diff options
author | djm <djm> | 2003-11-17 10:13:40 +0000 |
---|---|---|
committer | djm <djm> | 2003-11-17 10:13:40 +0000 |
commit | 44a0579b99ce30cbbbf394e96f8c4c633fe35107 (patch) | |
tree | 6ff90200f7492832cf3aebda70827727991feabb /auth-rsa.c | |
parent | f008d3729b964c64c2468df4c677377b357623de (diff) | |
download | openssh-44a0579b99ce30cbbbf394e96f8c4c633fe35107.tar.gz |
- djm@cvs.openbsd.org 2003/11/04 08:54:09
[auth1.c auth2.c auth2-pubkey.c auth.h auth-krb5.c auth-passwd.c]
[auth-rhosts.c auth-rh-rsa.c auth-rsa.c monitor.c serverloop.c]
[session.c]
standardise arguments to auth methods - they should all take authctxt.
check authctxt->valid rather then pw != NULL; ok markus@
Diffstat (limited to 'auth-rsa.c')
-rw-r--r-- | auth-rsa.c | 7 |
1 files changed, 4 insertions, 3 deletions
@@ -14,7 +14,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-rsa.c,v 1.57 2003/04/08 20:21:28 itojun Exp $"); +RCSID("$OpenBSD: auth-rsa.c,v 1.58 2003/11/04 08:54:09 djm Exp $"); #include <openssl/rsa.h> #include <openssl/md5.h> @@ -284,13 +284,14 @@ auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) * successful. This may exit if there is a serious protocol violation. */ int -auth_rsa(struct passwd *pw, BIGNUM *client_n) +auth_rsa(Authctxt *authctxt, BIGNUM *client_n) { Key *key; char *fp; + struct passwd *pw = authctxt->pw; /* no user given */ - if (pw == NULL) + if (!authctxt->valid) return 0; if (!PRIVSEP(auth_rsa_key_allowed(pw, client_n, &key))) { |