version 1.7, 2000/11/10 01:04:40 |
version 1.8, 2000/12/19 23:17:55 |
|
|
{ |
{ |
int authenticated = 0; |
int authenticated = 0; |
int attempt = 0; |
int attempt = 0; |
unsigned int bits; |
u_int bits; |
RSA *client_host_key; |
RSA *client_host_key; |
BIGNUM *n; |
BIGNUM *n; |
char *client_user, *password; |
char *client_user, *password; |
char user[1024]; |
char user[1024]; |
unsigned int dlen; |
u_int dlen; |
int plen, nlen, elen; |
int plen, nlen, elen; |
unsigned int ulen; |
u_int ulen; |
int type = 0; |
int type = 0; |
void (*authlog) (const char *fmt,...) = verbose; |
void (*authlog) (const char *fmt,...) = verbose; |
|
|
|
|
/* Try Kerberos v4 authentication. */ |
/* Try Kerberos v4 authentication. */ |
KTEXT_ST auth; |
KTEXT_ST auth; |
char *tkt_user = NULL; |
char *tkt_user = NULL; |
char *kdata = packet_get_string((unsigned int *) &auth.length); |
char *kdata = packet_get_string((u_int *) &auth.length); |
packet_integrity_check(plen, 4 + auth.length, type); |
packet_integrity_check(plen, 4 + auth.length, type); |
|
|
if (auth.length < MAX_KTXT_LEN) |
if (auth.length < MAX_KTXT_LEN) |
|
|
{ |
{ |
struct passwd *pw, pwcopy; |
struct passwd *pw, pwcopy; |
int plen; |
int plen; |
unsigned int ulen; |
u_int ulen; |
char *user; |
char *user; |
|
|
/* Get the name of the user that we wish to log in as. */ |
/* Get the name of the user that we wish to log in as. */ |