diff options
author | Colin Watson <cjwatson@debian.org> | 2003-09-01 18:52:37 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2003-09-01 18:52:37 +0000 |
commit | 854156dd39acbde9b4a47ec0fc54a042ea7358e0 (patch) | |
tree | 96755f8590acc2146f4b4ef5b5cdba600e5d9353 /sshconnect1.c | |
parent | fad82e8999e790899083f9e22a1841148d746df6 (diff) | |
parent | 053db7da5ce09acdf742789d9d1a05e81d4861d0 (diff) |
Import OpenSSH 3.6.1p2.
Diffstat (limited to 'sshconnect1.c')
-rw-r--r-- | sshconnect1.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/sshconnect1.c b/sshconnect1.c index 491b4f67d..2fc9a981a 100644 --- a/sshconnect1.c +++ b/sshconnect1.c | |||
@@ -122,7 +122,7 @@ try_agent_authentication(void) | |||
122 | * although it advertised it supports this. Just | 122 | * although it advertised it supports this. Just |
123 | * return a wrong value. | 123 | * return a wrong value. |
124 | */ | 124 | */ |
125 | logit("Authentication agent failed to decrypt challenge."); | 125 | log("Authentication agent failed to decrypt challenge."); |
126 | memset(response, 0, sizeof(response)); | 126 | memset(response, 0, sizeof(response)); |
127 | } | 127 | } |
128 | key_free(key); | 128 | key_free(key); |
@@ -890,7 +890,7 @@ try_challenge_response_authentication(void) | |||
890 | if (i != 0) | 890 | if (i != 0) |
891 | error("Permission denied, please try again."); | 891 | error("Permission denied, please try again."); |
892 | if (options.cipher == SSH_CIPHER_NONE) | 892 | if (options.cipher == SSH_CIPHER_NONE) |
893 | logit("WARNING: Encryption is disabled! " | 893 | log("WARNING: Encryption is disabled! " |
894 | "Response will be transmitted in clear text."); | 894 | "Response will be transmitted in clear text."); |
895 | response = read_passphrase(prompt, 0); | 895 | response = read_passphrase(prompt, 0); |
896 | if (strcmp(response, "") == 0) { | 896 | if (strcmp(response, "") == 0) { |
@@ -925,7 +925,7 @@ try_password_authentication(char *prompt) | |||
925 | 925 | ||
926 | debug("Doing password authentication."); | 926 | debug("Doing password authentication."); |
927 | if (options.cipher == SSH_CIPHER_NONE) | 927 | if (options.cipher == SSH_CIPHER_NONE) |
928 | logit("WARNING: Encryption is disabled! Password will be transmitted in clear text."); | 928 | log("WARNING: Encryption is disabled! Password will be transmitted in clear text."); |
929 | for (i = 0; i < options.number_of_password_prompts; i++) { | 929 | for (i = 0; i < options.number_of_password_prompts; i++) { |
930 | if (i != 0) | 930 | if (i != 0) |
931 | error("Permission denied, please try again."); | 931 | error("Permission denied, please try again."); |
@@ -981,9 +981,9 @@ ssh_kex(char *host, struct sockaddr *hostaddr) | |||
981 | 981 | ||
982 | rbits = BN_num_bits(server_key->rsa->n); | 982 | rbits = BN_num_bits(server_key->rsa->n); |
983 | if (bits != rbits) { | 983 | if (bits != rbits) { |
984 | logit("Warning: Server lies about size of server public key: " | 984 | log("Warning: Server lies about size of server public key: " |
985 | "actual size is %d bits vs. announced %d.", rbits, bits); | 985 | "actual size is %d bits vs. announced %d.", rbits, bits); |
986 | logit("Warning: This may be due to an old implementation of ssh."); | 986 | log("Warning: This may be due to an old implementation of ssh."); |
987 | } | 987 | } |
988 | /* Get the host key. */ | 988 | /* Get the host key. */ |
989 | host_key = key_new(KEY_RSA1); | 989 | host_key = key_new(KEY_RSA1); |
@@ -993,9 +993,9 @@ ssh_kex(char *host, struct sockaddr *hostaddr) | |||
993 | 993 | ||
994 | rbits = BN_num_bits(host_key->rsa->n); | 994 | rbits = BN_num_bits(host_key->rsa->n); |
995 | if (bits != rbits) { | 995 | if (bits != rbits) { |
996 | logit("Warning: Server lies about size of server host key: " | 996 | log("Warning: Server lies about size of server host key: " |
997 | "actual size is %d bits vs. announced %d.", rbits, bits); | 997 | "actual size is %d bits vs. announced %d.", rbits, bits); |
998 | logit("Warning: This may be due to an old implementation of ssh."); | 998 | log("Warning: This may be due to an old implementation of ssh."); |
999 | } | 999 | } |
1000 | 1000 | ||
1001 | /* Get protocol flags. */ | 1001 | /* Get protocol flags. */ |
@@ -1086,7 +1086,7 @@ ssh_kex(char *host, struct sockaddr *hostaddr) | |||
1086 | options.cipher = ssh_cipher_default; | 1086 | options.cipher = ssh_cipher_default; |
1087 | } else if (options.cipher == SSH_CIPHER_ILLEGAL || | 1087 | } else if (options.cipher == SSH_CIPHER_ILLEGAL || |
1088 | !(cipher_mask_ssh1(1) & (1 << options.cipher))) { | 1088 | !(cipher_mask_ssh1(1) & (1 << options.cipher))) { |
1089 | logit("No valid SSH1 cipher, using %.100s instead.", | 1089 | log("No valid SSH1 cipher, using %.100s instead.", |
1090 | cipher_name(ssh_cipher_default)); | 1090 | cipher_name(ssh_cipher_default)); |
1091 | options.cipher = ssh_cipher_default; | 1091 | options.cipher = ssh_cipher_default; |
1092 | } | 1092 | } |
@@ -1276,7 +1276,7 @@ ssh_userauth1(const char *local_user, const char *server_user, char *host, | |||
1276 | if ((supported_authentications & (1 << SSH_PASS_KERBEROS_TGT)) && | 1276 | if ((supported_authentications & (1 << SSH_PASS_KERBEROS_TGT)) && |
1277 | options.kerberos_tgt_passing && context && auth_context) { | 1277 | options.kerberos_tgt_passing && context && auth_context) { |
1278 | if (options.cipher == SSH_CIPHER_NONE) | 1278 | if (options.cipher == SSH_CIPHER_NONE) |
1279 | logit("WARNING: Encryption is disabled! Ticket will be transmitted in the clear!"); | 1279 | log("WARNING: Encryption is disabled! Ticket will be transmitted in the clear!"); |
1280 | send_krb5_tgt(context, auth_context); | 1280 | send_krb5_tgt(context, auth_context); |
1281 | } | 1281 | } |
1282 | if (auth_context) | 1282 | if (auth_context) |
@@ -1290,14 +1290,14 @@ ssh_userauth1(const char *local_user, const char *server_user, char *host, | |||
1290 | if ((supported_authentications & (1 << SSH_PASS_KERBEROS_TGT)) && | 1290 | if ((supported_authentications & (1 << SSH_PASS_KERBEROS_TGT)) && |
1291 | options.kerberos_tgt_passing) { | 1291 | options.kerberos_tgt_passing) { |
1292 | if (options.cipher == SSH_CIPHER_NONE) | 1292 | if (options.cipher == SSH_CIPHER_NONE) |
1293 | logit("WARNING: Encryption is disabled! Ticket will be transmitted in the clear!"); | 1293 | log("WARNING: Encryption is disabled! Ticket will be transmitted in the clear!"); |
1294 | send_krb4_tgt(); | 1294 | send_krb4_tgt(); |
1295 | } | 1295 | } |
1296 | /* Try AFS token passing if the server supports it. */ | 1296 | /* Try AFS token passing if the server supports it. */ |
1297 | if ((supported_authentications & (1 << SSH_PASS_AFS_TOKEN)) && | 1297 | if ((supported_authentications & (1 << SSH_PASS_AFS_TOKEN)) && |
1298 | options.afs_token_passing && k_hasafs()) { | 1298 | options.afs_token_passing && k_hasafs()) { |
1299 | if (options.cipher == SSH_CIPHER_NONE) | 1299 | if (options.cipher == SSH_CIPHER_NONE) |
1300 | logit("WARNING: Encryption is disabled! Token will be transmitted in the clear!"); | 1300 | log("WARNING: Encryption is disabled! Token will be transmitted in the clear!"); |
1301 | send_afs_tokens(); | 1301 | send_afs_tokens(); |
1302 | } | 1302 | } |
1303 | #endif /* AFS */ | 1303 | #endif /* AFS */ |