version 1.49, 2002/03/14 15:24:27 |
version 1.49.2.3, 2002/06/26 15:30:39 |
|
|
error("Permission denied, please try again."); |
error("Permission denied, please try again."); |
if (options.cipher == SSH_CIPHER_NONE) |
if (options.cipher == SSH_CIPHER_NONE) |
log("WARNING: Encryption is disabled! " |
log("WARNING: Encryption is disabled! " |
"Reponse will be transmitted in clear text."); |
"Response will be transmitted in clear text."); |
response = read_passphrase(prompt, 0); |
response = read_passphrase(prompt, 0); |
if (strcmp(response, "") == 0) { |
if (strcmp(response, "") == 0) { |
xfree(response); |
xfree(response); |
|
|
*/ |
*/ |
void |
void |
ssh_userauth1(const char *local_user, const char *server_user, char *host, |
ssh_userauth1(const char *local_user, const char *server_user, char *host, |
Key **keys, int nkeys) |
Sensitive *sensitive) |
{ |
{ |
#ifdef KRB5 |
#ifdef KRB5 |
krb5_context context = NULL; |
krb5_context context = NULL; |
|
|
*/ |
*/ |
if ((supported_authentications & (1 << SSH_AUTH_RHOSTS_RSA)) && |
if ((supported_authentications & (1 << SSH_AUTH_RHOSTS_RSA)) && |
options.rhosts_rsa_authentication) { |
options.rhosts_rsa_authentication) { |
for (i = 0; i < nkeys; i++) { |
for (i = 0; i < sensitive->nkeys; i++) { |
if (keys[i] != NULL && keys[i]->type == KEY_RSA1 && |
if (sensitive->keys[i] != NULL && |
try_rhosts_rsa_authentication(local_user, keys[i])) |
sensitive->keys[i]->type == KEY_RSA1 && |
|
try_rhosts_rsa_authentication(local_user, |
|
sensitive->keys[i])) |
goto success; |
goto success; |
} |
} |
} |
} |