version 1.94, 2002/01/25 21:00:24 |
version 1.95, 2002/02/03 17:59:23 |
|
|
Authctxt *authctxt = ctxt; |
Authctxt *authctxt = ctxt; |
Key *key = NULL; |
Key *key = NULL; |
Buffer b; |
Buffer b; |
int alen, blen, sent = 0; |
int pktype, alen, blen, sent = 0; |
char *pkalg, *pkblob, *fp; |
char *pkalg, *pkblob, *fp; |
|
|
if (authctxt == NULL) |
if (authctxt == NULL) |
|
|
debug("no last key or no sign cb"); |
debug("no last key or no sign cb"); |
break; |
break; |
} |
} |
if (key_type_from_name(pkalg) == KEY_UNSPEC) { |
if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) { |
debug("unknown pkalg %s", pkalg); |
debug("unknown pkalg %s", pkalg); |
break; |
break; |
} |
} |
if ((key = key_from_blob(pkblob, blen)) == NULL) { |
if ((key = key_from_blob(pkblob, blen)) == NULL) { |
debug("no key from blob. pkalg %s", pkalg); |
debug("no key from blob. pkalg %s", pkalg); |
|
break; |
|
} |
|
if (key->type != pktype) { |
|
error("input_userauth_pk_ok: type mismatch " |
|
"for decoded key (received %d, expected %d)", |
|
key->type, pktype); |
break; |
break; |
} |
} |
fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX); |
fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX); |