diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-01-23 03:12:10 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-01-23 03:12:10 +0000 |
commit | 95fb2dde7777c6afbffd80eba79a88811db55290 (patch) | |
tree | a008785c01c2bb513cc0c76bf1ac28f36cd9d9c9 /sshconnect1.c | |
parent | b1985f727950dbb3d5c7de863ae0e2181ace53f8 (diff) |
- markus@cvs.openbsd.org 2001/01/22 23:06:39
[auth1.c auth2.c readconf.c readconf.h servconf.c servconf.h
sshconnect1.c sshconnect2.c sshd.c]
rename skey -> challenge response.
auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled.
Diffstat (limited to 'sshconnect1.c')
-rw-r--r-- | sshconnect1.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/sshconnect1.c b/sshconnect1.c index 2c097256a..5a5a22227 100644 --- a/sshconnect1.c +++ b/sshconnect1.c | |||
@@ -13,7 +13,7 @@ | |||
13 | */ | 13 | */ |
14 | 14 | ||
15 | #include "includes.h" | 15 | #include "includes.h" |
16 | RCSID("$OpenBSD: sshconnect1.c,v 1.19 2001/01/22 08:15:00 markus Exp $"); | 16 | RCSID("$OpenBSD: sshconnect1.c,v 1.20 2001/01/22 23:06:40 markus Exp $"); |
17 | 17 | ||
18 | #include <openssl/bn.h> | 18 | #include <openssl/bn.h> |
19 | #include <openssl/evp.h> | 19 | #include <openssl/evp.h> |
@@ -613,7 +613,7 @@ send_afs_tokens(void) | |||
613 | * Note that the client code is not tied to s/key or TIS. | 613 | * Note that the client code is not tied to s/key or TIS. |
614 | */ | 614 | */ |
615 | int | 615 | int |
616 | try_skey_authentication() | 616 | try_challenge_reponse_authentication() |
617 | { | 617 | { |
618 | int type, i; | 618 | int type, i; |
619 | int payload_len; | 619 | int payload_len; |
@@ -621,7 +621,7 @@ try_skey_authentication() | |||
621 | char prompt[1024]; | 621 | char prompt[1024]; |
622 | char *challenge, *response; | 622 | char *challenge, *response; |
623 | 623 | ||
624 | debug("Doing skey authentication."); | 624 | debug("Doing challenge reponse authentication."); |
625 | 625 | ||
626 | for (i = 0; i < options.number_of_password_prompts; i++) { | 626 | for (i = 0; i < options.number_of_password_prompts; i++) { |
627 | /* request a challenge */ | 627 | /* request a challenge */ |
@@ -633,10 +633,10 @@ try_skey_authentication() | |||
633 | if (type != SSH_SMSG_FAILURE && | 633 | if (type != SSH_SMSG_FAILURE && |
634 | type != SSH_SMSG_AUTH_TIS_CHALLENGE) { | 634 | type != SSH_SMSG_AUTH_TIS_CHALLENGE) { |
635 | packet_disconnect("Protocol error: got %d in response " | 635 | packet_disconnect("Protocol error: got %d in response " |
636 | "to skey-auth", type); | 636 | "to SSH_CMSG_AUTH_TIS", type); |
637 | } | 637 | } |
638 | if (type != SSH_SMSG_AUTH_TIS_CHALLENGE) { | 638 | if (type != SSH_SMSG_AUTH_TIS_CHALLENGE) { |
639 | debug("No challenge for skey authentication."); | 639 | debug("No challenge."); |
640 | return 0; | 640 | return 0; |
641 | } | 641 | } |
642 | challenge = packet_get_string(&clen); | 642 | challenge = packet_get_string(&clen); |
@@ -665,7 +665,7 @@ try_skey_authentication() | |||
665 | return 1; | 665 | return 1; |
666 | if (type != SSH_SMSG_FAILURE) | 666 | if (type != SSH_SMSG_FAILURE) |
667 | packet_disconnect("Protocol error: got %d in response " | 667 | packet_disconnect("Protocol error: got %d in response " |
668 | "to skey-auth-reponse", type); | 668 | "to SSH_CMSG_AUTH_TIS_RESPONSE", type); |
669 | } | 669 | } |
670 | /* failure */ | 670 | /* failure */ |
671 | return 0; | 671 | return 0; |
@@ -1018,10 +1018,10 @@ ssh_userauth( | |||
1018 | try_rsa_authentication(options.identity_files[i])) | 1018 | try_rsa_authentication(options.identity_files[i])) |
1019 | return; | 1019 | return; |
1020 | } | 1020 | } |
1021 | /* Try skey authentication if the server supports it. */ | 1021 | /* Try challenge response authentication if the server supports it. */ |
1022 | if ((supported_authentications & (1 << SSH_AUTH_TIS)) && | 1022 | if ((supported_authentications & (1 << SSH_AUTH_TIS)) && |
1023 | options.skey_authentication && !options.batch_mode) { | 1023 | options.challenge_reponse_authentication && !options.batch_mode) { |
1024 | if (try_skey_authentication()) | 1024 | if (try_challenge_reponse_authentication()) |
1025 | return; | 1025 | return; |
1026 | } | 1026 | } |
1027 | /* Try password authentication if the server supports it. */ | 1027 | /* Try password authentication if the server supports it. */ |