diff options
author | mouring <mouring> | 2001-03-09 00:12:22 +0000 |
---|---|---|
committer | mouring <mouring> | 2001-03-09 00:12:22 +0000 |
commit | eb5d7353d6fa96a96cba2b9e57fa2398d3038b3d (patch) | |
tree | 0720f3ee72f8dcd63e1fa98339b713fb980c57d3 /readconf.h | |
parent | 33a3925f92ad45c041fe467f5be35ae71c00c915 (diff) | |
download | openssh-eb5d7353d6fa96a96cba2b9e57fa2398d3038b3d.tar.gz |
- markus@cvs.openbsd.org 2001/03/08 21:42:33
[compat.c compat.h readconf.h ssh.c sshconnect1.c sshconnect2.c]
implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key ->
no need to do enter passphrase or do expensive sign operations if the
server does not accept key).
Diffstat (limited to 'readconf.h')
-rw-r--r-- | readconf.h | 6 |
1 files changed, 4 insertions, 2 deletions
@@ -11,11 +11,13 @@ * called by a name other than "ssh" or "Secure Shell". */ -/* RCSID("$OpenBSD: readconf.h,v 1.26 2001/02/11 12:59:25 markus Exp $"); */ +/* RCSID("$OpenBSD: readconf.h,v 1.27 2001/03/08 21:42:32 markus Exp $"); */ #ifndef READCONF_H #define READCONF_H +#include "key.h" + /* Data structure for representing a forwarding request. */ typedef struct { @@ -83,7 +85,7 @@ typedef struct { int num_identity_files; /* Number of files for RSA/DSA identities. */ char *identity_files[SSH_MAX_IDENTITY_FILES]; - int identity_files_type[SSH_MAX_IDENTITY_FILES]; + Key *identity_keys[SSH_MAX_IDENTITY_FILES]; /* Local TCP/IP forward requests. */ int num_local_forwards; |