version 1.60, 2004/07/28 09:40:29 |
version 1.60.4.2, 2006/02/03 02:53:45 |
|
|
/* Wait for server's response. */ |
/* Wait for server's response. */ |
type = packet_read(); |
type = packet_read(); |
|
|
/* The server sends failure if it doesn\'t like our key or |
/* The server sends failure if it doesn't like our key or |
does not support RSA authentication. */ |
does not support RSA authentication. */ |
if (type == SSH_SMSG_FAILURE) { |
if (type == SSH_SMSG_FAILURE) { |
debug("Server refused our key."); |
debug("Server refused our key."); |
|
|
/* Compute the response. */ |
/* Compute the response. */ |
/* The response is MD5 of decrypted challenge plus session id. */ |
/* The response is MD5 of decrypted challenge plus session id. */ |
len = BN_num_bytes(challenge); |
len = BN_num_bytes(challenge); |
if (len <= 0 || len > sizeof(buf)) |
if (len <= 0 || (u_int)len > sizeof(buf)) |
packet_disconnect( |
packet_disconnect( |
"respond_to_rsa_challenge: bad challenge length %d", len); |
"respond_to_rsa_challenge: bad challenge length %d", len); |
|
|
|
|
type = packet_read(); |
type = packet_read(); |
|
|
/* |
/* |
* The server responds with failure if it doesn\'t like our key or |
* The server responds with failure if it doesn't like our key or |
* doesn\'t support RSA authentication. |
* doesn't support RSA authentication. |
*/ |
*/ |
if (type == SSH_SMSG_FAILURE) { |
if (type == SSH_SMSG_FAILURE) { |
debug("Server refused our key."); |
debug("Server refused our key."); |