summaryrefslogtreecommitdiff
path: root/auth-rsa.c
diff options
context:
space:
mode:
authordjm <djm>2003-11-17 10:13:40 +0000
committerdjm <djm>2003-11-17 10:13:40 +0000
commit44a0579b99ce30cbbbf394e96f8c4c633fe35107 (patch)
tree6ff90200f7492832cf3aebda70827727991feabb /auth-rsa.c
parentf008d3729b964c64c2468df4c677377b357623de (diff)
downloadopenssh-44a0579b99ce30cbbbf394e96f8c4c633fe35107.tar.gz
- djm@cvs.openbsd.org 2003/11/04 08:54:09
[auth1.c auth2.c auth2-pubkey.c auth.h auth-krb5.c auth-passwd.c] [auth-rhosts.c auth-rh-rsa.c auth-rsa.c monitor.c serverloop.c] [session.c] standardise arguments to auth methods - they should all take authctxt. check authctxt->valid rather then pw != NULL; ok markus@
Diffstat (limited to 'auth-rsa.c')
-rw-r--r--auth-rsa.c7
1 files changed, 4 insertions, 3 deletions
diff --git a/auth-rsa.c b/auth-rsa.c
index 5631d238..2f0746b3 100644
--- a/auth-rsa.c
+++ b/auth-rsa.c
@@ -14,7 +14,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: auth-rsa.c,v 1.57 2003/04/08 20:21:28 itojun Exp $");
+RCSID("$OpenBSD: auth-rsa.c,v 1.58 2003/11/04 08:54:09 djm Exp $");
#include <openssl/rsa.h>
#include <openssl/md5.h>
@@ -284,13 +284,14 @@ auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey)
* successful. This may exit if there is a serious protocol violation.
*/
int
-auth_rsa(struct passwd *pw, BIGNUM *client_n)
+auth_rsa(Authctxt *authctxt, BIGNUM *client_n)
{
Key *key;
char *fp;
+ struct passwd *pw = authctxt->pw;
/* no user given */
- if (pw == NULL)
+ if (!authctxt->valid)
return 0;
if (!PRIVSEP(auth_rsa_key_allowed(pw, client_n, &key))) {