summaryrefslogtreecommitdiff
path: root/sshconnect2.c
diff options
context:
space:
mode:
Diffstat (limited to 'sshconnect2.c')
-rw-r--r--sshconnect2.c17
1 files changed, 7 insertions, 10 deletions
diff --git a/sshconnect2.c b/sshconnect2.c
index 90b884a39..642b34b9e 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -23,7 +23,7 @@
23 */ 23 */
24 24
25#include "includes.h" 25#include "includes.h"
26RCSID("$OpenBSD: sshconnect2.c,v 1.115 2003/04/02 09:48:07 markus Exp $"); 26RCSID("$OpenBSD: sshconnect2.c,v 1.114 2003/04/01 10:22:21 markus Exp $");
27 27
28#include "ssh.h" 28#include "ssh.h"
29#include "ssh2.h" 29#include "ssh2.h"
@@ -82,7 +82,7 @@ ssh_kex2(char *host, struct sockaddr *hostaddr)
82 xxx_hostaddr = hostaddr; 82 xxx_hostaddr = hostaddr;
83 83
84 if (options.ciphers == (char *)-1) { 84 if (options.ciphers == (char *)-1) {
85 logit("No valid ciphers for protocol version 2 given, using defaults."); 85 log("No valid ciphers for protocol version 2 given, using defaults.");
86 options.ciphers = NULL; 86 options.ciphers = NULL;
87 } 87 }
88 if (options.ciphers != NULL) { 88 if (options.ciphers != NULL) {
@@ -108,9 +108,6 @@ ssh_kex2(char *host, struct sockaddr *hostaddr)
108 myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = 108 myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] =
109 options.hostkeyalgorithms; 109 options.hostkeyalgorithms;
110 110
111 if (options.rekey_limit)
112 packet_set_rekey_limit(options.rekey_limit);
113
114 /* start key exchange */ 111 /* start key exchange */
115 kex = kex_setup(myproposal); 112 kex = kex_setup(myproposal);
116 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_client; 113 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_client;
@@ -349,7 +346,7 @@ input_userauth_failure(int type, u_int32_t seq, void *ctxt)
349 packet_check_eom(); 346 packet_check_eom();
350 347
351 if (partial != 0) 348 if (partial != 0)
352 logit("Authenticated with partial success."); 349 log("Authenticated with partial success.");
353 debug("Authentications that can continue: %s", authlist); 350 debug("Authentications that can continue: %s", authlist);
354 351
355 clear_auth_state(authctxt); 352 clear_auth_state(authctxt);
@@ -494,7 +491,7 @@ input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt)
494 info = packet_get_string(NULL); 491 info = packet_get_string(NULL);
495 lang = packet_get_string(NULL); 492 lang = packet_get_string(NULL);
496 if (strlen(info) > 0) 493 if (strlen(info) > 0)
497 logit("%s", info); 494 log("%s", info);
498 xfree(info); 495 xfree(info);
499 xfree(lang); 496 xfree(lang);
500 packet_start(SSH2_MSG_USERAUTH_REQUEST); 497 packet_start(SSH2_MSG_USERAUTH_REQUEST);
@@ -526,7 +523,7 @@ input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt)
526 if (strcmp(password, retype) != 0) { 523 if (strcmp(password, retype) != 0) {
527 memset(password, 0, strlen(password)); 524 memset(password, 0, strlen(password));
528 xfree(password); 525 xfree(password);
529 logit("Mismatch; try again, EOF to quit."); 526 log("Mismatch; try again, EOF to quit.");
530 password = NULL; 527 password = NULL;
531 } 528 }
532 memset(retype, 0, strlen(retype)); 529 memset(retype, 0, strlen(retype));
@@ -865,9 +862,9 @@ input_userauth_info_req(int type, u_int32_t seq, void *ctxt)
865 inst = packet_get_string(NULL); 862 inst = packet_get_string(NULL);
866 lang = packet_get_string(NULL); 863 lang = packet_get_string(NULL);
867 if (strlen(name) > 0) 864 if (strlen(name) > 0)
868 logit("%s", name); 865 log("%s", name);
869 if (strlen(inst) > 0) 866 if (strlen(inst) > 0)
870 logit("%s", inst); 867 log("%s", inst);
871 xfree(name); 868 xfree(name);
872 xfree(inst); 869 xfree(inst);
873 xfree(lang); 870 xfree(lang);