version 1.2, 2002/03/19 10:35:39 |
version 1.3, 2002/03/19 10:41:32 |
|
|
|
|
if ((p = BN_new()) == NULL) |
if ((p = BN_new()) == NULL) |
fatal("%s: BN_new failed", __FUNCTION__); |
fatal("%s: BN_new failed", __FUNCTION__); |
if ((g = BN_new()) == NULL) |
if ((g = BN_new()) == NULL) |
fatal("%s: BN_new failed", __FUNCTION__); |
fatal("%s: BN_new failed", __FUNCTION__); |
buffer_get_bignum2(&m, p); |
buffer_get_bignum2(&m, p); |
buffer_get_bignum2(&m, g); |
buffer_get_bignum2(&m, g); |
|
|
|
|
buffer_free(&m); |
buffer_free(&m); |
|
|
debug3("%s: user %sauthenticated", |
debug3("%s: user %sauthenticated", |
__FUNCTION__, authenticated ? "" : "not "); |
__FUNCTION__, authenticated ? "" : "not "); |
return (authenticated); |
return (authenticated); |
} |
} |
|
|
return (allowed); |
return (allowed); |
} |
} |
|
|
/* |
/* |
* This key verify needs to send the key type along, because the |
* This key verify needs to send the key type along, because the |
* privileged parent makes the decision if the key is allowed |
* privileged parent makes the decision if the key is allowed |
* for authentication. |
* for authentication. |
|
|
goto skip; |
goto skip; |
} else { |
} else { |
/* Kex for rekeying */ |
/* Kex for rekeying */ |
mm_send_kex(&m, *monitor->m_pkex); |
mm_send_kex(&m, *monitor->m_pkex); |
} |
} |
|
|
debug3("%s: Sending new keys: %p %p", |
debug3("%s: Sending new keys: %p %p", |
|
|
buffer_put_cstring(&m, s->tty); |
buffer_put_cstring(&m, s->tty); |
mm_request_send(monitor->m_recvfd, MONITOR_REQ_PTYCLEANUP, &m); |
mm_request_send(monitor->m_recvfd, MONITOR_REQ_PTYCLEANUP, &m); |
buffer_free(&m); |
buffer_free(&m); |
|
|
/* closed dup'ed master */ |
/* closed dup'ed master */ |
if (close(s->ptymaster) < 0) |
if (close(s->ptymaster) < 0) |
error("close(s->ptymaster): %s", strerror(errno)); |
error("close(s->ptymaster): %s", strerror(errno)); |