version 1.24, 2005/07/17 07:17:54 |
version 1.24.2.1, 2006/10/06 03:19:32 |
|
|
|
/* $OpenBSD$ */ |
/* |
/* |
* Copyright (c) 2001 Markus Friedl. All rights reserved. |
* Copyright (c) 2001 Markus Friedl. All rights reserved. |
* Copyright (c) 2001 Per Allansson. All rights reserved. |
* Copyright (c) 2001 Per Allansson. All rights reserved. |
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
*/ |
*/ |
#include "includes.h" |
|
RCSID("$OpenBSD$"); |
|
|
|
|
#include <sys/types.h> |
|
|
|
#include <stdio.h> |
|
#include <string.h> |
|
|
|
#include "xmalloc.h" |
#include "ssh2.h" |
#include "ssh2.h" |
|
#include "key.h" |
|
#include "hostfile.h" |
#include "auth.h" |
#include "auth.h" |
#include "buffer.h" |
#include "buffer.h" |
#include "packet.h" |
#include "packet.h" |
#include "xmalloc.h" |
|
#include "dispatch.h" |
#include "dispatch.h" |
#include "log.h" |
#include "log.h" |
|
|
|
|
if (nresp > 100) |
if (nresp > 100) |
fatal("input_userauth_info_response: too many replies"); |
fatal("input_userauth_info_response: too many replies"); |
if (nresp > 0) { |
if (nresp > 0) { |
response = xmalloc(nresp * sizeof(char *)); |
response = xcalloc(nresp, sizeof(char *)); |
for (i = 0; i < nresp; i++) |
for (i = 0; i < nresp; i++) |
response[i] = packet_get_string(NULL); |
response[i] = packet_get_string(NULL); |
} |
} |
|
|
{ |
{ |
#ifdef BSD_AUTH |
#ifdef BSD_AUTH |
extern KbdintDevice mm_bsdauth_device; |
extern KbdintDevice mm_bsdauth_device; |
#endif |
#else |
#ifdef SKEY |
#ifdef SKEY |
extern KbdintDevice mm_skey_device; |
extern KbdintDevice mm_skey_device; |
|
#endif |
#endif |
#endif |
/* As long as SSHv1 has devices[0] hard coded this is fine */ |
/* As long as SSHv1 has devices[0] hard coded this is fine */ |
#ifdef BSD_AUTH |
#ifdef BSD_AUTH |