diff options
author | Damien Miller <djm@mindrot.org> | 2014-05-15 14:24:09 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2014-05-15 14:24:09 +1000 |
commit | 1f0311c7c7d10c94ff7f823de9c5b2ed79368b14 (patch) | |
tree | ae708c2a25f84a04bcb04f2dbf3e8039e0f692bc /auth.c | |
parent | c5893785564498cea73cb60d2cf199490483e080 (diff) |
- markus@cvs.openbsd.org 2014/04/29 18:01:49
[auth.c authfd.c authfile.c bufaux.c cipher.c cipher.h hostfile.c]
[kex.c key.c mac.c monitor.c monitor_wrap.c myproposal.h packet.c]
[roaming_client.c ssh-agent.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c]
[ssh-pkcs11.h ssh.c sshconnect.c sshconnect2.c sshd.c]
make compiling against OpenSSL optional (make OPENSSL=no);
reduces algorithms to curve25519, aes-ctr, chacha, ed25519;
allows us to explore further options; with and ok djm
Diffstat (limited to 'auth.c')
-rw-r--r-- | auth.c | 6 |
1 files changed, 5 insertions, 1 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: auth.c,v 1.103 2013/05/19 02:42:42 djm Exp $ */ | 1 | /* $OpenBSD: auth.c,v 1.104 2014/04/29 18:01:49 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -659,6 +659,7 @@ getpwnamallow(const char *user) | |||
659 | int | 659 | int |
660 | auth_key_is_revoked(Key *key) | 660 | auth_key_is_revoked(Key *key) |
661 | { | 661 | { |
662 | #ifdef WITH_OPENSSL | ||
662 | char *key_fp; | 663 | char *key_fp; |
663 | 664 | ||
664 | if (options.revoked_keys_file == NULL) | 665 | if (options.revoked_keys_file == NULL) |
@@ -671,6 +672,7 @@ auth_key_is_revoked(Key *key) | |||
671 | default: | 672 | default: |
672 | goto revoked; | 673 | goto revoked; |
673 | } | 674 | } |
675 | #endif | ||
674 | debug3("%s: treating %s as a key list", __func__, | 676 | debug3("%s: treating %s as a key list", __func__, |
675 | options.revoked_keys_file); | 677 | options.revoked_keys_file); |
676 | switch (key_in_file(key, options.revoked_keys_file, 0)) { | 678 | switch (key_in_file(key, options.revoked_keys_file, 0)) { |
@@ -682,6 +684,7 @@ auth_key_is_revoked(Key *key) | |||
682 | error("Revoked keys file is unreadable: refusing public key " | 684 | error("Revoked keys file is unreadable: refusing public key " |
683 | "authentication"); | 685 | "authentication"); |
684 | return 1; | 686 | return 1; |
687 | #ifdef WITH_OPENSSL | ||
685 | case 1: | 688 | case 1: |
686 | revoked: | 689 | revoked: |
687 | /* Key revoked */ | 690 | /* Key revoked */ |
@@ -690,6 +693,7 @@ auth_key_is_revoked(Key *key) | |||
690 | "%s key %s ", key_type(key), key_fp); | 693 | "%s key %s ", key_type(key), key_fp); |
691 | free(key_fp); | 694 | free(key_fp); |
692 | return 1; | 695 | return 1; |
696 | #endif | ||
693 | } | 697 | } |
694 | fatal("key_in_file returned junk"); | 698 | fatal("key_in_file returned junk"); |
695 | } | 699 | } |