Mercurial > dropbear
diff auth.h @ 1739:13d834efc376 fuzz
merge from main
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Thu, 15 Oct 2020 19:55:15 +0800 |
parents | 8a485389330f |
children | bf1912d2d6e9 |
line wrap: on
line diff
--- a/auth.h Wed Feb 28 22:11:39 2018 +0800 +++ b/auth.h Thu Oct 15 19:55:15 2020 +0800 @@ -37,9 +37,9 @@ void send_msg_userauth_failure(int partial, int incrfail); void send_msg_userauth_success(void); void send_msg_userauth_banner(const buffer *msg); -void svr_auth_password(void); -void svr_auth_pubkey(void); -void svr_auth_pam(void); +void svr_auth_password(int valid_user); +void svr_auth_pubkey(int valid_user); +void svr_auth_pam(int valid_user); #if DROPBEAR_SVR_PUBKEY_OPTIONS_BUILT int svr_pubkey_allows_agentfwd(void); @@ -78,7 +78,7 @@ void cli_auth_pubkey_cleanup(void); -#define MAX_USERNAME_LEN 25 /* arbitrary for the moment */ +#define MAX_USERNAME_LEN 100 /* arbitrary for the moment */ #define AUTH_TYPE_NONE 1 #define AUTH_TYPE_PUBKEY (1 << 1) @@ -108,11 +108,14 @@ unsigned int authdone; /* 0 if we haven't authed, 1 if we have. Applies for client and server (though has differing meanings). */ + unsigned int perm_warn; /* Server only, set if bad permissions on ~/.ssh/authorized_keys have already been logged. */ unsigned int checkusername_failed; /* Server only, set if checkusername has already failed */ + struct timespec auth_starttime; /* Server only, time of receiving current + SSH_MSG_USERAUTH_REQUEST */ /* These are only used for the server */ uid_t pw_uid;