From a04a10f8915401e0ac20dce0ade6c5b6e1bb13da Mon Sep 17 00:00:00 2001 From: Kris Kennaway Date: Mon, 15 May 2000 04:37:24 +0000 Subject: Initial import of OpenSSH v2.1. --- crypto/openssh/auth-rsa.c | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) (limited to 'crypto/openssh/auth-rsa.c') diff --git a/crypto/openssh/auth-rsa.c b/crypto/openssh/auth-rsa.c index 3d2e84f1c06a..78d28f0b8c87 100644 --- a/crypto/openssh/auth-rsa.c +++ b/crypto/openssh/auth-rsa.c @@ -1,22 +1,22 @@ /* - * + * * auth-rsa.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Mon Mar 27 01:46:52 1995 ylo - * + * * RSA-based authentication. This code determines whether to admit a login * based on RSA authentication. This file also contains functions to check * validity of the host key. - * + * */ #include "includes.h" -RCSID("$Id: auth-rsa.c,v 1.19 2000/03/23 22:15:33 markus Exp $"); +RCSID("$Id: auth-rsa.c,v 1.23 2000/04/29 18:11:51 markus Exp $"); #include "rsa.h" #include "packet.h" @@ -27,8 +27,8 @@ RCSID("$Id: auth-rsa.c,v 1.19 2000/03/23 22:15:33 markus Exp $"); #include "match.h" #include "servconf.h" -#include -#include +#include +#include /* Flags that may be set in authorized_keys options. */ extern int no_port_forwarding_flag; @@ -185,6 +185,7 @@ auth_rsa(struct passwd *pw, BIGNUM *client_n) } } if (fail) { + fclose(f); log(buf); packet_send_debug(buf); restore_uid(); @@ -238,7 +239,7 @@ auth_rsa(struct passwd *pw, BIGNUM *client_n) debug("%.100s, line %lu: bad key syntax", SSH_USER_PERMITTED_KEYS, linenum); packet_send_debug("%.100s, line %lu: bad key syntax", - SSH_USER_PERMITTED_KEYS, linenum); + SSH_USER_PERMITTED_KEYS, linenum); continue; } /* cp now points to the comment part. */ @@ -255,7 +256,6 @@ auth_rsa(struct passwd *pw, BIGNUM *client_n) /* We have found the desired key. */ - /* Perform the challenge-response dialog for this key. */ if (!auth_rsa_challenge_dialog(pk)) { /* Wrong response. */ -- cgit v1.2.3