summaryrefslogtreecommitdiff
path: root/ssh.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2017-04-30 23:10:43 +0000
committerDamien Miller <djm@mindrot.org>2017-05-01 09:37:40 +1000
commit56912dea6ef63dae4eb1194e5d88973a7c6c5740 (patch)
treec0425585449d257a90a42efce5f602f7ce16779f /ssh.c
parentd4084cd230f7319056559b00db8b99296dad49d5 (diff)
upstream commit
unifdef WITH_SSH1 ok markus@ Upstream-ID: 9716e62a883ef8826c57f4d33b4a81a9cc7755c7
Diffstat (limited to 'ssh.c')
-rw-r--r--ssh.c10
1 files changed, 1 insertions, 9 deletions
diff --git a/ssh.c b/ssh.c
index 5db6ff25e..38c8e837f 100644
--- a/ssh.c
+++ b/ssh.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssh.c,v 1.452 2017/04/28 03:20:27 dtucker Exp $ */ 1/* $OpenBSD: ssh.c,v 1.453 2017/04/30 23:10:43 djm Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -690,11 +690,7 @@ main(int ac, char **av)
690 else if (strcmp(optarg, "key-plain") == 0) 690 else if (strcmp(optarg, "key-plain") == 0)
691 cp = sshkey_alg_list(0, 1, 0, '\n'); 691 cp = sshkey_alg_list(0, 1, 0, '\n');
692 else if (strcmp(optarg, "protocol-version") == 0) { 692 else if (strcmp(optarg, "protocol-version") == 0) {
693#ifdef WITH_SSH1
694 cp = xstrdup("1\n2");
695#else
696 cp = xstrdup("2"); 693 cp = xstrdup("2");
697#endif
698 } 694 }
699 if (cp == NULL) 695 if (cp == NULL)
700 fatal("Unsupported query \"%s\"", optarg); 696 fatal("Unsupported query \"%s\"", optarg);
@@ -1304,10 +1300,6 @@ main(int ac, char **av)
1304 sensitive_data.keys[i] = NULL; 1300 sensitive_data.keys[i] = NULL;
1305 1301
1306 PRIV_START; 1302 PRIV_START;
1307#if WITH_SSH1
1308 sensitive_data.keys[0] = key_load_private_type(KEY_RSA1,
1309 _PATH_HOST_KEY_FILE, "", NULL, NULL);
1310#endif
1311#ifdef OPENSSL_HAS_ECC 1303#ifdef OPENSSL_HAS_ECC
1312 sensitive_data.keys[1] = key_load_private_cert(KEY_ECDSA, 1304 sensitive_data.keys[1] = key_load_private_cert(KEY_ECDSA,
1313 _PATH_HOST_ECDSA_KEY_FILE, "", NULL); 1305 _PATH_HOST_ECDSA_KEY_FILE, "", NULL);