diff options
| author | Jon Simons <jon@jonsimons.org> | 2013-11-02 01:34:46 -0700 |
|---|---|---|
| committer | Andreas Schneider <asn@cryptomilk.org> | 2013-11-02 21:03:20 +0100 |
| commit | 401865d725a4103fd4a3b80fac65943e9e334fca (patch) | |
| tree | 9d67d8f730bde11e5cd6eae3bf0a58fc1c1cdcb8 /include | |
| parent | d312af1ed5cc2f2f3b42bd41ea3fee9db8e809f1 (diff) | |
server: fix pubkey reply for key probes
Per RFC 4252, it is required to send back only one of either
SSH_MSG_USERAUTH_PK_OK or SSH_MSG_USERAUTH_FAILURE for public
key probes.
Update the handling of 'auth_pubkey_function' to send back PK_OK
instead of SSH_MSG_USERAUTH_SUCCESS for the case that the state
of the message at hand is SSH_PUBLICKEY_STATE_NONE.
With this change, it is now possible to process an initial key probe
and then subsequent signature validation using the server callbacks.
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'include')
0 files changed, 0 insertions, 0 deletions
