diff options
Diffstat (limited to 'auth1.c')
-rw-r--r-- | auth1.c | 9 |
1 files changed, 5 insertions, 4 deletions
@@ -10,7 +10,7 @@ | |||
10 | */ | 10 | */ |
11 | 11 | ||
12 | #include "includes.h" | 12 | #include "includes.h" |
13 | RCSID("$OpenBSD: auth1.c,v 1.22 2001/03/23 12:02:49 markus Exp $"); | 13 | RCSID("$OpenBSD: auth1.c,v 1.23 2001/05/18 14:13:28 markus Exp $"); |
14 | 14 | ||
15 | #include "xmalloc.h" | 15 | #include "xmalloc.h" |
16 | #include "rsa.h" | 16 | #include "rsa.h" |
@@ -271,12 +271,13 @@ do_authloop(Authctxt *authctxt) | |||
271 | 271 | ||
272 | case SSH_CMSG_AUTH_TIS: | 272 | case SSH_CMSG_AUTH_TIS: |
273 | debug("rcvd SSH_CMSG_AUTH_TIS"); | 273 | debug("rcvd SSH_CMSG_AUTH_TIS"); |
274 | if (options.challenge_reponse_authentication == 1) { | 274 | if (options.challenge_response_authentication == 1) { |
275 | char *challenge = get_challenge(authctxt, authctxt->style); | 275 | char *challenge = get_challenge(authctxt); |
276 | if (challenge != NULL) { | 276 | if (challenge != NULL) { |
277 | debug("sending challenge '%s'", challenge); | 277 | debug("sending challenge '%s'", challenge); |
278 | packet_start(SSH_SMSG_AUTH_TIS_CHALLENGE); | 278 | packet_start(SSH_SMSG_AUTH_TIS_CHALLENGE); |
279 | packet_put_cstring(challenge); | 279 | packet_put_cstring(challenge); |
280 | xfree(challenge); | ||
280 | packet_send(); | 281 | packet_send(); |
281 | packet_write_wait(); | 282 | packet_write_wait(); |
282 | continue; | 283 | continue; |
@@ -285,7 +286,7 @@ do_authloop(Authctxt *authctxt) | |||
285 | break; | 286 | break; |
286 | case SSH_CMSG_AUTH_TIS_RESPONSE: | 287 | case SSH_CMSG_AUTH_TIS_RESPONSE: |
287 | debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE"); | 288 | debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE"); |
288 | if (options.challenge_reponse_authentication == 1) { | 289 | if (options.challenge_response_authentication == 1) { |
289 | char *response = packet_get_string(&dlen); | 290 | char *response = packet_get_string(&dlen); |
290 | debug("got response '%s'", response); | 291 | debug("got response '%s'", response); |
291 | packet_integrity_check(plen, 4 + dlen, type); | 292 | packet_integrity_check(plen, 4 + dlen, type); |