diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-12-06 17:41:25 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-12-06 17:41:25 +0000 |
commit | 57fe5b592c5ab759af803737b8f9f50061924cb9 (patch) | |
tree | 2356467c5e4b75617adc30a48a23ebb72bc436a3 /auth-rsa.c | |
parent | 623e4a0b1ab149253d084267431daa022e61e14a (diff) | |
download | openssh-git-57fe5b592c5ab759af803737b8f9f50061924cb9.tar.gz |
- markus@cvs.openbsd.org 2001/11/29 22:08:48
[auth-rsa.c]
fix protocol error: send 'failed' message instead of a 2nd challenge
(happens if the same key is in authorized_keys twice).
reported Ralf_Meister@genua.de; ok djm@
Diffstat (limited to 'auth-rsa.c')
-rw-r--r-- | auth-rsa.c | 8 |
1 files changed, 6 insertions, 2 deletions
@@ -14,7 +14,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-rsa.c,v 1.44 2001/07/23 18:14:58 stevesk Exp $"); +RCSID("$OpenBSD: auth-rsa.c,v 1.45 2001/11/29 22:08:48 markus Exp $"); #include <openssl/rsa.h> #include <openssl/md5.h> @@ -240,7 +240,11 @@ auth_rsa(struct passwd *pw, BIGNUM *client_n) /* Wrong response. */ verbose("Wrong response to RSA authentication challenge."); packet_send_debug("Wrong response to RSA authentication challenge."); - continue; + /* + * Break out of the loop. Otherwise we might send + * another challenge and break the protocol. + */ + break; } /* * Correct response. The client has been successfully |