diff options
author | Damien Miller <djm@mindrot.org> | 2014-07-02 15:30:00 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2014-07-02 15:30:00 +1000 |
commit | ec3d0e24a1e46873d80507f5cd8ee6d0d03ac5dc (patch) | |
tree | 5eb95fa447f34ca06e3426e5f7bd6d3134583189 /ssh-add.c | |
parent | 4b3ed647d5b328cf68e6a8ffbee490d8e0683e82 (diff) |
- markus@cvs.openbsd.org 2014/06/27 18:50:39
[ssh-add.c]
fix loading of private keys
Diffstat (limited to 'ssh-add.c')
-rw-r--r-- | ssh-add.c | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-add.c,v 1.110 2014/06/24 01:13:21 djm Exp $ */ | 1 | /* $OpenBSD: ssh-add.c,v 1.111 2014/06/27 18:50:39 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -202,14 +202,14 @@ add_file(AuthenticationConnection *ac, const char *filename, int key_only) | |||
202 | close(fd); | 202 | close(fd); |
203 | 203 | ||
204 | /* At first, try empty passphrase */ | 204 | /* At first, try empty passphrase */ |
205 | if ((r = sshkey_parse_private_fileblob(&keyblob, filename, "", | 205 | if ((r = sshkey_parse_private_fileblob(&keyblob, "", filename, |
206 | &private, &comment)) != 0 && r != SSH_ERR_KEY_WRONG_PASSPHRASE) | 206 | &private, &comment)) != 0 && r != SSH_ERR_KEY_WRONG_PASSPHRASE) |
207 | fatal("Cannot parse %s: %s", filename, ssh_err(r)); | 207 | fatal("Cannot parse %s: %s", filename, ssh_err(r)); |
208 | if (comment == NULL) | 208 | if (comment == NULL) |
209 | comment = xstrdup(filename); | 209 | comment = xstrdup(filename); |
210 | /* try last */ | 210 | /* try last */ |
211 | if (private == NULL && pass != NULL) { | 211 | if (private == NULL && pass != NULL) { |
212 | if ((r = sshkey_parse_private_fileblob(&keyblob, filename, pass, | 212 | if ((r = sshkey_parse_private_fileblob(&keyblob, pass, filename, |
213 | &private, &comment)) != 0 && | 213 | &private, &comment)) != 0 && |
214 | r != SSH_ERR_KEY_WRONG_PASSPHRASE) | 214 | r != SSH_ERR_KEY_WRONG_PASSPHRASE) |
215 | fatal("Cannot parse %s: %s", filename, ssh_err(r)); | 215 | fatal("Cannot parse %s: %s", filename, ssh_err(r)); |
@@ -228,7 +228,7 @@ add_file(AuthenticationConnection *ac, const char *filename, int key_only) | |||
228 | return -1; | 228 | return -1; |
229 | } | 229 | } |
230 | if ((r = sshkey_parse_private_fileblob(&keyblob, | 230 | if ((r = sshkey_parse_private_fileblob(&keyblob, |
231 | filename, pass, &private, &comment)) != 0 && | 231 | pass, filename, &private, NULL)) != 0 && |
232 | r != SSH_ERR_KEY_WRONG_PASSPHRASE) | 232 | r != SSH_ERR_KEY_WRONG_PASSPHRASE) |
233 | fatal("Cannot parse %s: %s", | 233 | fatal("Cannot parse %s: %s", |
234 | filename, ssh_err(r)); | 234 | filename, ssh_err(r)); |