version 1.114, 2001/12/20 16:37:29 |
version 1.115, 2001/12/27 20:39:58 |
|
|
/* Process the packet. */ |
/* Process the packet. */ |
switch (type) { |
switch (type) { |
case SSH_CMSG_REQUEST_COMPRESSION: |
case SSH_CMSG_REQUEST_COMPRESSION: |
packet_integrity_check(plen, 4, type); |
|
compression_level = packet_get_int(); |
compression_level = packet_get_int(); |
|
packet_done(); |
if (compression_level < 1 || compression_level > 9) { |
if (compression_level < 1 || compression_level > 9) { |
packet_send_debug("Received illegal compression level %d.", |
packet_send_debug("Received illegal compression level %d.", |
compression_level); |
compression_level); |
|
|
verbose("Kerberos TGT passing disabled."); |
verbose("Kerberos TGT passing disabled."); |
} else { |
} else { |
char *kdata = packet_get_string(&dlen); |
char *kdata = packet_get_string(&dlen); |
packet_integrity_check(plen, 4 + dlen, type); |
packet_done(); |
|
|
/* XXX - 0x41, see creds_to_radix version */ |
/* XXX - 0x41, see creds_to_radix version */ |
if (kdata[0] != 0x41) { |
if (kdata[0] != 0x41) { |
|
|
} else { |
} else { |
/* Accept AFS token. */ |
/* Accept AFS token. */ |
char *token = packet_get_string(&dlen); |
char *token = packet_get_string(&dlen); |
packet_integrity_check(plen, 4 + dlen, type); |
packet_done(); |
|
|
if (auth_afs_token(s->authctxt, token)) |
if (auth_afs_token(s->authctxt, token)) |
success = 1; |
success = 1; |