char *, struct sockaddr *);
+void ssh_kex2(char *, struct sockaddr *, const char *);
void ssh_userauth1(const char *, const char *, char *, Sensitive *);
void ssh_userauth2(const char *, const char *, char *, Sensitive *);
--
Jan Andres <jandres at gmx.net>
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
...@ -48,7 +48,7 @@ void get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short,
char **, char **);
void ssh_kex(char *, struct sockaddr *);
-void ssh_kex2(char *, struct sockaddr *, u_short);
+void ssh_kex2(char *, struct sockaddr *, u_short, const char *, const char *);
void ssh_userauth1(const char *, const char *, char *, Sensitive *);
void ssh_userauth2(const char *, const char *, char *, Sensitive *);
diff --git a/sshconnect2.c b/sshconnect2.c
index cc527e1..8a9b6c0 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -78,8 +78,6 @@
#endif
/* import */
-extern char *client_ve...