summaryrefslogtreecommitdiff
path: root/monitor.c
diff options
context:
space:
mode:
authordjm <djm>2003-05-14 03:47:37 +0000
committerdjm <djm>2003-05-14 03:47:37 +0000
commit7af7992aa2bcf3a1e015baa4e37b6a6b955aaa93 (patch)
treeb479cf0fd0e8d93ca4ac0271a9aaf31108b43f34 /monitor.c
parentf83a06e3f20de4d5ba63530f643e7f15f8122eda (diff)
downloadopenssh-7af7992aa2bcf3a1e015baa4e37b6a6b955aaa93.tar.gz
- markus@cvs.openbsd.org 2003/05/14 02:15:47
[auth2.c monitor.c sshconnect2.c auth2-krb5.c] implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@ server interops with commercial client; ok jakob@ djm@
Diffstat (limited to 'monitor.c')
-rw-r--r--monitor.c7
1 files changed, 6 insertions, 1 deletions
diff --git a/monitor.c b/monitor.c
index 1f667758..78d1e2e0 100644
--- a/monitor.c
+++ b/monitor.c
@@ -25,7 +25,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: monitor.c,v 1.38 2003/04/08 20:21:28 itojun Exp $");
+RCSID("$OpenBSD: monitor.c,v 1.39 2003/05/14 02:15:47 markus Exp $");
#include <openssl/dh.h>
@@ -182,6 +182,9 @@ struct mon_table mon_dispatch_proto20[] = {
#endif
{MONITOR_REQ_KEYALLOWED, MON_ISAUTH, mm_answer_keyallowed},
{MONITOR_REQ_KEYVERIFY, MON_AUTH, mm_answer_keyverify},
+#ifdef KRB5
+ {MONITOR_REQ_KRB5, MON_ONCE|MON_AUTH, mm_answer_krb5},
+#endif
{0, 0, NULL}
};
@@ -1483,6 +1486,8 @@ mm_answer_krb5(int socket, Buffer *m)
}
mm_request_send(socket, MONITOR_ANS_KRB5, m);
+ auth_method = "kerberos";
+
return success;
}
#endif