Home | History | Annotate | Download | only in openssh

Lines Matching refs:rsa

34 #include "rsa.h"
86 debug("Trying RSA authentication via agent with '%.100s'", comment);
91 packet_put_bignum(key->rsa->n);
99 does not support RSA authentication. */
107 packet_disconnect("Protocol error during RSA authentication: %d",
113 debug("Received RSA challenge from server.");
126 debug("Sending response to RSA challenge.");
142 debug("RSA authentication accepted by server.");
147 packet_disconnect("Protocol error waiting RSA auth response: %d",
152 debug("RSA authentication using agent refused.");
157 * Computes the proper response to a RSA challenge, and sends the response to
161 respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv)
187 debug("Sending response to host key RSA challenge.");
217 debug("Trying RSA authentication with key '%.100s'", comment);
221 packet_put_bignum(public->rsa->n);
230 * doesn't support RSA authentication.
239 packet_disconnect("Protocol error during RSA authentication: %d", type);
247 debug("Received RSA challenge from server.");
261 "Enter passphrase for RSA key '%.100s': ", comment);
300 respond_to_rsa_challenge(challenge, private->rsa);
312 debug("RSA authentication accepted by server.");
316 packet_disconnect("Protocol error waiting RSA auth response: %d", type);
317 debug("RSA authentication refused.");
323 * authentication and RSA host authentication.
331 debug("Trying rhosts or /etc/hosts.equiv with RSA host authentication.");
336 packet_put_int(BN_num_bits(host_key->rsa->n));
337 packet_put_bignum(host_key->rsa->e);
338 packet_put_bignum(host_key->rsa->n);
353 packet_disconnect("Protocol error during RSA authentication: %d", type);
361 debug("Received RSA challenge for host key from server.");
364 respond_to_rsa_challenge(challenge, host_key->rsa);
372 debug("Rhosts or /etc/hosts.equiv with RSA host authentication accepted by server.");
376 packet_disconnect("Protocol error waiting RSA auth response: %d", type);
377 debug("Rhosts or /etc/hosts.equiv with RSA host authentication refused.");
505 packet_get_bignum(server_key->rsa->e);
506 packet_get_bignum(server_key->rsa->n);
508 rbits = BN_num_bits(server_key->rsa->n);
517 packet_get_bignum(host_key->rsa->e);
518 packet_get_bignum(host_key->rsa->n);
520 rbits = BN_num_bits(host_key->rsa->n);
536 BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n));
543 derive_ssh1_session_id(host_key->rsa->n, server_key->rsa->n, cookie, session_id);
586 if (BN_cmp(server_key->rsa->n, host_key->rsa->n) < 0) {
588 if (BN_num_bits(host_key->rsa->n) <
589 BN_num_bits(server_key->rsa->n) + SSH_KEY_BITS_RESERVED) {
592 BN_num_bits(host_key->rsa->n),
593 BN_num_bits(server_key->rsa->n),
596 rsa_public_encrypt(key, key, server_key->rsa);
597 rsa_public_encrypt(key, key, host_key->rsa);
600 if (BN_num_bits(server_key->rsa->n) <
601 BN_num_bits(host_key->rsa->n) + SSH_KEY_BITS_RESERVED) {
604 BN_num_bits(server_key->rsa->n),
605 BN_num_bits(host_key->rsa->n),
608 rsa_public_encrypt(key, key, host_key->rsa);
609 rsa_public_encrypt(key, key, server_key->rsa);
700 * Try .rhosts or /etc/hosts.equiv authentication with RSA host
713 /* Try RSA authentication if the server supports it. */
717 * Try RSA authentication using the authentication agent. The
724 /* Try RSA authentication for each identity. */