summaryrefslogtreecommitdiff
path: root/ssh-add.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2014-07-02 15:30:00 +1000
committerDamien Miller <djm@mindrot.org>2014-07-02 15:30:00 +1000
commitec3d0e24a1e46873d80507f5cd8ee6d0d03ac5dc (patch)
tree5eb95fa447f34ca06e3426e5f7bd6d3134583189 /ssh-add.c
parent4b3ed647d5b328cf68e6a8ffbee490d8e0683e82 (diff)
- markus@cvs.openbsd.org 2014/06/27 18:50:39
[ssh-add.c] fix loading of private keys
Diffstat (limited to 'ssh-add.c')
-rw-r--r--ssh-add.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/ssh-add.c b/ssh-add.c
index 46b91cbde..07558ae52 100644
--- a/ssh-add.c
+++ b/ssh-add.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssh-add.c,v 1.110 2014/06/24 01:13:21 djm Exp $ */ 1/* $OpenBSD: ssh-add.c,v 1.111 2014/06/27 18:50:39 markus Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -202,14 +202,14 @@ add_file(AuthenticationConnection *ac, const char *filename, int key_only)
202 close(fd); 202 close(fd);
203 203
204 /* At first, try empty passphrase */ 204 /* At first, try empty passphrase */
205 if ((r = sshkey_parse_private_fileblob(&keyblob, filename, "", 205 if ((r = sshkey_parse_private_fileblob(&keyblob, "", filename,
206 &private, &comment)) != 0 && r != SSH_ERR_KEY_WRONG_PASSPHRASE) 206 &private, &comment)) != 0 && r != SSH_ERR_KEY_WRONG_PASSPHRASE)
207 fatal("Cannot parse %s: %s", filename, ssh_err(r)); 207 fatal("Cannot parse %s: %s", filename, ssh_err(r));
208 if (comment == NULL) 208 if (comment == NULL)
209 comment = xstrdup(filename); 209 comment = xstrdup(filename);
210 /* try last */ 210 /* try last */
211 if (private == NULL && pass != NULL) { 211 if (private == NULL && pass != NULL) {
212 if ((r = sshkey_parse_private_fileblob(&keyblob, filename, pass, 212 if ((r = sshkey_parse_private_fileblob(&keyblob, pass, filename,
213 &private, &comment)) != 0 && 213 &private, &comment)) != 0 &&
214 r != SSH_ERR_KEY_WRONG_PASSPHRASE) 214 r != SSH_ERR_KEY_WRONG_PASSPHRASE)
215 fatal("Cannot parse %s: %s", filename, ssh_err(r)); 215 fatal("Cannot parse %s: %s", filename, ssh_err(r));
@@ -228,7 +228,7 @@ add_file(AuthenticationConnection *ac, const char *filename, int key_only)
228 return -1; 228 return -1;
229 } 229 }
230 if ((r = sshkey_parse_private_fileblob(&keyblob, 230 if ((r = sshkey_parse_private_fileblob(&keyblob,
231 filename, pass, &private, &comment)) != 0 && 231 pass, filename, &private, NULL)) != 0 &&
232 r != SSH_ERR_KEY_WRONG_PASSPHRASE) 232 r != SSH_ERR_KEY_WRONG_PASSPHRASE)
233 fatal("Cannot parse %s: %s", 233 fatal("Cannot parse %s: %s",
234 filename, ssh_err(r)); 234 filename, ssh_err(r));