version 1.44, 2002/09/26 11:38:43 |
version 1.44.2.1, 2003/04/01 00:12:13 |
|
|
snprintf(info, sizeof(info), |
snprintf(info, sizeof(info), |
" tktuser %.100s", |
" tktuser %.100s", |
client_user); |
client_user); |
|
|
/* Send response to client */ |
/* Send response to client */ |
packet_start( |
packet_start( |
SSH_SMSG_AUTH_KERBEROS_RESPONSE); |
SSH_SMSG_AUTH_KERBEROS_RESPONSE); |
|
|
debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE"); |
debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE"); |
if (options.challenge_response_authentication == 1) { |
if (options.challenge_response_authentication == 1) { |
char *response = packet_get_string(&dlen); |
char *response = packet_get_string(&dlen); |
debug("got response '%s'", response); |
|
packet_check_eom(); |
packet_check_eom(); |
authenticated = verify_response(authctxt, response); |
authenticated = verify_response(authctxt, response); |
memset(response, 'r', dlen); |
memset(response, 'r', dlen); |
|
|
authctxt->user); |
authctxt->user); |
|
|
/* Special handling for root */ |
/* Special handling for root */ |
if (!use_privsep && |
if (authenticated && authctxt->pw->pw_uid == 0 && |
authenticated && authctxt->pw->pw_uid == 0 && |
|
!auth_root_allowed(get_authname(type))) |
!auth_root_allowed(get_authname(type))) |
authenticated = 0; |
authenticated = 0; |
|
|