summaryrefslogtreecommitdiff
path: root/sshconnect2.c
diff options
context:
space:
mode:
authormarkus@openbsd.org <markus@openbsd.org>2018-07-11 18:53:29 +0000
committerDamien Miller <djm@mindrot.org>2018-07-12 13:18:25 +1000
commit5467fbcb09528ecdcb914f4f2452216c24796790 (patch)
tree8fcef797ece697250f4c67d57a5063d6316fd203 /sshconnect2.c
parent5dc4c59d5441a19c99e7945779f7ec9051126c25 (diff)
upstream: remove legacy key emulation layer; ok djm@
OpenBSD-Commit-ID: 2b1f9619259e222bbd4fe9a8d3a0973eafb9dd8d
Diffstat (limited to 'sshconnect2.c')
-rw-r--r--sshconnect2.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/sshconnect2.c b/sshconnect2.c
index 2194e3a8d..9874b4485 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: sshconnect2.c,v 1.278 2018/07/09 21:03:30 markus Exp $ */ 1/* $OpenBSD: sshconnect2.c,v 1.279 2018/07/11 18:53:29 markus Exp $ */
2/* 2/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved. 3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 * Copyright (c) 2008 Damien Miller. All rights reserved. 4 * Copyright (c) 2008 Damien Miller. All rights reserved.
@@ -1061,7 +1061,7 @@ key_sig_algorithm(struct ssh *ssh, const struct sshkey *key)
1061 if (ssh == NULL || ssh->kex->server_sig_algs == NULL || 1061 if (ssh == NULL || ssh->kex->server_sig_algs == NULL ||
1062 (key->type != KEY_RSA && key->type != KEY_RSA_CERT)) { 1062 (key->type != KEY_RSA && key->type != KEY_RSA_CERT)) {
1063 /* Filter base key signature alg against our configuration */ 1063 /* Filter base key signature alg against our configuration */
1064 return match_list(key_ssh_name(key), 1064 return match_list(sshkey_ssh_name(key),
1065 options.pubkey_key_types, NULL); 1065 options.pubkey_key_types, NULL);
1066 } 1066 }
1067 1067
@@ -1610,10 +1610,10 @@ try_identity(Identity *id)
1610{ 1610{
1611 if (!id->key) 1611 if (!id->key)
1612 return (0); 1612 return (0);
1613 if (key_type_plain(id->key->type) == KEY_RSA && 1613 if (sshkey_type_plain(id->key->type) == KEY_RSA &&
1614 (datafellows & SSH_BUG_RSASIGMD5) != 0) { 1614 (datafellows & SSH_BUG_RSASIGMD5) != 0) {
1615 debug("Skipped %s key %s for RSA/MD5 server", 1615 debug("Skipped %s key %s for RSA/MD5 server",
1616 key_type(id->key), id->filename); 1616 sshkey_type(id->key), id->filename);
1617 return (0); 1617 return (0);
1618 } 1618 }
1619 return 1; 1619 return 1;
@@ -1979,7 +1979,7 @@ userauth_hostbased(Authctxt *authctxt)
1979 (r = sshbuf_put_cstring(b, authctxt->server_user)) != 0 || 1979 (r = sshbuf_put_cstring(b, authctxt->server_user)) != 0 ||
1980 (r = sshbuf_put_cstring(b, authctxt->service)) != 0 || 1980 (r = sshbuf_put_cstring(b, authctxt->service)) != 0 ||
1981 (r = sshbuf_put_cstring(b, authctxt->method->name)) != 0 || 1981 (r = sshbuf_put_cstring(b, authctxt->method->name)) != 0 ||
1982 (r = sshbuf_put_cstring(b, key_ssh_name(private))) != 0 || 1982 (r = sshbuf_put_cstring(b, sshkey_ssh_name(private))) != 0 ||
1983 (r = sshbuf_put_string(b, keyblob, keylen)) != 0 || 1983 (r = sshbuf_put_string(b, keyblob, keylen)) != 0 ||
1984 (r = sshbuf_put_cstring(b, chost)) != 0 || 1984 (r = sshbuf_put_cstring(b, chost)) != 0 ||
1985 (r = sshbuf_put_cstring(b, authctxt->local_user)) != 0) { 1985 (r = sshbuf_put_cstring(b, authctxt->local_user)) != 0) {
@@ -2005,7 +2005,7 @@ userauth_hostbased(Authctxt *authctxt)
2005 (r = sshpkt_put_cstring(ssh, authctxt->server_user)) != 0 || 2005 (r = sshpkt_put_cstring(ssh, authctxt->server_user)) != 0 ||
2006 (r = sshpkt_put_cstring(ssh, authctxt->service)) != 0 || 2006 (r = sshpkt_put_cstring(ssh, authctxt->service)) != 0 ||
2007 (r = sshpkt_put_cstring(ssh, authctxt->method->name)) != 0 || 2007 (r = sshpkt_put_cstring(ssh, authctxt->method->name)) != 0 ||
2008 (r = sshpkt_put_cstring(ssh, key_ssh_name(private))) != 0 || 2008 (r = sshpkt_put_cstring(ssh, sshkey_ssh_name(private))) != 0 ||
2009 (r = sshpkt_put_string(ssh, keyblob, keylen)) != 0 || 2009 (r = sshpkt_put_string(ssh, keyblob, keylen)) != 0 ||
2010 (r = sshpkt_put_cstring(ssh, chost)) != 0 || 2010 (r = sshpkt_put_cstring(ssh, chost)) != 0 ||
2011 (r = sshpkt_put_cstring(ssh, authctxt->local_user)) != 0 || 2011 (r = sshpkt_put_cstring(ssh, authctxt->local_user)) != 0 ||