diff options
Diffstat (limited to 'monitor.c')
-rw-r--r-- | monitor.c | 20 |
1 files changed, 3 insertions, 17 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: monitor.c,v 1.104 2009/06/12 20:43:22 andreas Exp $ */ | 1 | /* $OpenBSD: monitor.c,v 1.106 2010/03/07 11:57:13 dtucker Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> | 3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> |
4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> | 4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> |
@@ -1040,17 +1040,6 @@ mm_answer_pam_free_ctx(int sock, Buffer *m) | |||
1040 | } | 1040 | } |
1041 | #endif | 1041 | #endif |
1042 | 1042 | ||
1043 | static void | ||
1044 | mm_append_debug(Buffer *m) | ||
1045 | { | ||
1046 | if (auth_debug_init && buffer_len(&auth_debug)) { | ||
1047 | debug3("%s: Appending debug messages for child", __func__); | ||
1048 | buffer_append(m, buffer_ptr(&auth_debug), | ||
1049 | buffer_len(&auth_debug)); | ||
1050 | buffer_clear(&auth_debug); | ||
1051 | } | ||
1052 | } | ||
1053 | |||
1054 | int | 1043 | int |
1055 | mm_answer_keyallowed(int sock, Buffer *m) | 1044 | mm_answer_keyallowed(int sock, Buffer *m) |
1056 | { | 1045 | { |
@@ -1133,8 +1122,6 @@ mm_answer_keyallowed(int sock, Buffer *m) | |||
1133 | buffer_put_int(m, allowed); | 1122 | buffer_put_int(m, allowed); |
1134 | buffer_put_int(m, forced_command != NULL); | 1123 | buffer_put_int(m, forced_command != NULL); |
1135 | 1124 | ||
1136 | mm_append_debug(m); | ||
1137 | |||
1138 | mm_request_send(sock, MONITOR_ANS_KEYALLOWED, m); | 1125 | mm_request_send(sock, MONITOR_ANS_KEYALLOWED, m); |
1139 | 1126 | ||
1140 | if (type == MM_RSAHOSTKEY) | 1127 | if (type == MM_RSAHOSTKEY) |
@@ -1518,8 +1505,6 @@ mm_answer_rsa_keyallowed(int sock, Buffer *m) | |||
1518 | if (key != NULL) | 1505 | if (key != NULL) |
1519 | key_free(key); | 1506 | key_free(key); |
1520 | 1507 | ||
1521 | mm_append_debug(m); | ||
1522 | |||
1523 | mm_request_send(sock, MONITOR_ANS_RSAKEYALLOWED, m); | 1508 | mm_request_send(sock, MONITOR_ANS_RSAKEYALLOWED, m); |
1524 | 1509 | ||
1525 | monitor_permit(mon_dispatch, MONITOR_REQ_RSACHALLENGE, allowed); | 1510 | monitor_permit(mon_dispatch, MONITOR_REQ_RSACHALLENGE, allowed); |
@@ -1771,7 +1756,8 @@ mm_get_kex(Buffer *m) | |||
1771 | kex->flags = buffer_get_int(m); | 1756 | kex->flags = buffer_get_int(m); |
1772 | kex->client_version_string = buffer_get_string(m, NULL); | 1757 | kex->client_version_string = buffer_get_string(m, NULL); |
1773 | kex->server_version_string = buffer_get_string(m, NULL); | 1758 | kex->server_version_string = buffer_get_string(m, NULL); |
1774 | kex->load_host_key=&get_hostkey_by_type; | 1759 | kex->load_host_public_key=&get_hostkey_public_by_type; |
1760 | kex->load_host_private_key=&get_hostkey_private_by_type; | ||
1775 | kex->host_key_index=&get_hostkey_index; | 1761 | kex->host_key_index=&get_hostkey_index; |
1776 | 1762 | ||
1777 | return (kex); | 1763 | return (kex); |