summaryrefslogtreecommitdiff
path: root/sshconnect1.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-01-23 03:12:10 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-01-23 03:12:10 +0000
commit95fb2dde7777c6afbffd80eba79a88811db55290 (patch)
treea008785c01c2bb513cc0c76bf1ac28f36cd9d9c9 /sshconnect1.c
parentb1985f727950dbb3d5c7de863ae0e2181ace53f8 (diff)
- markus@cvs.openbsd.org 2001/01/22 23:06:39
[auth1.c auth2.c readconf.c readconf.h servconf.c servconf.h sshconnect1.c sshconnect2.c sshd.c] rename skey -> challenge response. auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled.
Diffstat (limited to 'sshconnect1.c')
-rw-r--r--sshconnect1.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/sshconnect1.c b/sshconnect1.c
index 2c097256a..5a5a22227 100644
--- a/sshconnect1.c
+++ b/sshconnect1.c
@@ -13,7 +13,7 @@
13 */ 13 */
14 14
15#include "includes.h" 15#include "includes.h"
16RCSID("$OpenBSD: sshconnect1.c,v 1.19 2001/01/22 08:15:00 markus Exp $"); 16RCSID("$OpenBSD: sshconnect1.c,v 1.20 2001/01/22 23:06:40 markus Exp $");
17 17
18#include <openssl/bn.h> 18#include <openssl/bn.h>
19#include <openssl/evp.h> 19#include <openssl/evp.h>
@@ -613,7 +613,7 @@ send_afs_tokens(void)
613 * Note that the client code is not tied to s/key or TIS. 613 * Note that the client code is not tied to s/key or TIS.
614 */ 614 */
615int 615int
616try_skey_authentication() 616try_challenge_reponse_authentication()
617{ 617{
618 int type, i; 618 int type, i;
619 int payload_len; 619 int payload_len;
@@ -621,7 +621,7 @@ try_skey_authentication()
621 char prompt[1024]; 621 char prompt[1024];
622 char *challenge, *response; 622 char *challenge, *response;
623 623
624 debug("Doing skey authentication."); 624 debug("Doing challenge reponse authentication.");
625 625
626 for (i = 0; i < options.number_of_password_prompts; i++) { 626 for (i = 0; i < options.number_of_password_prompts; i++) {
627 /* request a challenge */ 627 /* request a challenge */
@@ -633,10 +633,10 @@ try_skey_authentication()
633 if (type != SSH_SMSG_FAILURE && 633 if (type != SSH_SMSG_FAILURE &&
634 type != SSH_SMSG_AUTH_TIS_CHALLENGE) { 634 type != SSH_SMSG_AUTH_TIS_CHALLENGE) {
635 packet_disconnect("Protocol error: got %d in response " 635 packet_disconnect("Protocol error: got %d in response "
636 "to skey-auth", type); 636 "to SSH_CMSG_AUTH_TIS", type);
637 } 637 }
638 if (type != SSH_SMSG_AUTH_TIS_CHALLENGE) { 638 if (type != SSH_SMSG_AUTH_TIS_CHALLENGE) {
639 debug("No challenge for skey authentication."); 639 debug("No challenge.");
640 return 0; 640 return 0;
641 } 641 }
642 challenge = packet_get_string(&clen); 642 challenge = packet_get_string(&clen);
@@ -665,7 +665,7 @@ try_skey_authentication()
665 return 1; 665 return 1;
666 if (type != SSH_SMSG_FAILURE) 666 if (type != SSH_SMSG_FAILURE)
667 packet_disconnect("Protocol error: got %d in response " 667 packet_disconnect("Protocol error: got %d in response "
668 "to skey-auth-reponse", type); 668 "to SSH_CMSG_AUTH_TIS_RESPONSE", type);
669 } 669 }
670 /* failure */ 670 /* failure */
671 return 0; 671 return 0;
@@ -1018,10 +1018,10 @@ ssh_userauth(
1018 try_rsa_authentication(options.identity_files[i])) 1018 try_rsa_authentication(options.identity_files[i]))
1019 return; 1019 return;
1020 } 1020 }
1021 /* Try skey authentication if the server supports it. */ 1021 /* Try challenge response authentication if the server supports it. */
1022 if ((supported_authentications & (1 << SSH_AUTH_TIS)) && 1022 if ((supported_authentications & (1 << SSH_AUTH_TIS)) &&
1023 options.skey_authentication && !options.batch_mode) { 1023 options.challenge_reponse_authentication && !options.batch_mode) {
1024 if (try_skey_authentication()) 1024 if (try_challenge_reponse_authentication())
1025 return; 1025 return;
1026 } 1026 }
1027 /* Try password authentication if the server supports it. */ 1027 /* Try password authentication if the server supports it. */