[BACK]Return to authfd.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/authfd.c between version 1.58 and 1.59

version 1.58, 2003/01/23 13:50:27 version 1.59, 2003/04/08 20:21:28
Line 332 
Line 332 
                 buffer_get_bignum(&auth->identities, key->rsa->n);                  buffer_get_bignum(&auth->identities, key->rsa->n);
                 *comment = buffer_get_string(&auth->identities, NULL);                  *comment = buffer_get_string(&auth->identities, NULL);
                 if (bits != BN_num_bits(key->rsa->n))                  if (bits != BN_num_bits(key->rsa->n))
                         log("Warning: identity keysize mismatch: actual %d, announced %u",                          logit("Warning: identity keysize mismatch: actual %d, announced %u",
                             BN_num_bits(key->rsa->n), bits);                              BN_num_bits(key->rsa->n), bits);
                 break;                  break;
         case 2:          case 2:
Line 373 
Line 373 
         if (key->type != KEY_RSA1)          if (key->type != KEY_RSA1)
                 return 0;                  return 0;
         if (response_type == 0) {          if (response_type == 0) {
                 log("Compatibility with ssh protocol version 1.0 no longer supported.");                  logit("Compatibility with ssh protocol version 1.0 no longer supported.");
                 return 0;                  return 0;
         }          }
         buffer_init(&buffer);          buffer_init(&buffer);
Line 392 
Line 392 
         type = buffer_get_char(&buffer);          type = buffer_get_char(&buffer);
   
         if (agent_failed(type)) {          if (agent_failed(type)) {
                 log("Agent admitted failure to authenticate using the key.");                  logit("Agent admitted failure to authenticate using the key.");
         } else if (type != SSH_AGENT_RSA_RESPONSE) {          } else if (type != SSH_AGENT_RSA_RESPONSE) {
                 fatal("Bad authentication response: %d", type);                  fatal("Bad authentication response: %d", type);
         } else {          } else {
Line 441 
Line 441 
         }          }
         type = buffer_get_char(&msg);          type = buffer_get_char(&msg);
         if (agent_failed(type)) {          if (agent_failed(type)) {
                 log("Agent admitted failure to sign using the key.");                  logit("Agent admitted failure to sign using the key.");
         } else if (type != SSH2_AGENT_SIGN_RESPONSE) {          } else if (type != SSH2_AGENT_SIGN_RESPONSE) {
                 fatal("Bad authentication response: %d", type);                  fatal("Bad authentication response: %d", type);
         } else {          } else {
Line 641 
Line 641 
         case SSH_AGENT_FAILURE:          case SSH_AGENT_FAILURE:
         case SSH_COM_AGENT2_FAILURE:          case SSH_COM_AGENT2_FAILURE:
         case SSH2_AGENT_FAILURE:          case SSH2_AGENT_FAILURE:
                 log("SSH_AGENT_FAILURE");                  logit("SSH_AGENT_FAILURE");
                 return 0;                  return 0;
         case SSH_AGENT_SUCCESS:          case SSH_AGENT_SUCCESS:
                 return 1;                  return 1;

Legend:
Removed from v.1.58  
changed lines
  Added in v.1.59