version 1.13, 2000/12/19 23:17:58 |
version 1.14, 2001/01/08 21:55:41 |
|
|
return 0; |
return 0; |
|
|
challenge = BN_new(); |
challenge = BN_new(); |
key = key_new(KEY_RSA1); |
|
|
|
/* Loop through identities served by the agent. */ |
/* Loop through identities served by the agent. */ |
for (key = ssh_get_first_identity(auth, &comment, 1); |
for (key = ssh_get_first_identity(auth, &comment, 1); |
|
|
|
|
/* The server returns success if it accepted the authentication. */ |
/* The server returns success if it accepted the authentication. */ |
if (type == SSH_SMSG_SUCCESS) { |
if (type == SSH_SMSG_SUCCESS) { |
|
ssh_close_authentication_connection(auth); |
BN_clear_free(challenge); |
BN_clear_free(challenge); |
debug("RSA authentication accepted by server."); |
debug("RSA authentication accepted by server."); |
return 1; |
return 1; |
|
|
packet_disconnect("Protocol error waiting RSA auth response: %d", |
packet_disconnect("Protocol error waiting RSA auth response: %d", |
type); |
type); |
} |
} |
|
ssh_close_authentication_connection(auth); |
BN_clear_free(challenge); |
BN_clear_free(challenge); |
debug("RSA authentication using agent refused."); |
debug("RSA authentication using agent refused."); |
return 0; |
return 0; |
|
|
/* Expect the server to reject it... */ |
/* Expect the server to reject it... */ |
packet_read_expect(&plen, SSH_SMSG_FAILURE); |
packet_read_expect(&plen, SSH_SMSG_FAILURE); |
xfree(comment); |
xfree(comment); |
|
key_free(private); |
|
BN_clear_free(challenge); |
return 0; |
return 0; |
} |
} |
/* Destroy the passphrase. */ |
/* Destroy the passphrase. */ |