summaryrefslogtreecommitdiff
path: root/sshconnect2.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-03-13 04:57:58 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-03-13 04:57:58 +0000
commitcfccef96a35cb954023a31f9bc10cf3b8f9f8ed3 (patch)
tree4b4137478ea523bc49c8b53aace863e9a80e0031 /sshconnect2.c
parent9ae2bb6790ab8d00b5cd29309889b2db50a9bef9 (diff)
- OpenBSD CVS Sync
- markus@cvs.openbsd.org 2001/03/12 22:02:02 [key.c key.h ssh-add.c ssh-keygen.c sshconnect.c sshconnect2.c] remove old key_fingerprint interface, s/_ex//
Diffstat (limited to 'sshconnect2.c')
-rw-r--r--sshconnect2.c9
1 files changed, 5 insertions, 4 deletions
diff --git a/sshconnect2.c b/sshconnect2.c
index 19d079bd3..046d746a4 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -23,7 +23,7 @@
23 */ 23 */
24 24
25#include "includes.h" 25#include "includes.h"
26RCSID("$OpenBSD: sshconnect2.c,v 1.53 2001/03/10 17:51:04 markus Exp $"); 26RCSID("$OpenBSD: sshconnect2.c,v 1.54 2001/03/12 22:02:02 markus Exp $");
27 27
28#include <openssl/bn.h> 28#include <openssl/bn.h>
29#include <openssl/md5.h> 29#include <openssl/md5.h>
@@ -660,7 +660,7 @@ input_userauth_pk_ok(int type, int plen, void *ctxt)
660 Key *key = NULL; 660 Key *key = NULL;
661 Buffer b; 661 Buffer b;
662 int alen, blen, pktype, sent = 0; 662 int alen, blen, pktype, sent = 0;
663 char *pkalg, *pkblob; 663 char *pkalg, *pkblob, *fp;
664 664
665 if (authctxt == NULL) 665 if (authctxt == NULL)
666 fatal("input_userauth_pk_ok: no authentication context"); 666 fatal("input_userauth_pk_ok: no authentication context");
@@ -687,7 +687,6 @@ input_userauth_pk_ok(int type, int plen, void *ctxt)
687 debug("no last key or no sign cb"); 687 debug("no last key or no sign cb");
688 break; 688 break;
689 } 689 }
690 debug2("last_key %s", key_fingerprint(authctxt->last_key));
691 if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) { 690 if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) {
692 debug("unknown pkalg %s", pkalg); 691 debug("unknown pkalg %s", pkalg);
693 break; 692 break;
@@ -696,7 +695,9 @@ input_userauth_pk_ok(int type, int plen, void *ctxt)
696 debug("no key from blob. pkalg %s", pkalg); 695 debug("no key from blob. pkalg %s", pkalg);
697 break; 696 break;
698 } 697 }
699 debug2("input_userauth_pk_ok: fp %s", key_fingerprint(key)); 698 fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX);
699 debug2("input_userauth_pk_ok: fp %s", fp);
700 xfree(fp);
700 if (!key_equal(key, authctxt->last_key)) { 701 if (!key_equal(key, authctxt->last_key)) {
701 debug("key != last_key"); 702 debug("key != last_key");
702 break; 703 break;