diff options
author | Colin Watson <cjwatson@debian.org> | 2006-05-12 08:53:37 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2006-05-12 08:53:37 +0000 |
commit | 2ee73b36b9a35daeaa4b065046882dc1f5f551b6 (patch) | |
tree | f64a4ace625514e94759878c0b94ab0a79805bbd /sshconnect1.c | |
parent | 3c190ec8e469477ea65fbf4cc83062c65c281434 (diff) | |
parent | 3e2e0ac10674d77618c4c7339e18b83ced247492 (diff) |
Merge 4.3p2 to the trunk.
Diffstat (limited to 'sshconnect1.c')
-rw-r--r-- | sshconnect1.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/sshconnect1.c b/sshconnect1.c index bd05723c7..440d7c5bd 100644 --- a/sshconnect1.c +++ b/sshconnect1.c | |||
@@ -13,7 +13,7 @@ | |||
13 | */ | 13 | */ |
14 | 14 | ||
15 | #include "includes.h" | 15 | #include "includes.h" |
16 | RCSID("$OpenBSD: sshconnect1.c,v 1.61 2005/06/17 02:44:33 djm Exp $"); | 16 | RCSID("$OpenBSD: sshconnect1.c,v 1.62 2005/10/30 08:52:18 djm Exp $"); |
17 | 17 | ||
18 | #include <openssl/bn.h> | 18 | #include <openssl/bn.h> |
19 | #include <openssl/md5.h> | 19 | #include <openssl/md5.h> |
@@ -84,7 +84,7 @@ try_agent_authentication(void) | |||
84 | /* Wait for server's response. */ | 84 | /* Wait for server's response. */ |
85 | type = packet_read(); | 85 | type = packet_read(); |
86 | 86 | ||
87 | /* The server sends failure if it doesn\'t like our key or | 87 | /* The server sends failure if it doesn't like our key or |
88 | does not support RSA authentication. */ | 88 | does not support RSA authentication. */ |
89 | if (type == SSH_SMSG_FAILURE) { | 89 | if (type == SSH_SMSG_FAILURE) { |
90 | debug("Server refused our key."); | 90 | debug("Server refused our key."); |
@@ -215,8 +215,8 @@ try_rsa_authentication(int idx) | |||
215 | type = packet_read(); | 215 | type = packet_read(); |
216 | 216 | ||
217 | /* | 217 | /* |
218 | * The server responds with failure if it doesn\'t like our key or | 218 | * The server responds with failure if it doesn't like our key or |
219 | * doesn\'t support RSA authentication. | 219 | * doesn't support RSA authentication. |
220 | */ | 220 | */ |
221 | if (type == SSH_SMSG_FAILURE) { | 221 | if (type == SSH_SMSG_FAILURE) { |
222 | debug("Server refused our key."); | 222 | debug("Server refused our key."); |