version 1.49, 2002/03/14 15:24:27 |
version 1.49.2.4, 2002/10/11 14:51:53 |
|
|
* load the private key. Try first with empty passphrase; if it |
* load the private key. Try first with empty passphrase; if it |
* fails, ask for a passphrase. |
* fails, ask for a passphrase. |
*/ |
*/ |
if (public->flags && KEY_FLAG_EXT) |
if (public->flags & KEY_FLAG_EXT) |
private = public; |
private = public; |
else |
else |
private = key_load_private_type(KEY_RSA1, authfile, "", NULL); |
private = key_load_private_type(KEY_RSA1, authfile, "", NULL); |
|
|
error("Permission denied, please try again."); |
error("Permission denied, please try again."); |
if (options.cipher == SSH_CIPHER_NONE) |
if (options.cipher == SSH_CIPHER_NONE) |
log("WARNING: Encryption is disabled! " |
log("WARNING: Encryption is disabled! " |
"Reponse will be transmitted in clear text."); |
"Response will be transmitted in clear text."); |
response = read_passphrase(prompt, 0); |
response = read_passphrase(prompt, 0); |
if (strcmp(response, "") == 0) { |
if (strcmp(response, "") == 0) { |
xfree(response); |
xfree(response); |
|
|
*/ |
*/ |
void |
void |
ssh_userauth1(const char *local_user, const char *server_user, char *host, |
ssh_userauth1(const char *local_user, const char *server_user, char *host, |
Key **keys, int nkeys) |
Sensitive *sensitive) |
{ |
{ |
#ifdef KRB5 |
#ifdef KRB5 |
krb5_context context = NULL; |
krb5_context context = NULL; |
|
|
*/ |
*/ |
if ((supported_authentications & (1 << SSH_AUTH_RHOSTS_RSA)) && |
if ((supported_authentications & (1 << SSH_AUTH_RHOSTS_RSA)) && |
options.rhosts_rsa_authentication) { |
options.rhosts_rsa_authentication) { |
for (i = 0; i < nkeys; i++) { |
for (i = 0; i < sensitive->nkeys; i++) { |
if (keys[i] != NULL && keys[i]->type == KEY_RSA1 && |
if (sensitive->keys[i] != NULL && |
try_rhosts_rsa_authentication(local_user, keys[i])) |
sensitive->keys[i]->type == KEY_RSA1 && |
|
try_rhosts_rsa_authentication(local_user, |
|
sensitive->keys[i])) |
goto success; |
goto success; |
} |
} |
} |
} |