version 1.138, 2004/06/13 12:53:24 |
version 1.138.4.1, 2005/09/04 18:40:11 |
|
|
compat_cipher_proposal(myproposal[PROPOSAL_ENC_ALGS_STOC]); |
compat_cipher_proposal(myproposal[PROPOSAL_ENC_ALGS_STOC]); |
if (options.compression) { |
if (options.compression) { |
myproposal[PROPOSAL_COMP_ALGS_CTOS] = |
myproposal[PROPOSAL_COMP_ALGS_CTOS] = |
myproposal[PROPOSAL_COMP_ALGS_STOC] = "zlib,none"; |
myproposal[PROPOSAL_COMP_ALGS_STOC] = "zlib@openssh.com,zlib,none"; |
} else { |
} else { |
myproposal[PROPOSAL_COMP_ALGS_CTOS] = |
myproposal[PROPOSAL_COMP_ALGS_CTOS] = |
myproposal[PROPOSAL_COMP_ALGS_STOC] = "none,zlib"; |
myproposal[PROPOSAL_COMP_ALGS_STOC] = "none,zlib@openssh.com,zlib"; |
} |
} |
if (options.macs != NULL) { |
if (options.macs != NULL) { |
myproposal[PROPOSAL_MAC_ALGS_CTOS] = |
myproposal[PROPOSAL_MAC_ALGS_CTOS] = |
|
|
input_userauth_error(int type, u_int32_t seq, void *ctxt) |
input_userauth_error(int type, u_int32_t seq, void *ctxt) |
{ |
{ |
fatal("input_userauth_error: bad message during authentication: " |
fatal("input_userauth_error: bad message during authentication: " |
"type %d", type); |
"type %d", type); |
} |
} |
|
|
void |
void |
|
|
{ |
{ |
Gssctxt *gssctxt = NULL; |
Gssctxt *gssctxt = NULL; |
static gss_OID_set gss_supported = NULL; |
static gss_OID_set gss_supported = NULL; |
static int mech = 0; |
static u_int mech = 0; |
OM_uint32 min; |
OM_uint32 min; |
int ok = 0; |
int ok = 0; |
|
|
|
|
} |
} |
} |
} |
|
|
if (!ok) return 0; |
if (!ok) |
|
return 0; |
|
|
authctxt->methoddata=(void *)gssctxt; |
authctxt->methoddata=(void *)gssctxt; |
|
|
|
|
Authctxt *authctxt = ctxt; |
Authctxt *authctxt = ctxt; |
Gssctxt *gssctxt = authctxt->methoddata; |
Gssctxt *gssctxt = authctxt->methoddata; |
gss_buffer_desc send_tok = GSS_C_EMPTY_BUFFER; |
gss_buffer_desc send_tok = GSS_C_EMPTY_BUFFER; |
gss_buffer_desc gssbuf, mic; |
gss_buffer_desc mic = GSS_C_EMPTY_BUFFER; |
|
gss_buffer_desc gssbuf; |
OM_uint32 status, ms, flags; |
OM_uint32 status, ms, flags; |
Buffer b; |
Buffer b; |
|
|
|
|
|
|
/* Stick it into GSSAPI and see what it says */ |
/* Stick it into GSSAPI and see what it says */ |
status = ssh_gssapi_init_ctx(gssctxt, options.gss_deleg_creds, |
status = ssh_gssapi_init_ctx(gssctxt, options.gss_deleg_creds, |
&recv_tok, &send_tok, NULL); |
&recv_tok, &send_tok, NULL); |
|
|
xfree(recv_tok.value); |
xfree(recv_tok.value); |
gss_release_buffer(&ms, &send_tok); |
gss_release_buffer(&ms, &send_tok); |