diff options
author | Damien Miller <djm@mindrot.org> | 2003-11-17 21:13:40 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2003-11-17 21:13:40 +1100 |
commit | 3e3b5145e59c78cbde0f31f59a9267867b8eea2f (patch) | |
tree | 6725a1cc2cd54237952d89e4811e1cb82cc46a5d /auth-rsa.c | |
parent | 8f746ec9703a0072c7a07a25e4c059f7533bf94b (diff) |
- djm@cvs.openbsd.org 2003/11/04 08:54:09
[auth1.c auth2.c auth2-pubkey.c auth.h auth-krb5.c auth-passwd.c]
[auth-rhosts.c auth-rh-rsa.c auth-rsa.c monitor.c serverloop.c]
[session.c]
standardise arguments to auth methods - they should all take authctxt.
check authctxt->valid rather then pw != NULL; ok markus@
Diffstat (limited to 'auth-rsa.c')
-rw-r--r-- | auth-rsa.c | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/auth-rsa.c b/auth-rsa.c index 5631d238c..2f0746b30 100644 --- a/auth-rsa.c +++ b/auth-rsa.c | |||
@@ -14,7 +14,7 @@ | |||
14 | */ | 14 | */ |
15 | 15 | ||
16 | #include "includes.h" | 16 | #include "includes.h" |
17 | RCSID("$OpenBSD: auth-rsa.c,v 1.57 2003/04/08 20:21:28 itojun Exp $"); | 17 | RCSID("$OpenBSD: auth-rsa.c,v 1.58 2003/11/04 08:54:09 djm Exp $"); |
18 | 18 | ||
19 | #include <openssl/rsa.h> | 19 | #include <openssl/rsa.h> |
20 | #include <openssl/md5.h> | 20 | #include <openssl/md5.h> |
@@ -284,13 +284,14 @@ auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) | |||
284 | * successful. This may exit if there is a serious protocol violation. | 284 | * successful. This may exit if there is a serious protocol violation. |
285 | */ | 285 | */ |
286 | int | 286 | int |
287 | auth_rsa(struct passwd *pw, BIGNUM *client_n) | 287 | auth_rsa(Authctxt *authctxt, BIGNUM *client_n) |
288 | { | 288 | { |
289 | Key *key; | 289 | Key *key; |
290 | char *fp; | 290 | char *fp; |
291 | struct passwd *pw = authctxt->pw; | ||
291 | 292 | ||
292 | /* no user given */ | 293 | /* no user given */ |
293 | if (pw == NULL) | 294 | if (!authctxt->valid) |
294 | return 0; | 295 | return 0; |
295 | 296 | ||
296 | if (!PRIVSEP(auth_rsa_key_allowed(pw, client_n, &key))) { | 297 | if (!PRIVSEP(auth_rsa_key_allowed(pw, client_n, &key))) { |