diff options
author | Colin Watson <cjwatson@debian.org> | 2003-09-01 18:52:37 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2003-09-01 18:52:37 +0000 |
commit | 854156dd39acbde9b4a47ec0fc54a042ea7358e0 (patch) | |
tree | 96755f8590acc2146f4b4ef5b5cdba600e5d9353 /sshconnect2.c | |
parent | fad82e8999e790899083f9e22a1841148d746df6 (diff) | |
parent | 053db7da5ce09acdf742789d9d1a05e81d4861d0 (diff) |
Import OpenSSH 3.6.1p2.
Diffstat (limited to 'sshconnect2.c')
-rw-r--r-- | sshconnect2.c | 17 |
1 files changed, 7 insertions, 10 deletions
diff --git a/sshconnect2.c b/sshconnect2.c index 90b884a39..642b34b9e 100644 --- a/sshconnect2.c +++ b/sshconnect2.c | |||
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: sshconnect2.c,v 1.115 2003/04/02 09:48:07 markus Exp $"); | 26 | RCSID("$OpenBSD: sshconnect2.c,v 1.114 2003/04/01 10:22:21 markus Exp $"); |
27 | 27 | ||
28 | #include "ssh.h" | 28 | #include "ssh.h" |
29 | #include "ssh2.h" | 29 | #include "ssh2.h" |
@@ -82,7 +82,7 @@ ssh_kex2(char *host, struct sockaddr *hostaddr) | |||
82 | xxx_hostaddr = hostaddr; | 82 | xxx_hostaddr = hostaddr; |
83 | 83 | ||
84 | if (options.ciphers == (char *)-1) { | 84 | if (options.ciphers == (char *)-1) { |
85 | logit("No valid ciphers for protocol version 2 given, using defaults."); | 85 | log("No valid ciphers for protocol version 2 given, using defaults."); |
86 | options.ciphers = NULL; | 86 | options.ciphers = NULL; |
87 | } | 87 | } |
88 | if (options.ciphers != NULL) { | 88 | if (options.ciphers != NULL) { |
@@ -108,9 +108,6 @@ ssh_kex2(char *host, struct sockaddr *hostaddr) | |||
108 | myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = | 108 | myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = |
109 | options.hostkeyalgorithms; | 109 | options.hostkeyalgorithms; |
110 | 110 | ||
111 | if (options.rekey_limit) | ||
112 | packet_set_rekey_limit(options.rekey_limit); | ||
113 | |||
114 | /* start key exchange */ | 111 | /* start key exchange */ |
115 | kex = kex_setup(myproposal); | 112 | kex = kex_setup(myproposal); |
116 | kex->kex[KEX_DH_GRP1_SHA1] = kexdh_client; | 113 | kex->kex[KEX_DH_GRP1_SHA1] = kexdh_client; |
@@ -349,7 +346,7 @@ input_userauth_failure(int type, u_int32_t seq, void *ctxt) | |||
349 | packet_check_eom(); | 346 | packet_check_eom(); |
350 | 347 | ||
351 | if (partial != 0) | 348 | if (partial != 0) |
352 | logit("Authenticated with partial success."); | 349 | log("Authenticated with partial success."); |
353 | debug("Authentications that can continue: %s", authlist); | 350 | debug("Authentications that can continue: %s", authlist); |
354 | 351 | ||
355 | clear_auth_state(authctxt); | 352 | clear_auth_state(authctxt); |
@@ -494,7 +491,7 @@ input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt) | |||
494 | info = packet_get_string(NULL); | 491 | info = packet_get_string(NULL); |
495 | lang = packet_get_string(NULL); | 492 | lang = packet_get_string(NULL); |
496 | if (strlen(info) > 0) | 493 | if (strlen(info) > 0) |
497 | logit("%s", info); | 494 | log("%s", info); |
498 | xfree(info); | 495 | xfree(info); |
499 | xfree(lang); | 496 | xfree(lang); |
500 | packet_start(SSH2_MSG_USERAUTH_REQUEST); | 497 | packet_start(SSH2_MSG_USERAUTH_REQUEST); |
@@ -526,7 +523,7 @@ input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt) | |||
526 | if (strcmp(password, retype) != 0) { | 523 | if (strcmp(password, retype) != 0) { |
527 | memset(password, 0, strlen(password)); | 524 | memset(password, 0, strlen(password)); |
528 | xfree(password); | 525 | xfree(password); |
529 | logit("Mismatch; try again, EOF to quit."); | 526 | log("Mismatch; try again, EOF to quit."); |
530 | password = NULL; | 527 | password = NULL; |
531 | } | 528 | } |
532 | memset(retype, 0, strlen(retype)); | 529 | memset(retype, 0, strlen(retype)); |
@@ -865,9 +862,9 @@ input_userauth_info_req(int type, u_int32_t seq, void *ctxt) | |||
865 | inst = packet_get_string(NULL); | 862 | inst = packet_get_string(NULL); |
866 | lang = packet_get_string(NULL); | 863 | lang = packet_get_string(NULL); |
867 | if (strlen(name) > 0) | 864 | if (strlen(name) > 0) |
868 | logit("%s", name); | 865 | log("%s", name); |
869 | if (strlen(inst) > 0) | 866 | if (strlen(inst) > 0) |
870 | logit("%s", inst); | 867 | log("%s", inst); |
871 | xfree(name); | 868 | xfree(name); |
872 | xfree(inst); | 869 | xfree(inst); |
873 | xfree(lang); | 870 | xfree(lang); |