summaryrefslogtreecommitdiff
path: root/sshconnect1.c
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2003-09-01 18:52:37 +0000
committerColin Watson <cjwatson@debian.org>2003-09-01 18:52:37 +0000
commit854156dd39acbde9b4a47ec0fc54a042ea7358e0 (patch)
tree96755f8590acc2146f4b4ef5b5cdba600e5d9353 /sshconnect1.c
parentfad82e8999e790899083f9e22a1841148d746df6 (diff)
parent053db7da5ce09acdf742789d9d1a05e81d4861d0 (diff)
Import OpenSSH 3.6.1p2.
Diffstat (limited to 'sshconnect1.c')
-rw-r--r--sshconnect1.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/sshconnect1.c b/sshconnect1.c
index 491b4f67d..2fc9a981a 100644
--- a/sshconnect1.c
+++ b/sshconnect1.c
@@ -122,7 +122,7 @@ try_agent_authentication(void)
122 * although it advertised it supports this. Just 122 * although it advertised it supports this. Just
123 * return a wrong value. 123 * return a wrong value.
124 */ 124 */
125 logit("Authentication agent failed to decrypt challenge."); 125 log("Authentication agent failed to decrypt challenge.");
126 memset(response, 0, sizeof(response)); 126 memset(response, 0, sizeof(response));
127 } 127 }
128 key_free(key); 128 key_free(key);
@@ -890,7 +890,7 @@ try_challenge_response_authentication(void)
890 if (i != 0) 890 if (i != 0)
891 error("Permission denied, please try again."); 891 error("Permission denied, please try again.");
892 if (options.cipher == SSH_CIPHER_NONE) 892 if (options.cipher == SSH_CIPHER_NONE)
893 logit("WARNING: Encryption is disabled! " 893 log("WARNING: Encryption is disabled! "
894 "Response will be transmitted in clear text."); 894 "Response will be transmitted in clear text.");
895 response = read_passphrase(prompt, 0); 895 response = read_passphrase(prompt, 0);
896 if (strcmp(response, "") == 0) { 896 if (strcmp(response, "") == 0) {
@@ -925,7 +925,7 @@ try_password_authentication(char *prompt)
925 925
926 debug("Doing password authentication."); 926 debug("Doing password authentication.");
927 if (options.cipher == SSH_CIPHER_NONE) 927 if (options.cipher == SSH_CIPHER_NONE)
928 logit("WARNING: Encryption is disabled! Password will be transmitted in clear text."); 928 log("WARNING: Encryption is disabled! Password will be transmitted in clear text.");
929 for (i = 0; i < options.number_of_password_prompts; i++) { 929 for (i = 0; i < options.number_of_password_prompts; i++) {
930 if (i != 0) 930 if (i != 0)
931 error("Permission denied, please try again."); 931 error("Permission denied, please try again.");
@@ -981,9 +981,9 @@ ssh_kex(char *host, struct sockaddr *hostaddr)
981 981
982 rbits = BN_num_bits(server_key->rsa->n); 982 rbits = BN_num_bits(server_key->rsa->n);
983 if (bits != rbits) { 983 if (bits != rbits) {
984 logit("Warning: Server lies about size of server public key: " 984 log("Warning: Server lies about size of server public key: "
985 "actual size is %d bits vs. announced %d.", rbits, bits); 985 "actual size is %d bits vs. announced %d.", rbits, bits);
986 logit("Warning: This may be due to an old implementation of ssh."); 986 log("Warning: This may be due to an old implementation of ssh.");
987 } 987 }
988 /* Get the host key. */ 988 /* Get the host key. */
989 host_key = key_new(KEY_RSA1); 989 host_key = key_new(KEY_RSA1);
@@ -993,9 +993,9 @@ ssh_kex(char *host, struct sockaddr *hostaddr)
993 993
994 rbits = BN_num_bits(host_key->rsa->n); 994 rbits = BN_num_bits(host_key->rsa->n);
995 if (bits != rbits) { 995 if (bits != rbits) {
996 logit("Warning: Server lies about size of server host key: " 996 log("Warning: Server lies about size of server host key: "
997 "actual size is %d bits vs. announced %d.", rbits, bits); 997 "actual size is %d bits vs. announced %d.", rbits, bits);
998 logit("Warning: This may be due to an old implementation of ssh."); 998 log("Warning: This may be due to an old implementation of ssh.");
999 } 999 }
1000 1000
1001 /* Get protocol flags. */ 1001 /* Get protocol flags. */
@@ -1086,7 +1086,7 @@ ssh_kex(char *host, struct sockaddr *hostaddr)
1086 options.cipher = ssh_cipher_default; 1086 options.cipher = ssh_cipher_default;
1087 } else if (options.cipher == SSH_CIPHER_ILLEGAL || 1087 } else if (options.cipher == SSH_CIPHER_ILLEGAL ||
1088 !(cipher_mask_ssh1(1) & (1 << options.cipher))) { 1088 !(cipher_mask_ssh1(1) & (1 << options.cipher))) {
1089 logit("No valid SSH1 cipher, using %.100s instead.", 1089 log("No valid SSH1 cipher, using %.100s instead.",
1090 cipher_name(ssh_cipher_default)); 1090 cipher_name(ssh_cipher_default));
1091 options.cipher = ssh_cipher_default; 1091 options.cipher = ssh_cipher_default;
1092 } 1092 }
@@ -1276,7 +1276,7 @@ ssh_userauth1(const char *local_user, const char *server_user, char *host,
1276 if ((supported_authentications & (1 << SSH_PASS_KERBEROS_TGT)) && 1276 if ((supported_authentications & (1 << SSH_PASS_KERBEROS_TGT)) &&
1277 options.kerberos_tgt_passing && context && auth_context) { 1277 options.kerberos_tgt_passing && context && auth_context) {
1278 if (options.cipher == SSH_CIPHER_NONE) 1278 if (options.cipher == SSH_CIPHER_NONE)
1279 logit("WARNING: Encryption is disabled! Ticket will be transmitted in the clear!"); 1279 log("WARNING: Encryption is disabled! Ticket will be transmitted in the clear!");
1280 send_krb5_tgt(context, auth_context); 1280 send_krb5_tgt(context, auth_context);
1281 } 1281 }
1282 if (auth_context) 1282 if (auth_context)
@@ -1290,14 +1290,14 @@ ssh_userauth1(const char *local_user, const char *server_user, char *host,
1290 if ((supported_authentications & (1 << SSH_PASS_KERBEROS_TGT)) && 1290 if ((supported_authentications & (1 << SSH_PASS_KERBEROS_TGT)) &&
1291 options.kerberos_tgt_passing) { 1291 options.kerberos_tgt_passing) {
1292 if (options.cipher == SSH_CIPHER_NONE) 1292 if (options.cipher == SSH_CIPHER_NONE)
1293 logit("WARNING: Encryption is disabled! Ticket will be transmitted in the clear!"); 1293 log("WARNING: Encryption is disabled! Ticket will be transmitted in the clear!");
1294 send_krb4_tgt(); 1294 send_krb4_tgt();
1295 } 1295 }
1296 /* Try AFS token passing if the server supports it. */ 1296 /* Try AFS token passing if the server supports it. */
1297 if ((supported_authentications & (1 << SSH_PASS_AFS_TOKEN)) && 1297 if ((supported_authentications & (1 << SSH_PASS_AFS_TOKEN)) &&
1298 options.afs_token_passing && k_hasafs()) { 1298 options.afs_token_passing && k_hasafs()) {
1299 if (options.cipher == SSH_CIPHER_NONE) 1299 if (options.cipher == SSH_CIPHER_NONE)
1300 logit("WARNING: Encryption is disabled! Token will be transmitted in the clear!"); 1300 log("WARNING: Encryption is disabled! Token will be transmitted in the clear!");
1301 send_afs_tokens(); 1301 send_afs_tokens();
1302 } 1302 }
1303#endif /* AFS */ 1303#endif /* AFS */