summaryrefslogtreecommitdiff
path: root/sshconnect2.c
diff options
context:
space:
mode:
Diffstat (limited to 'sshconnect2.c')
-rw-r--r--sshconnect2.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/sshconnect2.c b/sshconnect2.c
index 6950c5ee6..7f28ab51e 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -23,7 +23,7 @@
23 */ 23 */
24 24
25#include "includes.h" 25#include "includes.h"
26RCSID("$OpenBSD: sshconnect2.c,v 1.103 2002/05/31 10:30:33 markus Exp $"); 26RCSID("$OpenBSD: sshconnect2.c,v 1.104 2002/06/19 00:27:55 deraadt Exp $");
27 27
28#include "ssh.h" 28#include "ssh.h"
29#include "ssh2.h" 29#include "ssh2.h"
@@ -395,7 +395,7 @@ input_userauth_pk_ok(int type, u_int32_t seq, void *ctxt)
395 if (key->type != pktype) { 395 if (key->type != pktype) {
396 error("input_userauth_pk_ok: type mismatch " 396 error("input_userauth_pk_ok: type mismatch "
397 "for decoded key (received %d, expected %d)", 397 "for decoded key (received %d, expected %d)",
398 key->type, pktype); 398 key->type, pktype);
399 break; 399 break;
400 } 400 }
401 fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX); 401 fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX);
@@ -463,7 +463,7 @@ userauth_passwd(Authctxt *authctxt)
463 packet_add_padding(64); 463 packet_add_padding(64);
464 packet_send(); 464 packet_send();
465 465
466 dispatch_set(SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ, 466 dispatch_set(SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ,
467 &input_userauth_passwd_changereq); 467 &input_userauth_passwd_changereq);
468 468
469 return 1; 469 return 1;
@@ -495,7 +495,7 @@ input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt)
495 packet_put_cstring(authctxt->service); 495 packet_put_cstring(authctxt->service);
496 packet_put_cstring(authctxt->method->name); 496 packet_put_cstring(authctxt->method->name);
497 packet_put_char(1); /* additional info */ 497 packet_put_char(1); /* additional info */
498 snprintf(prompt, sizeof(prompt), 498 snprintf(prompt, sizeof(prompt),
499 "Enter %.30s@%.128s's old password: ", 499 "Enter %.30s@%.128s's old password: ",
500 authctxt->server_user, authctxt->host); 500 authctxt->server_user, authctxt->host);
501 password = read_passphrase(prompt, 0); 501 password = read_passphrase(prompt, 0);
@@ -504,7 +504,7 @@ input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt)
504 xfree(password); 504 xfree(password);
505 password = NULL; 505 password = NULL;
506 while (password == NULL) { 506 while (password == NULL) {
507 snprintf(prompt, sizeof(prompt), 507 snprintf(prompt, sizeof(prompt),
508 "Enter %.30s@%.128s's new password: ", 508 "Enter %.30s@%.128s's new password: ",
509 authctxt->server_user, authctxt->host); 509 authctxt->server_user, authctxt->host);
510 password = read_passphrase(prompt, RP_ALLOW_EOF); 510 password = read_passphrase(prompt, RP_ALLOW_EOF);
@@ -512,7 +512,7 @@ input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt)
512 /* bail out */ 512 /* bail out */
513 return; 513 return;
514 } 514 }
515 snprintf(prompt, sizeof(prompt), 515 snprintf(prompt, sizeof(prompt),
516 "Retype %.30s@%.128s's new password: ", 516 "Retype %.30s@%.128s's new password: ",
517 authctxt->server_user, authctxt->host); 517 authctxt->server_user, authctxt->host);
518 retype = read_passphrase(prompt, 0); 518 retype = read_passphrase(prompt, 0);
@@ -530,8 +530,8 @@ input_userauth_passwd_changereq(int type, u_int32_t seqnr, void *ctxt)
530 xfree(password); 530 xfree(password);
531 packet_add_padding(64); 531 packet_add_padding(64);
532 packet_send(); 532 packet_send();
533 533
534 dispatch_set(SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ, 534 dispatch_set(SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ,
535 &input_userauth_passwd_changereq); 535 &input_userauth_passwd_changereq);
536} 536}
537 537