summaryrefslogtreecommitdiff
path: root/sshd.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>1999-11-12 15:19:27 +1100
committerDamien Miller <djm@mindrot.org>1999-11-12 15:19:27 +1100
commit6d7b2cd1a32efa2a40c97361065d357a2e60b716 (patch)
tree9c34abc2723760ce00b6f3867d7e0cfbd6a7424e /sshd.c
parentb5f8927a7e3f25cef4c66603a780176e1b9f6082 (diff)
- Merged yet more changes from OpenBSD CVS
- [auth-rh-rsa.c auth-rhosts.c auth-rsa.c channels.c clientloop.c] [ssh.c ssh.h sshconnect.c sshd.c] make all access to options via 'extern Options options' and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary - [mpaux.c] clear temp buffer - [servconf.c] print _all_ bad options found in configfile
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c7
1 files changed, 3 insertions, 4 deletions
diff --git a/sshd.c b/sshd.c
index 7cc24cd1a..b975c8dcc 100644
--- a/sshd.c
+++ b/sshd.c
@@ -18,7 +18,7 @@ agent connections.
18*/ 18*/
19 19
20#include "includes.h" 20#include "includes.h"
21RCSID("$Id: sshd.c,v 1.16 1999/11/12 00:33:04 damien Exp $"); 21RCSID("$Id: sshd.c,v 1.17 1999/11/12 04:19:27 damien Exp $");
22 22
23#include "xmalloc.h" 23#include "xmalloc.h"
24#include "rsa.h" 24#include "rsa.h"
@@ -1343,8 +1343,7 @@ do_authentication(char *user, int privileged_port)
1343 } 1343 }
1344 1344
1345 /* Try to authenticate using /etc/hosts.equiv and .rhosts. */ 1345 /* Try to authenticate using /etc/hosts.equiv and .rhosts. */
1346 if (auth_rhosts(pw, client_user, options.ignore_rhosts, 1346 if (auth_rhosts(pw, client_user))
1347 options.strict_modes))
1348 { 1347 {
1349 /* Authentication accepted. */ 1348 /* Authentication accepted. */
1350 log("Rhosts authentication accepted for %.100s, remote %.100s on %.700s.", 1349 log("Rhosts authentication accepted for %.100s, remote %.100s on %.700s.",
@@ -1431,7 +1430,7 @@ do_authentication(char *user, int privileged_port)
1431 1430
1432 packet_integrity_check(plen, nlen, type); 1431 packet_integrity_check(plen, nlen, type);
1433 1432
1434 if (auth_rsa(pw, n, options.strict_modes)) 1433 if (auth_rsa(pw, n))
1435 { 1434 {
1436 /* Successful authentication. */ 1435 /* Successful authentication. */
1437 BN_clear_free(n); 1436 BN_clear_free(n);