summaryrefslogtreecommitdiff
path: root/sshconnect1.c
diff options
context:
space:
mode:
authormouring <mouring>2001-03-09 00:12:22 +0000
committermouring <mouring>2001-03-09 00:12:22 +0000
commiteb5d7353d6fa96a96cba2b9e57fa2398d3038b3d (patch)
tree0720f3ee72f8dcd63e1fa98339b713fb980c57d3 /sshconnect1.c
parent33a3925f92ad45c041fe467f5be35ae71c00c915 (diff)
downloadopenssh-eb5d7353d6fa96a96cba2b9e57fa2398d3038b3d.tar.gz
- markus@cvs.openbsd.org 2001/03/08 21:42:33
[compat.c compat.h readconf.h ssh.c sshconnect1.c sshconnect2.c] implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key -> no need to do enter passphrase or do expensive sign operations if the server does not accept key).
Diffstat (limited to 'sshconnect1.c')
-rw-r--r--sshconnect1.c5
1 files changed, 3 insertions, 2 deletions
diff --git a/sshconnect1.c b/sshconnect1.c
index c5ff7213..3d45ac5a 100644
--- a/sshconnect1.c
+++ b/sshconnect1.c
@@ -13,7 +13,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: sshconnect1.c,v 1.27 2001/02/15 23:19:59 markus Exp $");
+RCSID("$OpenBSD: sshconnect1.c,v 1.28 2001/03/08 21:42:33 markus Exp $");
#include <openssl/bn.h>
#include <openssl/evp.h>
@@ -1017,7 +1017,8 @@ ssh_userauth(
/* Try RSA authentication for each identity. */
for (i = 0; i < options.num_identity_files; i++)
- if (options.identity_files_type[i] == KEY_RSA1 &&
+ if (options.identity_keys[i] != NULL &&
+ options.identity_keys[i]->type == KEY_RSA1 &&
try_rsa_authentication(options.identity_files[i]))
return;
}