|
Lines 1488-1494
Link Here
|
| 1488 |
debug2("ssh_keysign called"); |
1488 |
debug2("ssh_keysign called"); |
| 1489 |
|
1489 |
|
| 1490 |
if (stat(_PATH_SSH_KEY_SIGN, &st) < 0) { |
1490 |
if (stat(_PATH_SSH_KEY_SIGN, &st) < 0) { |
| 1491 |
error("ssh_keysign: no installed: %s", strerror(errno)); |
1491 |
error("ssh_keysign: not installed: %s", strerror(errno)); |
| 1492 |
return -1; |
1492 |
return -1; |
| 1493 |
} |
1493 |
} |
| 1494 |
if (fflush(stdout) != 0) |
1494 |
if (fflush(stdout) != 0) |
|
Lines 1558-1564
Link Here
|
| 1558 |
Sensitive *sensitive = authctxt->sensitive; |
1558 |
Sensitive *sensitive = authctxt->sensitive; |
| 1559 |
Buffer b; |
1559 |
Buffer b; |
| 1560 |
u_char *signature, *blob; |
1560 |
u_char *signature, *blob; |
| 1561 |
char *chost, *pkalg, *p, myname[NI_MAXHOST]; |
1561 |
char *chost, *pkalg, *p; |
| 1562 |
const char *service; |
1562 |
const char *service; |
| 1563 |
u_int blen, slen; |
1563 |
u_int blen, slen; |
| 1564 |
int ok, i, len, found = 0; |
1564 |
int ok, i, len, found = 0; |
|
Lines 1582-1597
Link Here
|
| 1582 |
return 0; |
1582 |
return 0; |
| 1583 |
} |
1583 |
} |
| 1584 |
/* figure out a name for the client host */ |
1584 |
/* figure out a name for the client host */ |
| 1585 |
p = NULL; |
1585 |
p = get_local_name(packet_get_connection_in()); |
| 1586 |
if (packet_connection_is_on_socket()) |
|
|
| 1587 |
p = get_local_name(packet_get_connection_in()); |
| 1588 |
if (p == NULL) { |
| 1589 |
if (gethostname(myname, sizeof(myname)) == -1) { |
| 1590 |
verbose("userauth_hostbased: gethostname: %s", |
| 1591 |
strerror(errno)); |
| 1592 |
} else |
| 1593 |
p = xstrdup(myname); |
| 1594 |
} |
| 1595 |
if (p == NULL) { |
1586 |
if (p == NULL) { |
| 1596 |
error("userauth_hostbased: cannot get local ipaddr/name"); |
1587 |
error("userauth_hostbased: cannot get local ipaddr/name"); |
| 1597 |
key_free(private); |
1588 |
key_free(private); |