version 1.53, 2001/03/10 17:51:04 |
version 1.54, 2001/03/12 22:02:02 |
|
|
Key *key = NULL; |
Key *key = NULL; |
Buffer b; |
Buffer b; |
int alen, blen, pktype, sent = 0; |
int alen, blen, pktype, sent = 0; |
char *pkalg, *pkblob; |
char *pkalg, *pkblob, *fp; |
|
|
if (authctxt == NULL) |
if (authctxt == NULL) |
fatal("input_userauth_pk_ok: no authentication context"); |
fatal("input_userauth_pk_ok: no authentication context"); |
|
|
debug("no last key or no sign cb"); |
debug("no last key or no sign cb"); |
break; |
break; |
} |
} |
debug2("last_key %s", key_fingerprint(authctxt->last_key)); |
|
if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) { |
if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) { |
debug("unknown pkalg %s", pkalg); |
debug("unknown pkalg %s", pkalg); |
break; |
break; |
|
|
debug("no key from blob. pkalg %s", pkalg); |
debug("no key from blob. pkalg %s", pkalg); |
break; |
break; |
} |
} |
debug2("input_userauth_pk_ok: fp %s", key_fingerprint(key)); |
fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX); |
|
debug2("input_userauth_pk_ok: fp %s", fp); |
|
xfree(fp); |
if (!key_equal(key, authctxt->last_key)) { |
if (!key_equal(key, authctxt->last_key)) { |
debug("key != last_key"); |
debug("key != last_key"); |
break; |
break; |