=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/Attic/sshconnect1.c,v retrieving revision 1.61.2.3 retrieving revision 1.62 diff -u -r1.61.2.3 -r1.62 --- src/usr.bin/ssh/Attic/sshconnect1.c 2006/11/08 00:44:05 1.61.2.3 +++ src/usr.bin/ssh/Attic/sshconnect1.c 2005/10/30 08:52:18 1.62 @@ -1,4 +1,3 @@ -/* $OpenBSD: sshconnect1.c,v 1.61.2.3 2006/11/08 00:44:05 brad Exp $ */ /* * Author: Tatu Ylonen * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland @@ -13,36 +12,29 @@ * called by a name other than "ssh" or "Secure Shell". */ -#include -#include +#include "includes.h" +RCSID("$OpenBSD: sshconnect1.c,v 1.62 2005/10/30 08:52:18 djm Exp $"); #include #include -#include -#include -#include -#include -#include - -#include "xmalloc.h" #include "ssh.h" #include "ssh1.h" +#include "xmalloc.h" #include "rsa.h" #include "buffer.h" #include "packet.h" -#include "key.h" -#include "cipher.h" #include "kex.h" #include "uidswap.h" #include "log.h" #include "readconf.h" +#include "key.h" #include "authfd.h" #include "sshconnect.h" #include "authfile.h" #include "misc.h" +#include "cipher.h" #include "canohost.h" -#include "hostfile.h" #include "auth.h" /* Session id for the current session. */ @@ -205,7 +197,7 @@ BIGNUM *challenge; Key *public, *private; char buf[300], *passphrase, *comment, *authfile; - int i, perm_ok = 1, type, quit; + int i, type, quit; public = options.identity_keys[idx]; authfile = options.identity_files[idx]; @@ -251,16 +243,15 @@ if (public->flags & KEY_FLAG_EXT) private = public; else - private = key_load_private_type(KEY_RSA1, authfile, "", NULL, - &perm_ok); - if (private == NULL && !options.batch_mode && perm_ok) { + private = key_load_private_type(KEY_RSA1, authfile, "", NULL); + if (private == NULL && !options.batch_mode) { snprintf(buf, sizeof(buf), "Enter passphrase for RSA key '%.100s': ", comment); for (i = 0; i < options.number_of_password_prompts; i++) { passphrase = read_passphrase(buf, 0); if (strcmp(passphrase, "") != 0) { private = key_load_private_type(KEY_RSA1, - authfile, passphrase, NULL, NULL); + authfile, passphrase, NULL); quit = 0; } else { debug2("no passphrase given, try next key"); @@ -277,7 +268,7 @@ xfree(comment); if (private == NULL) { - if (!options.batch_mode && perm_ok) + if (!options.batch_mode) error("Bad passphrase."); /* Send a dummy response packet to avoid protocol error. */ @@ -560,20 +551,14 @@ * the first 16 bytes of the session id. */ if ((key = BN_new()) == NULL) - fatal("ssh_kex: BN_new failed"); - if (BN_set_word(key, 0) == 0) - fatal("ssh_kex: BN_set_word failed"); + fatal("respond_to_rsa_challenge: BN_new failed"); + BN_set_word(key, 0); for (i = 0; i < SSH_SESSION_KEY_LENGTH; i++) { - if (BN_lshift(key, key, 8) == 0) - fatal("ssh_kex: BN_lshift failed"); - if (i < 16) { - if (BN_add_word(key, session_key[i] ^ session_id[i]) - == 0) - fatal("ssh_kex: BN_add_word failed"); - } else { - if (BN_add_word(key, session_key[i]) == 0) - fatal("ssh_kex: BN_add_word failed"); - } + BN_lshift(key, key, 8); + if (i < 16) + BN_add_word(key, session_key[i] ^ session_id[i]); + else + BN_add_word(key, session_key[i]); } /*