version 1.58, 2003/01/23 13:50:27 |
version 1.59, 2003/04/08 20:21:28 |
|
|
buffer_get_bignum(&auth->identities, key->rsa->n); |
buffer_get_bignum(&auth->identities, key->rsa->n); |
*comment = buffer_get_string(&auth->identities, NULL); |
*comment = buffer_get_string(&auth->identities, NULL); |
if (bits != BN_num_bits(key->rsa->n)) |
if (bits != BN_num_bits(key->rsa->n)) |
log("Warning: identity keysize mismatch: actual %d, announced %u", |
logit("Warning: identity keysize mismatch: actual %d, announced %u", |
BN_num_bits(key->rsa->n), bits); |
BN_num_bits(key->rsa->n), bits); |
break; |
break; |
case 2: |
case 2: |
|
|
if (key->type != KEY_RSA1) |
if (key->type != KEY_RSA1) |
return 0; |
return 0; |
if (response_type == 0) { |
if (response_type == 0) { |
log("Compatibility with ssh protocol version 1.0 no longer supported."); |
logit("Compatibility with ssh protocol version 1.0 no longer supported."); |
return 0; |
return 0; |
} |
} |
buffer_init(&buffer); |
buffer_init(&buffer); |
|
|
type = buffer_get_char(&buffer); |
type = buffer_get_char(&buffer); |
|
|
if (agent_failed(type)) { |
if (agent_failed(type)) { |
log("Agent admitted failure to authenticate using the key."); |
logit("Agent admitted failure to authenticate using the key."); |
} else if (type != SSH_AGENT_RSA_RESPONSE) { |
} else if (type != SSH_AGENT_RSA_RESPONSE) { |
fatal("Bad authentication response: %d", type); |
fatal("Bad authentication response: %d", type); |
} else { |
} else { |
|
|
} |
} |
type = buffer_get_char(&msg); |
type = buffer_get_char(&msg); |
if (agent_failed(type)) { |
if (agent_failed(type)) { |
log("Agent admitted failure to sign using the key."); |
logit("Agent admitted failure to sign using the key."); |
} else if (type != SSH2_AGENT_SIGN_RESPONSE) { |
} else if (type != SSH2_AGENT_SIGN_RESPONSE) { |
fatal("Bad authentication response: %d", type); |
fatal("Bad authentication response: %d", type); |
} else { |
} else { |
|
|
case SSH_AGENT_FAILURE: |
case SSH_AGENT_FAILURE: |
case SSH_COM_AGENT2_FAILURE: |
case SSH_COM_AGENT2_FAILURE: |
case SSH2_AGENT_FAILURE: |
case SSH2_AGENT_FAILURE: |
log("SSH_AGENT_FAILURE"); |
logit("SSH_AGENT_FAILURE"); |
return 0; |
return 0; |
case SSH_AGENT_SUCCESS: |
case SSH_AGENT_SUCCESS: |
return 1; |
return 1; |