version 1.73, 2014/01/27 19:18:54 |
version 1.74, 2014/02/02 03:44:32 |
|
|
* return a wrong value. |
* return a wrong value. |
*/ |
*/ |
logit("Authentication agent failed to decrypt challenge."); |
logit("Authentication agent failed to decrypt challenge."); |
memset(response, 0, sizeof(response)); |
explicit_bzero(response, sizeof(response)); |
} |
} |
key_free(key); |
key_free(key); |
debug("Sending response to RSA challenge."); |
debug("Sending response to RSA challenge."); |
|
|
packet_send(); |
packet_send(); |
packet_write_wait(); |
packet_write_wait(); |
|
|
memset(buf, 0, sizeof(buf)); |
explicit_bzero(buf, sizeof(buf)); |
memset(response, 0, sizeof(response)); |
explicit_bzero(response, sizeof(response)); |
memset(&md, 0, sizeof(md)); |
explicit_bzero(&md, sizeof(md)); |
} |
} |
|
|
/* |
/* |
|
|
debug2("no passphrase given, try next key"); |
debug2("no passphrase given, try next key"); |
quit = 1; |
quit = 1; |
} |
} |
memset(passphrase, 0, strlen(passphrase)); |
explicit_bzero(passphrase, strlen(passphrase)); |
free(passphrase); |
free(passphrase); |
if (private != NULL || quit) |
if (private != NULL || quit) |
break; |
break; |
|
|
} |
} |
packet_start(SSH_CMSG_AUTH_TIS_RESPONSE); |
packet_start(SSH_CMSG_AUTH_TIS_RESPONSE); |
ssh_put_password(response); |
ssh_put_password(response); |
memset(response, 0, strlen(response)); |
explicit_bzero(response, strlen(response)); |
free(response); |
free(response); |
packet_send(); |
packet_send(); |
packet_write_wait(); |
packet_write_wait(); |
|
|
password = read_passphrase(prompt, 0); |
password = read_passphrase(prompt, 0); |
packet_start(SSH_CMSG_AUTH_PASSWORD); |
packet_start(SSH_CMSG_AUTH_PASSWORD); |
ssh_put_password(password); |
ssh_put_password(password); |
memset(password, 0, strlen(password)); |
explicit_bzero(password, strlen(password)); |
free(password); |
free(password); |
packet_send(); |
packet_send(); |
packet_write_wait(); |
packet_write_wait(); |
|
|
/* Set the encryption key. */ |
/* Set the encryption key. */ |
packet_set_encryption_key(session_key, SSH_SESSION_KEY_LENGTH, options.cipher); |
packet_set_encryption_key(session_key, SSH_SESSION_KEY_LENGTH, options.cipher); |
|
|
/* We will no longer need the session key here. Destroy any extra copies. */ |
/* |
memset(session_key, 0, sizeof(session_key)); |
* We will no longer need the session key here. |
|
* Destroy any extra copies. |
|
*/ |
|
explicit_bzero(session_key, sizeof(session_key)); |
|
|
/* |
/* |
* Expect a success message from the server. Note that this message |
* Expect a success message from the server. Note that this message |