diff options
Diffstat (limited to 'monitor.c')
-rw-r--r-- | monitor.c | 20 |
1 files changed, 3 insertions, 17 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: monitor.c,v 1.104 2009/06/12 20:43:22 andreas Exp $ */ | 1 | /* $OpenBSD: monitor.c,v 1.106 2010/03/07 11:57:13 dtucker Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> | 3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> |
4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> | 4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> |
@@ -1014,17 +1014,6 @@ mm_answer_pam_free_ctx(int sock, Buffer *m) | |||
1014 | } | 1014 | } |
1015 | #endif | 1015 | #endif |
1016 | 1016 | ||
1017 | static void | ||
1018 | mm_append_debug(Buffer *m) | ||
1019 | { | ||
1020 | if (auth_debug_init && buffer_len(&auth_debug)) { | ||
1021 | debug3("%s: Appending debug messages for child", __func__); | ||
1022 | buffer_append(m, buffer_ptr(&auth_debug), | ||
1023 | buffer_len(&auth_debug)); | ||
1024 | buffer_clear(&auth_debug); | ||
1025 | } | ||
1026 | } | ||
1027 | |||
1028 | int | 1017 | int |
1029 | mm_answer_keyallowed(int sock, Buffer *m) | 1018 | mm_answer_keyallowed(int sock, Buffer *m) |
1030 | { | 1019 | { |
@@ -1107,8 +1096,6 @@ mm_answer_keyallowed(int sock, Buffer *m) | |||
1107 | buffer_put_int(m, allowed); | 1096 | buffer_put_int(m, allowed); |
1108 | buffer_put_int(m, forced_command != NULL); | 1097 | buffer_put_int(m, forced_command != NULL); |
1109 | 1098 | ||
1110 | mm_append_debug(m); | ||
1111 | |||
1112 | mm_request_send(sock, MONITOR_ANS_KEYALLOWED, m); | 1099 | mm_request_send(sock, MONITOR_ANS_KEYALLOWED, m); |
1113 | 1100 | ||
1114 | if (type == MM_RSAHOSTKEY) | 1101 | if (type == MM_RSAHOSTKEY) |
@@ -1492,8 +1479,6 @@ mm_answer_rsa_keyallowed(int sock, Buffer *m) | |||
1492 | if (key != NULL) | 1479 | if (key != NULL) |
1493 | key_free(key); | 1480 | key_free(key); |
1494 | 1481 | ||
1495 | mm_append_debug(m); | ||
1496 | |||
1497 | mm_request_send(sock, MONITOR_ANS_RSAKEYALLOWED, m); | 1482 | mm_request_send(sock, MONITOR_ANS_RSAKEYALLOWED, m); |
1498 | 1483 | ||
1499 | monitor_permit(mon_dispatch, MONITOR_REQ_RSACHALLENGE, allowed); | 1484 | monitor_permit(mon_dispatch, MONITOR_REQ_RSACHALLENGE, allowed); |
@@ -1745,7 +1730,8 @@ mm_get_kex(Buffer *m) | |||
1745 | kex->flags = buffer_get_int(m); | 1730 | kex->flags = buffer_get_int(m); |
1746 | kex->client_version_string = buffer_get_string(m, NULL); | 1731 | kex->client_version_string = buffer_get_string(m, NULL); |
1747 | kex->server_version_string = buffer_get_string(m, NULL); | 1732 | kex->server_version_string = buffer_get_string(m, NULL); |
1748 | kex->load_host_key=&get_hostkey_by_type; | 1733 | kex->load_host_public_key=&get_hostkey_public_by_type; |
1734 | kex->load_host_private_key=&get_hostkey_private_by_type; | ||
1749 | kex->host_key_index=&get_hostkey_index; | 1735 | kex->host_key_index=&get_hostkey_index; |
1750 | 1736 | ||
1751 | return (kex); | 1737 | return (kex); |