version 1.32, 2003/02/16 17:30:33 |
version 1.33, 2003/03/05 22:33:43 |
|
|
fatal("%s: unknown key type %d", __func__, type); |
fatal("%s: unknown key type %d", __func__, type); |
break; |
break; |
} |
} |
key_free(key); |
|
} |
} |
|
if (key != NULL) |
|
key_free(key); |
|
|
/* clear temporarily storage (used by verify) */ |
/* clear temporarily storage (used by verify) */ |
monitor_reset_key_state(); |
monitor_reset_key_state(); |
|
|
key_blob = blob; |
key_blob = blob; |
key_bloblen = blen; |
key_bloblen = blen; |
key_blobtype = MM_RSAUSERKEY; |
key_blobtype = MM_RSAUSERKEY; |
key_free(key); |
|
} |
} |
|
if (key != NULL) |
|
key_free(key); |
|
|
mm_append_debug(m); |
mm_append_debug(m); |
|
|
|
|
mm_request_send(socket, MONITOR_ANS_RSACHALLENGE, m); |
mm_request_send(socket, MONITOR_ANS_RSACHALLENGE, m); |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_RSARESPONSE, 1); |
monitor_permit(mon_dispatch, MONITOR_REQ_RSARESPONSE, 1); |
|
|
|
xfree(blob); |
|
key_free(key); |
return (0); |
return (0); |
} |
} |
|
|
|
|
fatal("%s: received bad response to challenge", __func__); |
fatal("%s: received bad response to challenge", __func__); |
success = auth_rsa_verify_response(key, ssh1_challenge, response); |
success = auth_rsa_verify_response(key, ssh1_challenge, response); |
|
|
|
xfree(blob); |
key_free(key); |
key_free(key); |
xfree(response); |
xfree(response); |
|
|