summaryrefslogtreecommitdiff
path: root/sshconnect1.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-03-09 00:12:22 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-03-09 00:12:22 +0000
commit266dfdfd62d169c62618d73cd72df0391c072be1 (patch)
tree3a51150147ab8fbc365f4d285b3046202bb1a2fc /sshconnect1.c
parent283cb821cda4e05b33a1e87854db276757e9fdf8 (diff)
- markus@cvs.openbsd.org 2001/03/08 21:42:33
[compat.c compat.h readconf.h ssh.c sshconnect1.c sshconnect2.c] implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key -> no need to do enter passphrase or do expensive sign operations if the server does not accept key).
Diffstat (limited to 'sshconnect1.c')
-rw-r--r--sshconnect1.c5
1 files changed, 3 insertions, 2 deletions
diff --git a/sshconnect1.c b/sshconnect1.c
index c5ff7213..3d45ac5a 100644
--- a/sshconnect1.c
+++ b/sshconnect1.c
@@ -13,7 +13,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: sshconnect1.c,v 1.27 2001/02/15 23:19:59 markus Exp $");
+RCSID("$OpenBSD: sshconnect1.c,v 1.28 2001/03/08 21:42:33 markus Exp $");
#include <openssl/bn.h>
#include <openssl/evp.h>
@@ -1017,7 +1017,8 @@ ssh_userauth(
/* Try RSA authentication for each identity. */
for (i = 0; i < options.num_identity_files; i++)
- if (options.identity_files_type[i] == KEY_RSA1 &&
+ if (options.identity_keys[i] != NULL &&
+ options.identity_keys[i]->type == KEY_RSA1 &&
try_rsa_authentication(options.identity_files[i]))
return;
}