version 1.35, 2001/01/19 15:55:10 |
version 1.36, 2001/01/20 15:55:20 |
|
|
int |
int |
auth_rsa(struct passwd *pw, BIGNUM *client_n) |
auth_rsa(struct passwd *pw, BIGNUM *client_n) |
{ |
{ |
char line[8192], file[1024]; |
char line[8192], file[MAXPATHNAME]; |
int authenticated; |
int authenticated; |
u_int bits; |
u_int bits; |
FILE *f; |
FILE *f; |
|
|
/* Parse the key from the line. */ |
/* Parse the key from the line. */ |
if (!auth_rsa_read_key(&cp, &bits, pk->e, pk->n)) { |
if (!auth_rsa_read_key(&cp, &bits, pk->e, pk->n)) { |
debug("%.100s, line %lu: bad key syntax", |
debug("%.100s, line %lu: bad key syntax", |
_PATH_SSH_USER_PERMITTED_KEYS, linenum); |
file, linenum); |
packet_send_debug("%.100s, line %lu: bad key syntax", |
packet_send_debug("%.100s, line %lu: bad key syntax", |
_PATH_SSH_USER_PERMITTED_KEYS, linenum); |
file, linenum); |
continue; |
continue; |
} |
} |
/* cp now points to the comment part. */ |
/* cp now points to the comment part. */ |
|
|
* If our options do not allow this key to be used, |
* If our options do not allow this key to be used, |
* do not send challenge. |
* do not send challenge. |
*/ |
*/ |
if (!auth_parse_options(pw, options, linenum)) |
if (!auth_parse_options(pw, options, file, linenum)) |
continue; |
continue; |
|
|
/* Perform the challenge-response dialog for this key. */ |
/* Perform the challenge-response dialog for this key. */ |