version 1.22, 2001/03/23 12:02:49 |
version 1.23, 2001/05/18 14:13:28 |
|
|
|
|
case SSH_CMSG_AUTH_TIS: |
case SSH_CMSG_AUTH_TIS: |
debug("rcvd SSH_CMSG_AUTH_TIS"); |
debug("rcvd SSH_CMSG_AUTH_TIS"); |
if (options.challenge_reponse_authentication == 1) { |
if (options.challenge_response_authentication == 1) { |
char *challenge = get_challenge(authctxt, authctxt->style); |
char *challenge = get_challenge(authctxt); |
if (challenge != NULL) { |
if (challenge != NULL) { |
debug("sending challenge '%s'", challenge); |
debug("sending challenge '%s'", challenge); |
packet_start(SSH_SMSG_AUTH_TIS_CHALLENGE); |
packet_start(SSH_SMSG_AUTH_TIS_CHALLENGE); |
packet_put_cstring(challenge); |
packet_put_cstring(challenge); |
|
xfree(challenge); |
packet_send(); |
packet_send(); |
packet_write_wait(); |
packet_write_wait(); |
continue; |
continue; |
|
|
break; |
break; |
case SSH_CMSG_AUTH_TIS_RESPONSE: |
case SSH_CMSG_AUTH_TIS_RESPONSE: |
debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE"); |
debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE"); |
if (options.challenge_reponse_authentication == 1) { |
if (options.challenge_response_authentication == 1) { |
char *response = packet_get_string(&dlen); |
char *response = packet_get_string(&dlen); |
debug("got response '%s'", response); |
debug("got response '%s'", response); |
packet_integrity_check(plen, 4 + dlen, type); |
packet_integrity_check(plen, 4 + dlen, type); |