diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2002-06-21 00:06:54 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2002-06-21 00:06:54 +0000 |
commit | c90f8a98eaffccb8248111206416e1c9ed206da9 (patch) | |
tree | d0c1308647efc5c130f5dbefaf520c98b1f0c591 /authfd.c | |
parent | 4eb4c4e1ef39906056e282d6e160350dcd3fa533 (diff) |
- markus@cvs.openbsd.org 2002/06/15 00:07:38
[authfd.c authfd.h ssh-add.c ssh-agent.c]
fix stupid typo
Diffstat (limited to 'authfd.c')
-rw-r--r-- | authfd.c | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -35,7 +35,7 @@ | |||
35 | */ | 35 | */ |
36 | 36 | ||
37 | #include "includes.h" | 37 | #include "includes.h" |
38 | RCSID("$OpenBSD: authfd.c,v 1.52 2002/06/15 00:01:36 markus Exp $"); | 38 | RCSID("$OpenBSD: authfd.c,v 1.53 2002/06/15 00:07:38 markus Exp $"); |
39 | 39 | ||
40 | #include <openssl/evp.h> | 40 | #include <openssl/evp.h> |
41 | 41 | ||
@@ -552,7 +552,7 @@ ssh_remove_identity(AuthenticationConnection *auth, Key *key) | |||
552 | } | 552 | } |
553 | 553 | ||
554 | int | 554 | int |
555 | ssh_contrain_identity(AuthenticationConnection *auth, Key *key, u_int life) | 555 | ssh_constrain_identity(AuthenticationConnection *auth, Key *key, u_int life) |
556 | { | 556 | { |
557 | Buffer msg; | 557 | Buffer msg; |
558 | int type; | 558 | int type; |
@@ -562,20 +562,20 @@ ssh_contrain_identity(AuthenticationConnection *auth, Key *key, u_int life) | |||
562 | buffer_init(&msg); | 562 | buffer_init(&msg); |
563 | 563 | ||
564 | if (key->type == KEY_RSA1) { | 564 | if (key->type == KEY_RSA1) { |
565 | buffer_put_char(&msg, SSH_AGENTC_CONTRAIN_IDENTITY1); | 565 | buffer_put_char(&msg, SSH_AGENTC_CONSTRAIN_IDENTITY1); |
566 | buffer_put_int(&msg, BN_num_bits(key->rsa->n)); | 566 | buffer_put_int(&msg, BN_num_bits(key->rsa->n)); |
567 | buffer_put_bignum(&msg, key->rsa->e); | 567 | buffer_put_bignum(&msg, key->rsa->e); |
568 | buffer_put_bignum(&msg, key->rsa->n); | 568 | buffer_put_bignum(&msg, key->rsa->n); |
569 | } else if (key->type == KEY_DSA || key->type == KEY_RSA) { | 569 | } else if (key->type == KEY_DSA || key->type == KEY_RSA) { |
570 | key_to_blob(key, &blob, &blen); | 570 | key_to_blob(key, &blob, &blen); |
571 | buffer_put_char(&msg, SSH_AGENTC_CONTRAIN_IDENTITY); | 571 | buffer_put_char(&msg, SSH_AGENTC_CONSTRAIN_IDENTITY); |
572 | buffer_put_string(&msg, blob, blen); | 572 | buffer_put_string(&msg, blob, blen); |
573 | xfree(blob); | 573 | xfree(blob); |
574 | } else { | 574 | } else { |
575 | buffer_free(&msg); | 575 | buffer_free(&msg); |
576 | return 0; | 576 | return 0; |
577 | } | 577 | } |
578 | buffer_put_char(&msg, SSH_AGENT_CONTRAIN_LIFETIME); | 578 | buffer_put_char(&msg, SSH_AGENT_CONSTRAIN_LIFETIME); |
579 | buffer_put_int(&msg, life); | 579 | buffer_put_int(&msg, life); |
580 | 580 | ||
581 | if (ssh_request_reply(auth, &msg, &msg) == 0) { | 581 | if (ssh_request_reply(auth, &msg, &msg) == 0) { |