diff options
author | Damien Miller <djm@mindrot.org> | 2001-10-10 15:03:11 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2001-10-10 15:03:11 +1000 |
commit | 59d9fb9e55f2448ec8b0911f05bdb943e8235ed2 (patch) | |
tree | c3cd91bf7853bcdff075ea6f45af6ee5764f0d3b | |
parent | 9c751429176f774bc327c23acb0711e76856e209 (diff) |
- markus@cvs.openbsd.org 2001/10/06 11:18:19
[sshconnect1.c sshconnect2.c sshconnect.c]
unify hostkey check error messages, simplify prompt.
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | sshconnect.c | 8 | ||||
-rw-r--r-- | sshconnect1.c | 4 | ||||
-rw-r--r-- | sshconnect2.c | 4 |
4 files changed, 11 insertions, 10 deletions
@@ -15,6 +15,9 @@ | |||
15 | - markus@cvs.openbsd.org 2001/10/06 00:36:42 | 15 | - markus@cvs.openbsd.org 2001/10/06 00:36:42 |
16 | [session.c] | 16 | [session.c] |
17 | fix typo in error message, sync with do_exec_nopty | 17 | fix typo in error message, sync with do_exec_nopty |
18 | - markus@cvs.openbsd.org 2001/10/06 11:18:19 | ||
19 | [sshconnect1.c sshconnect2.c sshconnect.c] | ||
20 | unify hostkey check error messages, simplify prompt. | ||
18 | 21 | ||
19 | 20011007 | 22 | 20011007 |
20 | - (bal) ssh-copy-id corrected permissions for .ssh/ and authorized_keys. | 23 | - (bal) ssh-copy-id corrected permissions for .ssh/ and authorized_keys. |
@@ -6660,4 +6663,4 @@ | |||
6660 | - Wrote replacements for strlcpy and mkdtemp | 6663 | - Wrote replacements for strlcpy and mkdtemp |
6661 | - Released 1.0pre1 | 6664 | - Released 1.0pre1 |
6662 | 6665 | ||
6663 | $Id: ChangeLog,v 1.1589 2001/10/10 05:02:46 djm Exp $ | 6666 | $Id: ChangeLog,v 1.1590 2001/10/10 05:03:11 djm Exp $ |
diff --git a/sshconnect.c b/sshconnect.c index ed2125230..76b1a2703 100644 --- a/sshconnect.c +++ b/sshconnect.c | |||
@@ -13,7 +13,7 @@ | |||
13 | */ | 13 | */ |
14 | 14 | ||
15 | #include "includes.h" | 15 | #include "includes.h" |
16 | RCSID("$OpenBSD: sshconnect.c,v 1.112 2001/10/06 00:14:50 markus Exp $"); | 16 | RCSID("$OpenBSD: sshconnect.c,v 1.113 2001/10/06 11:18:19 markus Exp $"); |
17 | 17 | ||
18 | #include <openssl/bn.h> | 18 | #include <openssl/bn.h> |
19 | 19 | ||
@@ -506,8 +506,8 @@ confirm(const char *prompt) | |||
506 | if (f == NULL) | 506 | if (f == NULL) |
507 | return 0; | 507 | return 0; |
508 | fflush(stdout); | 508 | fflush(stdout); |
509 | fprintf(stderr, "%s", prompt); | ||
509 | while (1) { | 510 | while (1) { |
510 | fprintf(stderr, "%s", prompt); | ||
511 | if (fgets(buf, sizeof(buf), f) == NULL) { | 511 | if (fgets(buf, sizeof(buf), f) == NULL) { |
512 | fprintf(stderr, "\n"); | 512 | fprintf(stderr, "\n"); |
513 | strlcpy(buf, "no", sizeof buf); | 513 | strlcpy(buf, "no", sizeof buf); |
@@ -520,7 +520,7 @@ confirm(const char *prompt) | |||
520 | else if (strcmp(buf, "no") == 0) | 520 | else if (strcmp(buf, "no") == 0) |
521 | retval = 0; | 521 | retval = 0; |
522 | else | 522 | else |
523 | fprintf(stderr, "Please type 'yes' or 'no'.\n"); | 523 | fprintf(stderr, "Please type 'yes' or 'no': "); |
524 | 524 | ||
525 | if (retval != -1) { | 525 | if (retval != -1) { |
526 | if (f != stdin) | 526 | if (f != stdin) |
@@ -703,7 +703,6 @@ check_host_key(char *host, struct sockaddr *hostaddr, Key *host_key, | |||
703 | "(yes/no)? ", host, ip, type, fp); | 703 | "(yes/no)? ", host, ip, type, fp); |
704 | xfree(fp); | 704 | xfree(fp); |
705 | if (!confirm(prompt)) { | 705 | if (!confirm(prompt)) { |
706 | log("Aborted by user!"); | ||
707 | goto fail; | 706 | goto fail; |
708 | } | 707 | } |
709 | } | 708 | } |
@@ -821,7 +820,6 @@ check_host_key(char *host, struct sockaddr *hostaddr, Key *host_key, | |||
821 | } else if (options.strict_host_key_checking == 2) { | 820 | } else if (options.strict_host_key_checking == 2) { |
822 | if (!confirm("Are you sure you want " | 821 | if (!confirm("Are you sure you want " |
823 | "to continue connecting (yes/no)? ")) { | 822 | "to continue connecting (yes/no)? ")) { |
824 | log("Aborted by user!"); | ||
825 | goto fail; | 823 | goto fail; |
826 | } | 824 | } |
827 | } | 825 | } |
diff --git a/sshconnect1.c b/sshconnect1.c index 05cd9f6d6..d6b862352 100644 --- a/sshconnect1.c +++ b/sshconnect1.c | |||
@@ -13,7 +13,7 @@ | |||
13 | */ | 13 | */ |
14 | 14 | ||
15 | #include "includes.h" | 15 | #include "includes.h" |
16 | RCSID("$OpenBSD: sshconnect1.c,v 1.40 2001/09/27 15:31:17 markus Exp $"); | 16 | RCSID("$OpenBSD: sshconnect1.c,v 1.41 2001/10/06 11:18:19 markus Exp $"); |
17 | 17 | ||
18 | #include <openssl/bn.h> | 18 | #include <openssl/bn.h> |
19 | #include <openssl/evp.h> | 19 | #include <openssl/evp.h> |
@@ -982,7 +982,7 @@ ssh_kex(char *host, struct sockaddr *hostaddr) | |||
982 | k.type = KEY_RSA1; | 982 | k.type = KEY_RSA1; |
983 | k.rsa = host_key; | 983 | k.rsa = host_key; |
984 | if (verify_host_key(host, hostaddr, &k) == -1) | 984 | if (verify_host_key(host, hostaddr, &k) == -1) |
985 | fatal("host_key verification failed"); | 985 | fatal("Host key verification failed."); |
986 | 986 | ||
987 | client_flags = SSH_PROTOFLAG_SCREEN_NUMBER | SSH_PROTOFLAG_HOST_IN_FWD_OPEN; | 987 | client_flags = SSH_PROTOFLAG_SCREEN_NUMBER | SSH_PROTOFLAG_HOST_IN_FWD_OPEN; |
988 | 988 | ||
diff --git a/sshconnect2.c b/sshconnect2.c index a7beb3600..705aa4561 100644 --- a/sshconnect2.c +++ b/sshconnect2.c | |||
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: sshconnect2.c,v 1.82 2001/08/31 11:46:39 markus Exp $"); | 26 | RCSID("$OpenBSD: sshconnect2.c,v 1.83 2001/10/06 11:18:19 markus Exp $"); |
27 | 27 | ||
28 | #include <openssl/bn.h> | 28 | #include <openssl/bn.h> |
29 | #include <openssl/md5.h> | 29 | #include <openssl/md5.h> |
@@ -75,7 +75,7 @@ static int | |||
75 | verify_host_key_callback(Key *hostkey) | 75 | verify_host_key_callback(Key *hostkey) |
76 | { | 76 | { |
77 | if (verify_host_key(xxx_host, xxx_hostaddr, hostkey) == -1) | 77 | if (verify_host_key(xxx_host, xxx_hostaddr, hostkey) == -1) |
78 | fatal("verify_host_key failed"); | 78 | fatal("Host key verification failed."); |
79 | return 0; | 79 | return 0; |
80 | } | 80 | } |
81 | 81 | ||