summaryrefslogtreecommitdiff
path: root/auth1.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-01-23 03:12:10 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-01-23 03:12:10 +0000
commit95fb2dde7777c6afbffd80eba79a88811db55290 (patch)
treea008785c01c2bb513cc0c76bf1ac28f36cd9d9c9 /auth1.c
parentb1985f727950dbb3d5c7de863ae0e2181ace53f8 (diff)
- markus@cvs.openbsd.org 2001/01/22 23:06:39
[auth1.c auth2.c readconf.c readconf.h servconf.c servconf.h sshconnect1.c sshconnect2.c sshd.c] rename skey -> challenge response. auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled.
Diffstat (limited to 'auth1.c')
-rw-r--r--auth1.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/auth1.c b/auth1.c
index 50037fd83..1dc2284a7 100644
--- a/auth1.c
+++ b/auth1.c
@@ -10,7 +10,7 @@
10 */ 10 */
11 11
12#include "includes.h" 12#include "includes.h"
13RCSID("$OpenBSD: auth1.c,v 1.13 2001/01/21 19:05:43 markus Exp $"); 13RCSID("$OpenBSD: auth1.c,v 1.14 2001/01/22 23:06:39 markus Exp $");
14 14
15#ifdef HAVE_OSF_SIA 15#ifdef HAVE_OSF_SIA
16# include <sia.h> 16# include <sia.h>
@@ -281,7 +281,7 @@ do_authloop(Authctxt *authctxt)
281 281
282 case SSH_CMSG_AUTH_TIS: 282 case SSH_CMSG_AUTH_TIS:
283 debug("rcvd SSH_CMSG_AUTH_TIS"); 283 debug("rcvd SSH_CMSG_AUTH_TIS");
284 if (options.skey_authentication == 1) { 284 if (options.challenge_reponse_authentication == 1) {
285 char *challenge = get_challenge(authctxt, authctxt->style); 285 char *challenge = get_challenge(authctxt, authctxt->style);
286 if (challenge != NULL) { 286 if (challenge != NULL) {
287 debug("sending challenge '%s'", challenge); 287 debug("sending challenge '%s'", challenge);
@@ -296,7 +296,7 @@ do_authloop(Authctxt *authctxt)
296 296
297 case SSH_CMSG_AUTH_TIS_RESPONSE: 297 case SSH_CMSG_AUTH_TIS_RESPONSE:
298 debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE"); 298 debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE");
299 if (options.skey_authentication == 1) { 299 if (options.challenge_reponse_authentication == 1) {
300 char *response = packet_get_string(&dlen); 300 char *response = packet_get_string(&dlen);
301 debug("got response '%s'", response); 301 debug("got response '%s'", response);
302 packet_integrity_check(plen, 4 + dlen, type); 302 packet_integrity_check(plen, 4 + dlen, type);