version 1.178, 2010/01/11 04:46:45 |
version 1.179, 2010/01/13 01:20:20 |
|
|
debug2("ssh_keysign called"); |
debug2("ssh_keysign called"); |
|
|
if (stat(_PATH_SSH_KEY_SIGN, &st) < 0) { |
if (stat(_PATH_SSH_KEY_SIGN, &st) < 0) { |
error("ssh_keysign: no installed: %s", strerror(errno)); |
error("ssh_keysign: not installed: %s", strerror(errno)); |
return -1; |
return -1; |
} |
} |
if (fflush(stdout) != 0) |
if (fflush(stdout) != 0) |
|
|
Sensitive *sensitive = authctxt->sensitive; |
Sensitive *sensitive = authctxt->sensitive; |
Buffer b; |
Buffer b; |
u_char *signature, *blob; |
u_char *signature, *blob; |
char *chost, *pkalg, *p, myname[NI_MAXHOST]; |
char *chost, *pkalg, *p; |
const char *service; |
const char *service; |
u_int blen, slen; |
u_int blen, slen; |
int ok, i, found = 0; |
int ok, i, found = 0; |
|
|
return 0; |
return 0; |
} |
} |
/* figure out a name for the client host */ |
/* figure out a name for the client host */ |
p = NULL; |
p = get_local_name(packet_get_connection_in()); |
if (packet_connection_is_on_socket()) |
|
p = get_local_name(packet_get_connection_in()); |
|
if (p == NULL) { |
|
if (gethostname(myname, sizeof(myname)) == -1) { |
|
verbose("userauth_hostbased: gethostname: %s", |
|
strerror(errno)); |
|
} else |
|
p = xstrdup(myname); |
|
} |
|
if (p == NULL) { |
if (p == NULL) { |
error("userauth_hostbased: cannot get local ipaddr/name"); |
error("userauth_hostbased: cannot get local ipaddr/name"); |
key_free(private); |
key_free(private); |