/* $OpenBSD: auth2-gss.c,v 1.16 2007/10/29 00:52:45 dtucker Exp $ */
/*
- * Copyright (c) 2001-2003 Simon Wilkinson. All rights reserved.
+ * Copyright (c) 2001-2007 Simon Wilkinson. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
packet_check_eom();
if (authctxt->valid && authctxt->user && authctxt->user[0]) {
- return(PRIVSEP(ssh_gssapi_userok(authctxt->user)));
+ return(PRIVSEP(ssh_gssapi_userok(authctxt->user, authctxt->pw)));
}
return 0;
}
!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gss_kex_context,
&gssbuf2, &mic)))) {
if (authctxt->valid && authctxt->user && authctxt->user[0]) {
- authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
+ authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user,
+ authctxt->pw));
}
}
/* user should be set if valid but we double-check here */
if (authctxt->valid && authctxt->user && authctxt->user[0]) {
- authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
+ authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user,
+ authctxt->pw));
} else {
authenticated = 0;
}
if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic))))
if (authctxt->valid && authctxt->user && authctxt->user[0]) {
- authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
+ authenticated =
+ PRIVSEP(ssh_gssapi_userok(authctxt->user, authctxt->pw));
} else {
- authenticated = 0;
+ authenticated = 0;
}
else
logit("GSSAPI MIC check failed");