version 1.58.2.1, 2003/09/16 20:50:42 |
version 1.58.2.2, 2004/03/04 18:18:15 |
|
|
static int |
static int |
ssh_request_reply(AuthenticationConnection *auth, Buffer *request, Buffer *reply) |
ssh_request_reply(AuthenticationConnection *auth, Buffer *request, Buffer *reply) |
{ |
{ |
int l, len; |
int l; |
|
u_int len; |
char buf[1024]; |
char buf[1024]; |
|
|
/* Get the length of the message, and format it in the buffer. */ |
/* Get the length of the message, and format it in the buffer. */ |
|
|
/* Extract the length, and check it for sanity. */ |
/* Extract the length, and check it for sanity. */ |
len = GET_32BIT(buf); |
len = GET_32BIT(buf); |
if (len > 256 * 1024) |
if (len > 256 * 1024) |
fatal("Authentication response too long: %d", len); |
fatal("Authentication response too long: %u", len); |
|
|
/* Read the rest of the response in to the buffer. */ |
/* Read the rest of the response in to the buffer. */ |
buffer_clear(reply); |
buffer_clear(reply); |
|
|
|
|
/* Get the number of entries in the response and check it for sanity. */ |
/* Get the number of entries in the response and check it for sanity. */ |
auth->howmany = buffer_get_int(&auth->identities); |
auth->howmany = buffer_get_int(&auth->identities); |
if (auth->howmany > 1024) |
if ((u_int)auth->howmany > 1024) |
fatal("Too many identities in authentication reply: %d", |
fatal("Too many identities in authentication reply: %d", |
auth->howmany); |
auth->howmany); |
|
|
|
|
} |
} |
|
|
int |
int |
ssh_update_card(AuthenticationConnection *auth, int add, |
ssh_update_card(AuthenticationConnection *auth, int add, |
const char *reader_id, const char *pin, u_int life, u_int confirm) |
const char *reader_id, const char *pin, u_int life, u_int confirm) |
{ |
{ |
Buffer msg; |
Buffer msg; |
|
|
buffer_put_char(&msg, type); |
buffer_put_char(&msg, type); |
buffer_put_cstring(&msg, reader_id); |
buffer_put_cstring(&msg, reader_id); |
buffer_put_cstring(&msg, pin); |
buffer_put_cstring(&msg, pin); |
|
|
if (constrained) { |
if (constrained) { |
if (life != 0) { |
if (life != 0) { |
buffer_put_char(&msg, SSH_AGENT_CONSTRAIN_LIFETIME); |
buffer_put_char(&msg, SSH_AGENT_CONSTRAIN_LIFETIME); |