version 1.44, 2001/12/27 20:39:58 |
version 1.45, 2001/12/28 12:14:27 |
|
|
type); |
type); |
|
|
packet_get_bignum(challenge, &clen); |
packet_get_bignum(challenge, &clen); |
packet_done(); |
packet_check_eom(); |
|
|
debug("Received RSA challenge from server."); |
debug("Received RSA challenge from server."); |
|
|
|
|
if ((challenge = BN_new()) == NULL) |
if ((challenge = BN_new()) == NULL) |
fatal("try_rsa_authentication: BN_new failed"); |
fatal("try_rsa_authentication: BN_new failed"); |
packet_get_bignum(challenge, &clen); |
packet_get_bignum(challenge, &clen); |
packet_done(); |
packet_check_eom(); |
|
|
debug("Received RSA challenge from server."); |
debug("Received RSA challenge from server."); |
|
|
|
|
if ((challenge = BN_new()) == NULL) |
if ((challenge = BN_new()) == NULL) |
fatal("try_rhosts_rsa_authentication: BN_new failed"); |
fatal("try_rhosts_rsa_authentication: BN_new failed"); |
packet_get_bignum(challenge, &clen); |
packet_get_bignum(challenge, &clen); |
packet_done(); |
packet_check_eom(); |
|
|
debug("Received RSA challenge for host key from server."); |
debug("Received RSA challenge for host key from server."); |
|
|
|
|
memcpy(auth.dat, reply, auth.length); |
memcpy(auth.dat, reply, auth.length); |
xfree(reply); |
xfree(reply); |
|
|
packet_done(); |
packet_check_eom(); |
|
|
/* |
/* |
* If his response isn't properly encrypted with the session |
* If his response isn't properly encrypted with the session |
|
|
|
|
/* Get server's response. */ |
/* Get server's response. */ |
ap.data = packet_get_string((unsigned int *) &ap.length); |
ap.data = packet_get_string((unsigned int *) &ap.length); |
packet_done(); |
packet_check_eom(); |
/* XXX je to dobre? */ |
/* XXX je to dobre? */ |
|
|
problem = krb5_rd_rep(*context, *auth_context, &ap, &reply); |
problem = krb5_rd_rep(*context, *auth_context, &ap, &reply); |
|
|
return 0; |
return 0; |
} |
} |
challenge = packet_get_string(&clen); |
challenge = packet_get_string(&clen); |
packet_done(); |
packet_check_eom(); |
snprintf(prompt, sizeof prompt, "%s%s", challenge, |
snprintf(prompt, sizeof prompt, "%s%s", challenge, |
strchr(challenge, '\n') ? "" : "\nResponse: "); |
strchr(challenge, '\n') ? "" : "\nResponse: "); |
xfree(challenge); |
xfree(challenge); |
|
|
|
|
supported_ciphers = packet_get_int(); |
supported_ciphers = packet_get_int(); |
supported_authentications = packet_get_int(); |
supported_authentications = packet_get_int(); |
packet_done(); |
packet_check_eom(); |
|
|
debug("Received server public key (%d bits) and host key (%d bits).", |
debug("Received server public key (%d bits) and host key (%d bits).", |
BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n)); |
BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n)); |