summaryrefslogtreecommitdiff
path: root/authfd.h
diff options
context:
space:
mode:
authordtucker <dtucker>2009-10-06 21:47:02 +0000
committerdtucker <dtucker>2009-10-06 21:47:02 +0000
commit645a5abb6f7e3ec6dd428865397111b0261f2a70 (patch)
treea733e78219b6039c784ab9791407eca7048fcd22 /authfd.h
parent8addef34ea47d88677bc8dc817cc640ce0ad3dd0 (diff)
downloadopenssh-645a5abb6f7e3ec6dd428865397111b0261f2a70.tar.gz
- djm@cvs.openbsd.org 2009/08/27 17:44:52
[authfd.c ssh-add.c authfd.h] Do not fall back to adding keys without contraints (ssh-add -c / -t ...) when the agent refuses the constrained add request. This was a useful migration measure back in 2002 when constraints were new, but just adds risk now. bz #1612, report and patch from dkg AT fifthhorseman.net; ok markus@
Diffstat (limited to 'authfd.h')
-rw-r--r--authfd.h3
1 files changed, 1 insertions, 2 deletions
diff --git a/authfd.h b/authfd.h
index 3da25611..2582a27a 100644
--- a/authfd.h
+++ b/authfd.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: authfd.h,v 1.36 2006/08/03 03:34:41 deraadt Exp $ */
+/* $OpenBSD: authfd.h,v 1.37 2009/08/27 17:44:52 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -75,7 +75,6 @@ void ssh_close_authentication_connection(AuthenticationConnection *);
int ssh_get_num_identities(AuthenticationConnection *, int);
Key *ssh_get_first_identity(AuthenticationConnection *, char **, int);
Key *ssh_get_next_identity(AuthenticationConnection *, char **, int);
-int ssh_add_identity(AuthenticationConnection *, Key *, const char *);
int ssh_add_identity_constrained(AuthenticationConnection *, Key *,
const char *, u_int, u_int);
int ssh_remove_identity(AuthenticationConnection *, Key *);