version 1.59.4.1, 2005/09/04 18:39:56 |
version 1.60, 2005/05/20 12:57:01 |
|
|
static int |
static int |
auth1_process_rhosts_rsa(Authctxt *authctxt, char *info, size_t infolen) |
auth1_process_rhosts_rsa(Authctxt *authctxt, char *info, size_t infolen) |
{ |
{ |
int keybits, authenticated = 0; |
int authenticated = 0; |
u_int bits; |
u_int bits; |
char *client_user; |
char *client_user; |
Key *client_host_key; |
Key *client_host_key; |
|
|
packet_get_bignum(client_host_key->rsa->e); |
packet_get_bignum(client_host_key->rsa->e); |
packet_get_bignum(client_host_key->rsa->n); |
packet_get_bignum(client_host_key->rsa->n); |
|
|
keybits = BN_num_bits(client_host_key->rsa->n); |
if (bits != BN_num_bits(client_host_key->rsa->n)) { |
if (keybits < 0 || bits != (u_int)keybits) { |
|
verbose("Warning: keysize mismatch for client_host_key: " |
verbose("Warning: keysize mismatch for client_host_key: " |
"actual %d, announced %d", |
"actual %d, announced %d", |
BN_num_bits(client_host_key->rsa->n), bits); |
BN_num_bits(client_host_key->rsa->n), bits); |
|
|
|
|
snprintf(info, infolen, " ruser %.100s", client_user); |
snprintf(info, infolen, " ruser %.100s", client_user); |
xfree(client_user); |
xfree(client_user); |
|
|
return (authenticated); |
return (authenticated); |
} |
} |
|
|
|
|
auth1_process_tis_challenge(Authctxt *authctxt, char *info, size_t infolen) |
auth1_process_tis_challenge(Authctxt *authctxt, char *info, size_t infolen) |
{ |
{ |
char *challenge; |
char *challenge; |
|
|
if ((challenge = get_challenge(authctxt)) == NULL) |
if ((challenge = get_challenge(authctxt)) == NULL) |
return (0); |
return (0); |
|
|