summaryrefslogtreecommitdiff
path: root/monitor_wrap.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2003-08-02 22:24:49 +1000
committerDarren Tucker <dtucker@zip.com.au>2003-08-02 22:24:49 +1000
commit6aaa58c4709c43ffb9f3f2be299cd5c4044f24a3 (patch)
treeecaaf1b076e187ff9e338c844547dec1be09e006 /monitor_wrap.c
parent4c29dd9f4438d2ab6ac8d2df361fd48360b208ab (diff)
- (dtucker) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2003/07/22 13:35:22 [auth1.c auth.h auth-passwd.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h readconf.c readconf.h servconf.c servconf.h session.c ssh.1 ssh.c ssh_config.5 sshconnect1.c sshd.c sshd_config.5 ssh.h] remove (already disabled) KRB4/AFS support, re-enable -k in ssh(1); test+ok henning@ - (dtucker) [Makefile.in acconfig.h configure.ac] Remove KRB4/AFS support. - (dtucker) [auth-krb4.c radix.c radix.h] Remove KRB4/AFS specific files. I hope I got this right....
Diffstat (limited to 'monitor_wrap.c')
-rw-r--r--monitor_wrap.c38
1 files changed, 1 insertions, 37 deletions
diff --git a/monitor_wrap.c b/monitor_wrap.c
index 10a79c035..c7ba86ffc 100644
--- a/monitor_wrap.c
+++ b/monitor_wrap.c
@@ -25,7 +25,7 @@
25 */ 25 */
26 26
27#include "includes.h" 27#include "includes.h"
28RCSID("$OpenBSD: monitor_wrap.c,v 1.27 2003/06/28 16:23:06 deraadt Exp $"); 28RCSID("$OpenBSD: monitor_wrap.c,v 1.28 2003/07/22 13:35:22 markus Exp $");
29 29
30#include <openssl/bn.h> 30#include <openssl/bn.h>
31#include <openssl/dh.h> 31#include <openssl/dh.h>
@@ -1043,42 +1043,6 @@ mm_auth_rsa_verify_response(Key *key, BIGNUM *p, u_char response[16])
1043 return (success); 1043 return (success);
1044} 1044}
1045 1045
1046#ifdef KRB4
1047int
1048mm_auth_krb4(Authctxt *authctxt, void *_auth, char **client, void *_reply)
1049{
1050 KTEXT auth, reply;
1051 Buffer m;
1052 u_int rlen;
1053 int success = 0;
1054 char *p;
1055
1056 debug3("%s entering", __func__);
1057 auth = _auth;
1058 reply = _reply;
1059
1060 buffer_init(&m);
1061 buffer_put_string(&m, auth->dat, auth->length);
1062
1063 mm_request_send(pmonitor->m_recvfd, MONITOR_REQ_KRB4, &m);
1064 mm_request_receive_expect(pmonitor->m_recvfd, MONITOR_ANS_KRB4, &m);
1065
1066 success = buffer_get_int(&m);
1067 if (success) {
1068 *client = buffer_get_string(&m, NULL);
1069 p = buffer_get_string(&m, &rlen);
1070 if (rlen >= MAX_KTXT_LEN)
1071 fatal("%s: reply from monitor too large", __func__);
1072 reply->length = rlen;
1073 memcpy(reply->dat, p, rlen);
1074 memset(p, 0, rlen);
1075 xfree(p);
1076 }
1077 buffer_free(&m);
1078 return (success);
1079}
1080#endif
1081
1082#ifdef KRB5 1046#ifdef KRB5
1083int 1047int
1084mm_auth_krb5(void *ctx, void *argp, char **userp, void *resp) 1048mm_auth_krb5(void *ctx, void *argp, char **userp, void *resp)