diff options
author | djm@openbsd.org <djm@openbsd.org> | 2017-04-30 23:10:43 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2017-05-01 09:37:40 +1000 |
commit | 56912dea6ef63dae4eb1194e5d88973a7c6c5740 (patch) | |
tree | c0425585449d257a90a42efce5f602f7ce16779f /ssh.c | |
parent | d4084cd230f7319056559b00db8b99296dad49d5 (diff) |
upstream commit
unifdef WITH_SSH1 ok markus@
Upstream-ID: 9716e62a883ef8826c57f4d33b4a81a9cc7755c7
Diffstat (limited to 'ssh.c')
-rw-r--r-- | ssh.c | 10 |
1 files changed, 1 insertions, 9 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh.c,v 1.452 2017/04/28 03:20:27 dtucker Exp $ */ | 1 | /* $OpenBSD: ssh.c,v 1.453 2017/04/30 23:10:43 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -690,11 +690,7 @@ main(int ac, char **av) | |||
690 | else if (strcmp(optarg, "key-plain") == 0) | 690 | else if (strcmp(optarg, "key-plain") == 0) |
691 | cp = sshkey_alg_list(0, 1, 0, '\n'); | 691 | cp = sshkey_alg_list(0, 1, 0, '\n'); |
692 | else if (strcmp(optarg, "protocol-version") == 0) { | 692 | else if (strcmp(optarg, "protocol-version") == 0) { |
693 | #ifdef WITH_SSH1 | ||
694 | cp = xstrdup("1\n2"); | ||
695 | #else | ||
696 | cp = xstrdup("2"); | 693 | cp = xstrdup("2"); |
697 | #endif | ||
698 | } | 694 | } |
699 | if (cp == NULL) | 695 | if (cp == NULL) |
700 | fatal("Unsupported query \"%s\"", optarg); | 696 | fatal("Unsupported query \"%s\"", optarg); |
@@ -1304,10 +1300,6 @@ main(int ac, char **av) | |||
1304 | sensitive_data.keys[i] = NULL; | 1300 | sensitive_data.keys[i] = NULL; |
1305 | 1301 | ||
1306 | PRIV_START; | 1302 | PRIV_START; |
1307 | #if WITH_SSH1 | ||
1308 | sensitive_data.keys[0] = key_load_private_type(KEY_RSA1, | ||
1309 | _PATH_HOST_KEY_FILE, "", NULL, NULL); | ||
1310 | #endif | ||
1311 | #ifdef OPENSSL_HAS_ECC | 1303 | #ifdef OPENSSL_HAS_ECC |
1312 | sensitive_data.keys[1] = key_load_private_cert(KEY_ECDSA, | 1304 | sensitive_data.keys[1] = key_load_private_cert(KEY_ECDSA, |
1313 | _PATH_HOST_ECDSA_KEY_FILE, "", NULL); | 1305 | _PATH_HOST_ECDSA_KEY_FILE, "", NULL); |